You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/09/24 12:22:05 UTC

[JENKINS] Solr » Solr-Check-9.x - Build # 5527 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5527/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44517/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-24 12:16:41.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 12:16:41.703; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-24 12:16:42.622; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-24 12:16:42.661; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23072ms
ok 61 start solr with client truststore and security manager in 25728ms
not ok 62 start solr with mTLS needed in 58848ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SShBI7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44517.
#
# Started Solr server on port 44517 (pid=202422). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44518.
#
# Started Solr server on port 44518 (pid=202846). Happy searching!
#
# INFO  - 2023-09-24 12:18:06.491; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 12:18:06.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 12:18:06.846; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 12:18:06.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 12:18:06.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.881 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 1A C1 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:42.000 UTC",
#     "not  after"         : "2023-12-23 12:17:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 2D A4 E4 D9 CC AE 87   BA DC E2 8C D6 74 7F 24  --...........t.$
#         0010: 71 78 45 56                                        qxEV
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.886 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 A6 61 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:34.000 UTC",
#     "not  after"         : "2023-12-23 12:17:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:06.900 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:06.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.130 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.131 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.132 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:07.133 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.138 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:07.152 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BC 2D 99 81 61 88 C5 58 7C E6 BD 5F 78 74 AF 2B A0 F3 B1 DE 80 5B C9 33 81 8F C1 80 0E B8 DA 22",
#   "session id"          : "B3 26 CA 09 65 55 DE 05 64 D7 73 3E CA 67 5D E0 29 19 89 FE 75 6C DC 93 F0 68 93 7E 7A 93 2A 14",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F1 D4 7D 0D 9A 81 56 C6   CE F3 1D 00 87 63 DB 7F  ......V......c..
#             0010: 91 4B C4 38 6A A7 26 BB   58 CC B5 AE 38 D0 2B 62  .K.8j.&.X...8.+b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.268 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 36 0C BD 33 37 9F 1C D8 D0 D0 C7 81 62 20 2E 18 29 29 79 41 73 B6 57 54 DF 62 16 12 E5 08 8B",
#   "session id"          : "B3 26 CA 09 65 55 DE 05 64 D7 73 3E CA 67 5D E0 29 19 89 FE 75 6C DC 93 F0 68 93 7E 7A 93 2A 14",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 90 D6 99 FA 08 BC 27 EE   9D 51 5F 9E A9 33 24 2D  ......'..Q_..3$-
#           0010: 70 AF 0B 7C 41 0B A1 79   64 E6 18 AA 59 82 5C 75  p...A..yd...Y.\u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.269 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.269 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.270 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.271 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.271 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.272 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.275 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.282 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.283 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.284 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.288 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.289 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.290 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.291 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.291 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.292 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.292 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.293 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.296 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 36 FF 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:38.000 UTC",
#       "not  after"         : "2023-12-23 12:17:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 32 2D C6 08 B0 A6 AD 71   DD A2 C9 F5 D9 A6 CB 5C  2-.....q.......\
#           0010: F5 AA 92 5D                                        ...]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.296 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.372 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.375 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 34 7A D7 25 B4 E8 B5   6D 79 D0 95 7C 2B A4 AF  E4z.%...my...+..
#     0010: 3A BC 74 66 5C 15 86 D9   C7 20 6E 79 07 A0 4F EC  :.tf\.... ny..O.
#     0020: 22 CE BD 35 16 72 D4 F3   83 C0 AE AB 5A 65 A0 87  "..5.r......Ze..
#     0030: 9B A7 69 9A 7B 0A E1 2C   C7 14 57 D8 24 E5 AF 50  ..i....,..W.$..P
#     0040: 85 A6 0E 23 AD BC 82 C4   03 9D A5 20 5B DC 69 C0  ...#....... [.i.
#     0050: 48 9F 83 64 60 E9 5B 22   52 89 55 EA 98 87 C3 8F  H..d`.["R.U.....
#     0060: 93 5C 68 0F CD 0F A8 E6   FF 9D E3 BE E0 0C F9 64  .\h............d
#     0070: C5 30 BF F8 44 8F 13 AD   59 9D 2F F0 39 2E 7F 5D  .0..D...Y./.9..]
#     0080: 2C B7 D1 15 A1 9D 0C 48   A2 63 2E 4B BC DA F8 D6  ,......H.c.K....
#     0090: E5 0F 42 BA A1 06 E2 B7   24 BB 47 2C 66 5E DA 0A  ..B.....$.G,f^..
#     00A0: 03 88 5E A5 AB 6B F7 4C   25 A4 27 B8 29 C1 D8 28  ..^..k.L%.'.)..(
#     00B0: 71 50 7F FE C4 7A 0A 45   E9 1A A8 C9 CD AA 18 2F  qP...z.E......./
#     00C0: 20 BF BF 39 84 D7 1B AB   43 CB 98 E0 B9 57 40 63   ..9....C....W@c
#     00D0: C5 89 A2 75 84 38 54 CF   59 7A 9E 96 CA 97 39 35  ...u.8T.Yz....95
#     00E0: 05 6C E4 07 05 16 BF 47   77 A5 7D D6 DE A3 C6 57  .l.....Gw......W
#     00F0: 54 C5 C4 92 1B 1E 04 0B   C4 B5 77 16 F4 20 65 28  T.........w.. e(
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.377 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5D 24 6D EA D0 61 62 88   91 79 42 96 0A 5E F8 84  ]$m..ab..yB..^..
#     0010: DA 95 B0 EA DC D6 DE F3   21 0B 30 48 FF 29 EB B3  ........!.0H.)..
#     0020: B2 61 75 BA 43 49 55 53   8F 60 A4 4F B6 F9 0E 92  .au.CIUS.`.O....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.379 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.380 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.380 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.381 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.384 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 1A C1 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:42.000 UTC",
#       "not  after"         : "2023-12-23 12:17:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 2D A4 E4 D9 CC AE 87   BA DC E2 8C D6 74 7F 24  --...........t.$
#           0010: 71 78 45 56                                        qxEV
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 17 31 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:36.000 UTC",
#       "not  after"         : "2023-12-23 12:17:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#           0010: 80 E9 59 A9                                        ..Y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 A5 AC 5E 96 90 2B 85   73 F5 A2 02 88 67 0C 42  ...^..+.s....g.B
#     0010: E8 17 F4 06 B7 99 CC 17   AA FC D7 36 A3 DF 12 5B  ...........6...[
#     0020: 01 19 7E 9F 70 E2 5A 32   97 D2 C8 9A A6 22 9E 45  ....p.Z2.....".E
#     0030: 7A 82 0D E7 58 CE CA 40   C1 EA DF 3B 0D A6 10 56  z...X..@...;...V
#     0040: 9B 5E BF 10 A2 12 FB 59   DC C1 59 6F DB 06 2F 70  .^.....Y..Yo../p
#     0050: 1B 93 66 55 63 F2 8D 86   29 BF 67 35 F5 45 73 67  ..fUc...).g5.Esg
#     0060: 43 21 0C 51 7B 6B 4C 7E   77 5D 83 73 93 EE 22 9B  C!.Q.kL.w].s..".
#     0070: 24 39 61 7F DA 71 DF 1B   0F 24 E9 A5 60 AC 03 56  $9a..q...$..`..V
#     0080: 9A 17 7E DA D6 C0 8D 01   33 29 5C 66 DE 4E 53 5A  ........3)\f.NSZ
#     0090: 6B C5 99 EB 5F 1B 09 33   96 27 58 AF 34 E0 3E 79  k..._..3.'X.4.>y
#     00A0: 0D 46 5E DB AE 05 9E 69   0A 83 95 9C A6 96 89 E8  .F^....i........
#     00B0: C5 D6 4B F2 AE E0 B7 57   AC 3A 4B 9F 43 03 68 0F  ..K....W.:K.C.h.
#     00C0: 1A 83 FB 2D 95 E1 FD 14   99 39 3C C7 05 F3 B1 CB  ...-.....9<.....
#     00D0: FC 6B 3C E7 A4 C4 24 C2   5D E9 53 C7 8B E2 A5 46  .k<...$.].S....F
#     00E0: 2B 06 B1 03 E0 21 F9 53   FA 3F A8 B7 24 A5 62 32  +....!.S.?..$.b2
#     00F0: 43 FE F4 CA BB FC 96 C3   1C 93 8A 78 96 F4 EB 48  C..........x...H
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.411 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1A 4B F8 E6 08 EA 31 F1   74 BC DA 0F 45 96 06 49  .K....1.t...E..I
#     0010: 24 5D E5 87 C1 F0 F4 22   DB A2 BA 8C D0 D5 EF 9A  $]....."........
#     0020: 0C D1 AA A7 B7 FF C2 15   56 C6 66 D8 85 CE 9A D6  ........V.f.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.412 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:07.460 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2E EA CA 57 96 E5 24 C5 F4 21 25 81 BD AA 3F CF CC C6 8B 2F 83 D7 EA 9A 48 E0 44 9F DE 52 9B 2F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 12:18:07.722 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 12:18:07.723 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-24 12:18:08.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 12:18:08.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 12:18:09.051; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 12:18:09.054; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 12:18:09.054; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SShBI7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.086 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 1A C1 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:42.000 UTC",
#     "not  after"         : "2023-12-23 12:17:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 2D A4 E4 D9 CC AE 87   BA DC E2 8C D6 74 7F 24  --...........t.$
#         0010: 71 78 45 56                                        qxEV
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.091 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 A6 61 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:34.000 UTC",
#     "not  after"         : "2023-12-23 12:17:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:09.105 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.340 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.342 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:09.342 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.359 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:09.361 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C5 93 5B 97 CD F1 32 FB B4 58 2D B7 CF 84 C1 A1 BD 9F 35 20 6C D9 76 32 AD D9 A2 95 3E FD F5 BC",
#   "session id"          : "DC 8B E5 D9 FE A5 4C 2F 19 A0 C6 25 50 59 65 C2 12 3A 8A A0 54 ED 49 03 1B F0 26 3A AE F3 34 C1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 16 61 1F 96 80 30 4A 4E   29 31 44 60 B2 56 E3 64  .a...0JN)1D`.V.d
#             0010: 70 DA 59 78 2E 0F D8 55   01 75 5D EF F3 FF 07 1A  p.Yx...U.u].....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.467 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9A 57 32 EA A2 E8 B5 92 60 E7 4B 5F 6C 99 B3 99 4E 6E F2 00 A2 D0 E5 44 94 EB 78 E1 7E 34 13 6C",
#   "session id"          : "DC 8B E5 D9 FE A5 4C 2F 19 A0 C6 25 50 59 65 C2 12 3A 8A A0 54 ED 49 03 1B F0 26 3A AE F3 34 C1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 75 B9 BA 31 E0 01 24 69   F2 88 58 B4 00 9C 17 7E  u..1..$i..X.....
#           0010: A3 30 40 75 3A 71 52 72   68 82 DE 0A 8B 18 FB 08  .0@u:qRrh.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.468 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.468 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.470 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.471 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.472 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.482 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.483 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.484 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.492 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.492 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.496 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 36 FF 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:38.000 UTC",
#       "not  after"         : "2023-12-23 12:17:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 32 2D C6 08 B0 A6 AD 71   DD A2 C9 F5 D9 A6 CB 5C  2-.....q.......\
#           0010: F5 AA 92 5D                                        ...]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.496 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.549 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:18:09.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.578 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 17 31 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 12:17:36.000 UTC",
#     "not  after"         : "2023-12-23 12:17:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#         0010: 80 E9 59 A9                                        ..Y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#         0010: 8D DE E5 D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.582 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 89 A3 91 49 D0 12 30   60 DC 13 D6 92 91 B0 0B  ....I..0`.......
#     0010: C5 22 42 41 28 99 10 DA   E5 32 67 ED 68 CE 95 71  ."BA(....2g.h..q
#     0020: 23 33 41 90 CD 7C E2 72   16 A1 5E E9 D7 8B 2E B5  #3A....r..^.....
#     0030: 1A 72 79 08 E3 4F 2F 7B   59 AD B2 C6 B3 01 9D 4F  .ry..O/.Y......O
#     0040: BC EC 16 C4 3B E3 A5 0F   B3 5E 91 00 21 B4 DD 2B  ....;....^..!..+
#     0050: AD 31 DC F8 7F 2C A0 CC   0D 4A 4D 09 DF 2E 7E DD  .1...,...JM.....
#     0060: FD D0 A3 04 16 E9 27 37   1A F2 B7 7A FE CB 50 EE  ......'7...z..P.
#     0070: 6E 08 BF 91 1D D8 F7 E0   86 EC FF 24 F8 9A A9 76  n..........$...v
#     0080: 52 A0 41 07 E8 8E 73 88   7C CF EE 0C 3E 2E 7B 7D  R.A...s.....>...
#     0090: 01 90 61 0F AE A6 33 1F   AC 84 63 30 D6 94 72 BB  ..a...3...c0..r.
#     00A0: 07 23 0D BE A2 F7 70 35   4F 62 CD 63 97 A6 87 01  .#....p5Ob.c....
#     00B0: 26 7B 76 AA B4 B7 05 23   6E A1 7E E3 78 0A 54 75  &.v....#n...x.Tu
#     00C0: 85 B2 90 B9 A4 DD DF A9   CC 85 01 3C 05 A4 3D 5E  ...........<..=^
#     00D0: 83 81 AB F9 2E 74 B6 B5   F6 A1 08 0B 28 0B BA 67  .....t......(..g
#     00E0: D6 D9 93 B3 E4 D7 0C 1B   95 7F 91 86 75 49 5B F0  ............uI[.
#     00F0: 40 28 61 4B 4B 91 73 5D   4B E3 53 5E 9F F2 22 B8  @(aKK.s]K.S^..".
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.584 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 97 27 03 AF E5 13 E0 57   AF 3B 00 1B AC 05 7B B8  .'.....W.;......
#     0010: 82 F6 F4 DD 3C 57 90 7D   BC BA 25 B6 CB E3 9B 43  ....<W....%....C
#     0020: EC 9A 4E A8 DC CE F5 3C   71 49 B4 DF 6A D5 22 5D  ..N....<qI..j."]
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.586 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.587 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.587 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:09.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.589 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.591 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 1A C1 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:42.000 UTC",
#       "not  after"         : "2023-12-23 12:17:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 2D A4 E4 D9 CC AE 87   BA DC E2 8C D6 74 7F 24  --...........t.$
#           0010: 71 78 45 56                                        qxEV
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 17 31 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:36.000 UTC",
#       "not  after"         : "2023-12-23 12:17:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#           0010: 80 E9 59 A9                                        ..Y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.617 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9F 3A 66 D2 43 8F C4 6D   F4 E7 34 C3 4B 59 41 5E  .:f.C..m..4.KYA^
#     0010: D8 D1 43 B9 1A 42 DD EF   42 60 D3 FE C7 CD EE B3  ..C..B..B`......
#     0020: D4 27 06 AA 0B 16 55 05   8A 90 23 3C 23 BD 7D F9  .'....U...#<#...
#     0030: C2 B6 28 07 FE D0 1E 95   46 82 2D 90 69 F6 37 4B  ..(.....F.-.i.7K
#     0040: D6 5C FC A2 FA 7E 1A B1   27 09 A9 B7 72 C5 9A B0  .\......'...r...
#     0050: A2 8C 2D BA E3 AA 27 1E   35 6F F7 2E 63 E7 05 A4  ..-...'.5o..c...
#     0060: A3 B4 45 67 DF 34 D9 67   DB BB 8E C1 25 62 DE 7E  ..Eg.4.g....%b..
#     0070: 28 1F E7 0C A6 C1 3E 9A   6A 42 CC 97 D7 F8 D3 99  (.....>.jB......
#     0080: DF 03 8C 85 68 A5 CE 37   AB 03 50 C8 AA F7 CE 22  ....h..7..P...."
#     0090: 07 F9 8F 6C 27 03 75 E3   42 2F 4B A6 19 47 74 A0  ...l'.u.B/K..Gt.
#     00A0: 2E 7F D1 19 ED 94 D9 7A   67 27 21 78 E6 22 18 5C  .......zg'!x.".\
#     00B0: 33 E1 D1 DC 8D DD 81 69   31 58 5D F9 88 51 74 1A  3......i1X]..Qt.
#     00C0: 53 5C 9B 3D 8E C4 9B E2   F4 A3 13 49 19 23 CE B3  S\.=.......I.#..
#     00D0: 39 C8 9C 19 8F 38 B3 DE   20 CB 36 62 7E EE D9 F0  9....8.. .6b....
#     00E0: 86 AD 86 F2 8E 51 78 B5   51 4C 92 86 E4 E3 3E 29  .....Qx.QL....>)
#     00F0: 8C 5F D6 98 9F CA 57 D8   BD 8A A4 E4 DD 9F CB 2B  ._....W........+
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.619 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 3B AA EF 18 9E C2 2B   97 7C FA 4B 53 D5 61 7C  .;.....+...KS.a.
#     0010: F4 0F A4 E7 54 90 0E CF   10 4D FE 3E D2 BB 25 52  ....T....M.>..%R
#     0020: 9F 7C 95 B2 C1 1F D6 9E   EA 07 EC 04 41 8C 97 16  ............A...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.620 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:09.669 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 C9 4D 4E 87 CF 71 2E 49 8E D2 68 09 5C A2 E3 5C 77 31 33 B1 12 3D 3F 47 AA 49 E5 D5 79 4F 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 12:18:09.985 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 12:18:09.986 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-24 12:18:21.163; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:21.499 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 17 31 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:36.000 UTC",
#       "not  after"         : "2023-12-23 12:17:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#           0010: 80 E9 59 A9                                        ..Y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0F D1 A9 DE 2D 62 37   EE 1E 81 9B BB 0E C7 23  .....-b7.......#
#           0010: 8D DE E5 D8                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 A6 61 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 12:17:34.000 UTC",
#       "not  after"         : "2023-12-23 12:17:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 76 BB 51 75 41 AC CF   63 B9 BD 74 BA 44 A8 DF  "v.QuA..c..t.D..
#           0010: 80 E9 59 A9                                        ..Y.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-24 12:18:21.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.749 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.751 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 12:18:21.751 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.756 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 12:18:21.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "77 03 CF E9 E3 42 0D F2 11 AE F2 93 BA 95 AB 68 52 76 75 BB 80 52 95 22 4F 05 FD 80 8C 73 0F E3",
#     "session id"          : "ED B2 46 6F 72 C8 1C A3 9A 87 FD DC 46 43 02 FC 5F E7 08 CF E5 7E AF B0 B9 CC 61 F6 1C AD 5D 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E1 AB 19 D3 E7 CC 1B 03   B5 AB C1 81 3E 99 A7 FB  ............>...
#               0010: B8 23 8C CB 31 AD 60 DB   ED 82 54 4E 49 BD 16 5C  .#..1.`...TNI..\
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "17 92 03 82 A7 98 05 C3 AC 7D D1 AD 25 FF 66 84 BB CC 50 F8 90 7C 88 75 26 FC 9B 78 ED 83 01 AB",
#     "session id"          : "ED B2 46 6F 72 C8 1C A3 9A 87 FD DC 46 43 02 FC 5F E7 08 CF E5 7E AF B0 B9 CC 61 F6 1C AD 5D 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 75 22 59 AB 00 1B 9C 63   6D 68 5B 14 26 A9 DC 26  u"Y....cmh[.&..&
#             0010: 02 A9 75 4C A8 A5 A7 70   25 C5 98 E8 54 99 84 7B  ..uL...p%...T...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.789 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.791 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.793 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.802 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.805 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.808 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:18:21.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 12:18:21.811 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificat

[...truncated too long message...]

nFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 12:19:42.897 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.941 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.942 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.943 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 12:19:42.943 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44518/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28728ms
ok 65 stop command for single port in 31087ms
ok 66 status detects locally running solr in 14377ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2200ms
ok 69 copying files around in 6618ms
ok 70 upconfig in 2631ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1215ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 25s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m50.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5765 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5765/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35247/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-30 18:07:07.119; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 18:07:07.125; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-30 18:07:08.028; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-30 18:07:08.065; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22884ms
ok 61 start solr with client truststore and security manager in 25874ms
not ok 62 start solr with mTLS needed in 59279ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-USWevp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35247.
#
# Started Solr server on port 35247 (pid=198297). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35248.
#
# Started Solr server on port 35248 (pid=198744). Happy searching!
#
# INFO  - 2023-10-30 18:08:32.074; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 18:08:32.079; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-30 18:08:32.470; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 18:08:32.473; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 18:08:32.474; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:32.507 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 3A 37 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:08.000 UTC",
#     "not  after"         : "2024-01-28 18:08:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 17 69 76 E4 6E 17 B0   7D F1 D1 14 F4 6F 6A 6A  t.iv.n.......ojj
#         0010: 26 52 24 6A                                        &R$j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:32.511 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 A9 A8 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:07:59.000 UTC",
#     "not  after"         : "2024-01-28 18:07:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:32.527 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:32.754 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.755 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:32.756 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:32.757 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.773 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.773 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.774 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:32.776 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 0F 2F 59 09 94 AE BB CB DC B0 94 A9 E5 B0 3C 68 7C A3 F9 71 63 25 70 F0 5B 7E D6 B9 F3 43 0A",
#   "session id"          : "5B 84 2B F0 0E 74 A7 98 CB FC 81 6D 85 F0 10 8E 97 0F A1 CA 72 F6 C9 8D 56 FD 6F 19 95 D9 EE D1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0A DE 6F 47 D6 A6 9F C0   EE A8 D1 9E 6C 06 10 2D  ..oG........l..-
#             0010: FE 50 B8 05 FD 54 2B 5C   74 4F 8E 80 55 5F 83 7E  .P...T+\tO..U_..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.879 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A7 E0 5F 50 D7 06 BC 6A 22 F8 B0 87 A0 AD 6B 29 12 9C D9 3E A0 A3 F9 EF 92 DC 43 B6 A6 54 5D 08",
#   "session id"          : "5B 84 2B F0 0E 74 A7 98 CB FC 81 6D 85 F0 10 8E 97 0F A1 CA 72 F6 C9 8D 56 FD 6F 19 95 D9 EE D1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F6 2B 78 D9 E6 D3 BE 99   D2 9E 89 2D F4 02 F8 D5  .+x........-....
#           0010: 80 68 91 55 DF 5A 9F 86   2A 32 F1 96 00 D5 64 5E  .h.U.Z..*2....d^
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.879 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.880 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.882 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.885 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.885 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.885 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.886 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.894 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.896 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.897 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.901 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.901 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.901 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.901 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.901 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.903 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.904 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.904 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.904 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.905 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.908 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 16 BC DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:04.000 UTC",
#       "not  after"         : "2024-01-28 18:08:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 8D BF D0 D1 CD C6 3F   0E 1D C1 37 28 54 4D 76  .......?...7(TMv
#           0010: B3 B3 F9 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.909 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:32.964 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:32.965 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:32.965 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:32.965 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.986 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.990 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C EE C5 CD E1 72 9E 9D   A7 A8 C8 0A 81 5D D9 F0  .....r.......]..
#     0010: A3 CA AD 76 26 1A A8 48   B8 75 65 E4 35 2F 94 F3  ...v&..H.ue.5/..
#     0020: CD E0 25 A4 CD 93 9F C5   DD F8 A1 56 3B 43 14 71  ..%........V;C.q
#     0030: 64 D7 FD B6 06 F2 6A 1C   F4 2C 9C CA DC FC 66 64  d.....j..,....fd
#     0040: CD F0 96 C8 F1 C8 33 AE   07 D3 16 D7 B2 73 D5 BF  ......3......s..
#     0050: F3 D3 C4 40 76 A8 5E C1   2E CC 9C 9B 3E 36 13 26  ...@v.^.....>6.&
#     0060: EF 98 30 1C 49 BA 89 5E   6D 80 7F EE 7A 9C BE AB  ..0.I..^m...z...
#     0070: 4B E6 BA 4B DA D7 3E 60   95 2F 65 BB 85 96 F4 41  K..K..>`./e....A
#     0080: CE 80 B7 AB 5B 5F 5D AF   F7 F2 54 7A 52 CF 6E 5E  ....[_]...TzR.n^
#     0090: CB 26 F7 F6 86 2D 48 9E   66 EE F1 6E 08 C7 37 68  .&...-H.f..n..7h
#     00A0: 92 17 1C 76 7C A9 4B 8C   8E E7 45 CA 8F 2E FF EB  ...v..K...E.....
#     00B0: 31 7C A9 88 DD 1F A0 D7   77 70 00 83 C7 4C 0F 87  1.......wp...L..
#     00C0: 1B 5B E5 EA 7A 34 F9 3F   A0 2E 16 5D CA F7 CA E7  .[..z4.?...]....
#     00D0: B8 D1 44 21 54 3E C0 C9   14 4F 2A DC C8 CB BE AE  ..D!T>...O*.....
#     00E0: 48 F5 F9 4B 07 D6 25 09   E5 90 81 6E 77 12 36 1A  H..K..%....nw.6.
#     00F0: 20 6C 7A EE 01 8C CB C5   4F 10 22 CF DB 36 C0 59   lz.....O."..6.Y
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.992 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E 13 68 17 BE F4 19 5F   71 6C A3 93 C8 7C CA D9  ..h...._ql......
#     0010: 8F 1D CA 3B 84 0E B9 B4   8C 7E 50 EB CE 8E 57 65  ...;......P...We
#     0020: 0A 7B FC B5 55 4F 54 8B   E3 87 41 B7 31 F7 14 94  ....UOT...A.1...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.994 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:32.995 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.995 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:32.995 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.996 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:32.996 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:32.996 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.996 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:32.999 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 3A 37 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:08.000 UTC",
#       "not  after"         : "2024-01-28 18:08:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 17 69 76 E4 6E 17 B0   7D F1 D1 14 F4 6F 6A 6A  t.iv.n.......ojj
#           0010: 26 52 24 6A                                        &R$j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 D2 00 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:01.000 UTC",
#       "not  after"         : "2024-01-28 18:08:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#           0010: 08 BC 1B 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:33.024 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 8B CB 24 15 BF 91 1D   0C B5 45 58 05 4C 33 AC  0..$......EX.L3.
#     0010: C2 43 19 93 43 21 C5 FA   35 FD 01 89 24 DC 9A F7  .C..C!..5...$...
#     0020: 57 E2 D5 2F 57 C7 07 E0   95 9A 28 05 51 AD AD 34  W../W.....(.Q..4
#     0030: 52 06 C3 4F BB 60 E8 26   E3 C3 9B 53 83 E8 10 84  R..O.`.&...S....
#     0040: 5E CB 05 56 BE 6A 95 9A   1B ED F2 D5 63 59 D2 FA  ^..V.j......cY..
#     0050: C6 45 6B C4 D5 C5 98 BA   E5 52 EB FC 79 31 81 7F  .Ek......R..y1..
#     0060: FE 48 B5 71 0A FC E7 01   99 20 2B 6D EF BD 88 B6  .H.q..... +m....
#     0070: 84 A9 21 2F F8 0E CE EF   A1 E2 81 3A DE 2B 63 35  ..!/.......:.+c5
#     0080: FE 92 D5 AD 06 2A CC 66   AE F5 51 27 B4 09 5E C8  .....*.f..Q'..^.
#     0090: 85 04 D1 A2 D2 BC 86 B7   C5 48 43 B4 49 EF 5B E5  .........HC.I.[.
#     00A0: 22 52 60 14 37 EF 3A D7   ED AD 0C D5 12 BE 15 E0  "R`.7.:.........
#     00B0: 73 71 62 6D 04 72 88 B4   7C 14 50 85 67 AF 21 8E  sqbm.r....P.g.!.
#     00C0: 12 B0 82 70 76 E9 76 45   ED FC 60 11 A3 53 32 F6  ...pv.vE..`..S2.
#     00D0: 6B 82 47 9A BF B9 87 38   B1 6C 77 34 58 9B F2 48  k.G....8.lw4X..H
#     00E0: E4 94 7A CA A6 32 73 99   56 F8 FB 04 E7 D1 0A 4A  ..z..2s.V......J
#     00F0: D5 99 8D 59 91 2C 28 4C   44 A0 58 44 BF C3 D7 46  ...Y.,(LD.XD...F
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:33.026 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3F 78 41 58 29 58 D4 A7   FF 4B 33 64 5C 72 88 D4  ?xAX)X...K3d\r..
#     0010: 6D 92 D6 8C AE 07 F1 FA   7B 4C 80 67 1D 99 92 EF  m........L.g....
#     0020: 34 E6 8F 50 66 93 6B 64   03 27 29 DB 75 22 A2 02  4..Pf.kd.').u"..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:33.027 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:33.085 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BB C6 F5 47 68 9D 76 6A 5F 95 2A A1 00 8B 9B 9C 12 45 94 4A 15 8C 80 4B 18 8E 40 D3 F8 5A 88 D1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-30 18:08:33.369 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-30 18:08:33.371 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-30 18:08:34.314; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 18:08:34.320; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-30 18:08:34.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 18:08:34.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 18:08:34.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-USWevp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:34.773 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 3A 37 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:08.000 UTC",
#     "not  after"         : "2024-01-28 18:08:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 74 17 69 76 E4 6E 17 B0   7D F1 D1 14 F4 6F 6A 6A  t.iv.n.......ojj
#         0010: 26 52 24 6A                                        &R$j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:34.778 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 A9 A8 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:07:59.000 UTC",
#     "not  after"         : "2024-01-28 18:07:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:34.792 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:34.994 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:34.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:34.996 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:34.996 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:35.001 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:35.013 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:35.013 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:35.013 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:35.015 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2B 41 C3 FF D1 B9 BC 47 4D A4 57 B0 B5 63 DA BD FB 08 90 84 98 8E AA 8B 17 E6 BB 5A 26 95 AA 63",
#   "session id"          : "21 EC E6 BF 15 78 69 83 F0 22 90 09 5B EE 0C F7 91 F0 08 0C 67 62 AE 8E BD D8 E8 48 95 24 C4 1F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 D4 D5 32 89 DE E0 90   A0 F4 68 66 15 E8 30 EA  ...2......hf..0.
#             0010: C3 A0 2F 4D 58 18 9A EB   A7 29 15 5C 50 65 0B 08  ../MX....).\Pe..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.119 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "94 A3 AA 19 CC DE 44 5A F8 B9 93 05 7E 1F A6 5D 61 31 68 7B 74 6F 05 AB B9 93 D9 7D 11 15 1F 76",
#   "session id"          : "21 EC E6 BF 15 78 69 83 F0 22 90 09 5B EE 0C F7 91 F0 08 0C 67 62 AE 8E BD D8 E8 48 95 24 C4 1F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 04 A1 3D CC F2 2A 67 F0   00 0F F4 AB D1 05 C4 D5  ..=..*g.........
#           0010: 3D DA C4 F0 E1 25 01 FF   7E 87 3D FF 97 0E 5A 69  =....%....=...Zi
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.119 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.120 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.122 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.122 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.124 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.125 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.134 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.135 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.136 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.140 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.140 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.140 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.140 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.141 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.141 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.141 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.143 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.143 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.144 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.145 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.148 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 16 BC DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:04.000 UTC",
#       "not  after"         : "2024-01-28 18:08:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 8D BF D0 D1 CD C6 3F   0E 1D C1 37 28 54 4D 76  .......?...7(TMv
#           0010: B3 B3 F9 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:35.194 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:35.194 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:35.195 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:35.195 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.229 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 D2 00 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 18:08:01.000 UTC",
#     "not  after"         : "2024-01-28 18:08:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#         0010: 08 BC 1B 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#         0010: 66 8B 32 84                                        f.2.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.233 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4B 38 A4 04 44 AD 67 22   3B FA E4 D2 29 D8 15 19  K8..D.g";...)...
#     0010: 94 1A 76 65 B7 CE 0D 9E   79 B2 A0 93 27 64 2B DB  ..ve....y...'d+.
#     0020: 7C A8 51 7A 26 E1 CE BF   10 54 D3 39 31 F4 15 DA  ..Qz&....T.91...
#     0030: AF 64 41 6D 24 14 6A DF   E5 11 B7 19 CC 44 E2 03  .dAm$.j......D..
#     0040: F3 E4 B8 05 B6 69 07 E6   63 51 1F 2E 1D A0 97 0F  .....i..cQ......
#     0050: 3C 60 F5 97 CE 2D 72 FA   94 7C A5 A8 35 52 99 5F  <`...-r.....5R._
#     0060: D2 46 C5 16 12 C2 3C 05   37 04 C0 25 F4 78 24 6C  .F....<.7..%.x$l
#     0070: 82 61 4C 28 37 5F 62 0F   6A 6F 50 84 7D B7 51 77  .aL(7_b.joP...Qw
#     0080: C1 81 B2 2E A0 05 9C 86   3A E9 51 BF E4 84 48 67  ........:.Q...Hg
#     0090: 42 8F 79 28 62 9D 32 2B   9C 1B 71 0E 4D AD 8E 5A  B.y(b.2+..q.M..Z
#     00A0: D6 A8 5D 48 FE 31 73 01   4D 59 DE EC 0F C7 6D CA  ..]H.1s.MY....m.
#     00B0: 9A 44 E7 DC 36 D8 B9 42   A4 34 45 47 3A 1D 4F E9  .D..6..B.4EG:.O.
#     00C0: 58 6D 25 53 2D 11 E3 9A   AD B6 55 73 B0 B3 05 5D  Xm%S-.....Us...]
#     00D0: B7 78 01 B7 9E 37 36 60   0B A0 F1 C6 32 C2 FE 71  .x...76`....2..q
#     00E0: 81 0E BE AB AF 0F 70 97   0A 01 D1 FD FC 70 AE F8  ......p......p..
#     00F0: 83 77 E0 84 38 78 8C 84   67 F4 FD 79 A4 F8 07 E1  .w..8x..g..y....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.234 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D 59 93 D8 D7 46 40 02   47 78 98 25 D6 9E 9A B3  .Y...F@.Gx.%....
#     0010: C5 96 A0 59 50 D6 0B 7C   12 A2 97 3D 41 5C E2 DC  ...YP......=A\..
#     0020: 70 D1 31 A3 87 9B 95 46   36 E1 95 1D CA 04 EC 28  p.1....F6......(
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.237 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:35.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:35.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 18:08:35.239 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:35.239 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.240 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.242 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 3A 37 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:08.000 UTC",
#       "not  after"         : "2024-01-28 18:08:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 17 69 76 E4 6E 17 B0   7D F1 D1 14 F4 6F 6A 6A  t.iv.n.......ojj
#           0010: 26 52 24 6A                                        &R$j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 D2 00 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:01.000 UTC",
#       "not  after"         : "2024-01-28 18:08:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#           0010: 08 BC 1B 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.269 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BF 9C 0B 3B 47 27 2D 2D   DE DD 27 40 73 D7 41 16  ...;G'--..'@s.A.
#     0010: 55 C9 E2 68 E6 E1 E1 BC   F6 EF 34 B2 88 63 9D CF  U..h......4..c..
#     0020: F5 3E 53 62 0F F8 C5 72   12 B1 91 25 03 D3 35 6A  .>Sb...r...%..5j
#     0030: 20 1B DE 43 D2 DB C6 F1   B1 FC DA 71 0A 09 72 20   ..C.......q..r
#     0040: EB CC 72 CB 85 21 4E 4D   DB FB 6D 8A EC C1 6F 8F  ..r..!NM..m...o.
#     0050: 9A BD 6D 74 4F AA 81 BF   C7 92 F5 42 6B 21 90 C7  ..mtO......Bk!..
#     0060: A3 08 0F C3 F9 40 A9 62   94 B5 FA 8E 25 48 1A D8  .....@.b....%H..
#     0070: AD 99 10 22 27 ED 7C DB   9A 26 84 B3 10 47 4B B7  ..."'....&...GK.
#     0080: 13 24 30 A6 64 DA 31 F2   EF 92 54 CA 81 F1 1C 33  .$0.d.1...T....3
#     0090: EE F9 7D 39 55 CF EF BA   40 43 4C C8 A7 A9 10 68  ...9U...@CL....h
#     00A0: 5A 7F BA 49 58 A6 10 6E   8C 52 AE 43 83 31 9D CC  Z..IX..n.R.C.1..
#     00B0: 25 84 DE 0C B3 76 A3 CF   95 D0 9D 8B D2 F0 C6 1A  %....v..........
#     00C0: 0A F8 80 05 6C AE 21 93   27 69 D4 F9 5E E6 01 5C  ....l.!.'i..^..\
#     00D0: 24 BC 1A 18 16 18 0D 77   75 B3 C9 75 E8 6D F5 F5  $......wu..u.m..
#     00E0: D2 3D 25 55 6F FB 18 AD   2B 40 4E F0 10 D4 E2 20  .=%Uo...+@N....
#     00F0: BE 1A 70 9A A2 4B DA C7   B9 8F BA C7 F4 47 FC EE  ..p..K.......G..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.270 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 41 50 D7 2E 72 AB 4E   B8 CB DF A9 1C AD 82 24  DAP..r.N.......$
#     0010: E2 41 10 3D 53 75 29 AF   30 12 F3 2F 69 F3 0E 7E  .A.=Su).0../i...
#     0020: 5A 5E 7E 5F 3F DC D7 D6   F7 49 D3 EA B8 1E 20 0D  Z^._?....I.... .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.270 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:35.328 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4E 12 B8 56 07 BA F7 97 A7 3C D9 A5 44 80 89 8C DD FE 8A FB A7 3B 20 39 75 C3 05 70 0D 3E B6 5C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-30 18:08:35.617 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-30 18:08:35.619 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-30 18:08:47.351; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:47.707 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 A9 A8 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:07:59.000 UTC",
#       "not  after"         : "2024-01-28 18:07:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#           0010: 08 BC 1B 30                                        ...0
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 D2 00 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 18:08:01.000 UTC",
#       "not  after"         : "2024-01-28 18:08:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 76 6E 12 C1 BF 24 75   F9 1A BB EF A0 18 99 C6  .vn...$u........
#           0010: 08 BC 1B 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 0D AE 24 36 1B 3E C6   12 BF A0 FD B6 5E 3F A5  ...$6.>......^?.
#           0010: 66 8B 32 84                                        f.2.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-30 18:08:47.722 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:47.813 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:47.814 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:47.814 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:08:47.814 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:47.955 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:47.957 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 18:08:47.958 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.963 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.974 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.974 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.975 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 18:08:47.977 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "88 15 4D 4B 02 80 CA 69 C6 DF 86 4D 59 C1 58 73 0A EC C5 A3 08 26 19 05 E9 4F C4 0E A0 37 09 B3",
#     "session id"          : "7D BD A8 3D 07 71 27 BF 07 91 CA 1A E0 75 D0 1D 37 65 E9 01 9B 7F 0F 93 B0 B0 C6 F7 18 84 4B 6D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D5 2A EE FB 4A 32 90 C6   73 F1 14 16 A4 5E 6A B9  .*..J2..s....^j.
#               0010: AD 37 10 09 F7 DE 1D 6A   88 93 7E D3 D7 FD BA 0F  .7.....j........
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.995 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "78 FD F3 48 75 37 1B 8E A7 A8 58 F6 20 25 46 BC 35 47 5B BF FB F2 A2 DC F6 B8 40 D9 2A 07 9F 65",
#     "session id"          : "7D BD A8 3D 07 71 27 BF 07 91 CA 1A E0 75 D0 1D 37 65 E9 01 9B 7F 0F 93 B0 B0 C6 F7 18 84 4B 6D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 99 A8 CE A6 90 DF C5   27 A0 64 DF 4B A0 6C 24  ........'.d.K.l$
#             0010: 72 FC 50 18 90 54 6F 0E   22 2C BF 7A 55 83 AA 60  r.P..To.",.zU..`
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.995 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.995 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.997 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.999 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:47.999 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:48.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:48.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.008 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.010 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.011 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:48.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:08:48.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 18:08:48.017 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 18:10:08.224 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:10:08.271 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:10:08.271 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:10:08.271 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 18:10:08.271 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35248/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28202ms
ok 65 stop command for single port in 31097ms
ok 66 status detects locally running solr in 14382ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2194ms
ok 69 copying files around in 6649ms
ok 70 upconfig in 2625ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1233ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 30s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m54s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5764 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5764/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44959/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-30 11:32:58.215; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 11:32:58.220; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-30 11:32:59.486; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-30 11:32:59.526; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22957ms
ok 61 start solr with client truststore and security manager in 25478ms
not ok 62 start solr with mTLS needed in 62104ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-gWjpHK/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44959.
#
# Started Solr server on port 44959 (pid=200259). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44960.
#
# Started Solr server on port 44960 (pid=200707). Happy searching!
#
# INFO  - 2023-10-30 11:34:23.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 11:34:23.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-30 11:34:23.960; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 11:34:23.963; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 11:34:23.964; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:23.998 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 26 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:59.000 UTC",
#     "not  after"         : "2024-01-28 11:33:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 4D 09 BC FF 09 AA BF   D7 26 6A 4D 1E BB B9 6B  .M.......&jM...k
#         0010: 06 33 29 26                                        .3)&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:24.003 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 7B ED 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:51.000 UTC",
#     "not  after"         : "2024-01-28 11:33:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:24.020 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:24.116 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:24.116 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:24.117 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:24.117 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:24.261 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.262 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:24.263 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:24.264 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.270 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.283 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.284 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.284 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:24.288 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4C 39 B6 9F 28 B4 63 B7 99 25 04 93 19 94 09 E1 A0 C8 D5 A6 D9 3D C4 EA CE B1 72 B9 03 A4 37 88",
#   "session id"          : "C5 1A 23 06 74 4E F1 E3 28 88 9B 21 6A 21 20 1E 23 19 E1 74 FB 8C 1C 82 50 FC B0 34 F8 5A F0 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7B D6 99 B9 D3 1D C6 10   90 C9 B4 5B 09 93 4F 1C  ...........[..O.
#             0010: 1C BF AB F8 7A DC 4E 78   71 B8 03 0B 33 E6 F1 39  ....z.Nxq...3..9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.415 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 E5 0A DA EA 94 A9 34 A3 52 CF 84 D2 B5 9B 4A 8F 8B E3 FB DB 05 5E C9 E7 44 70 C1 78 3E AA F1",
#   "session id"          : "C5 1A 23 06 74 4E F1 E3 28 88 9B 21 6A 21 20 1E 23 19 E1 74 FB 8C 1C 82 50 FC B0 34 F8 5A F0 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 A0 4C EE EF D4 12 CE   1F BB 2F 71 46 9A AD 12  ..L......./qF...
#           0010: FA C3 83 8D BD 93 B7 66   49 AE B5 BF 3A 85 E8 2F  .......fI...:../
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.416 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.416 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.417 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.419 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.419 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.421 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.422 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.431 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.432 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.434 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.438 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.438 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.438 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.438 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.438 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.441 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.441 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.441 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.442 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.442 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.443 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.446 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 BE 66 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:55.000 UTC",
#       "not  after"         : "2024-01-28 11:33:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CD 47 70 73 E3 61 34   0D 0E E0 E5 3D FF 2F CB  ..Gps.a4....=./.
#           0010: 04 D8 DE 90                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.446 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.528 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.531 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0C EA E3 F3 8A 05 AD F3   9A 58 0D 53 75 B8 77 68  .........X.Su.wh
#     0010: 79 4E B8 73 CB C5 40 5F   E3 C9 B0 B9 01 12 71 25  yN.s..@_......q%
#     0020: 8F C8 4E 1C 43 1E A0 63   DC 63 46 E7 22 45 C3 63  ..N.C..c.cF."E.c
#     0030: 46 2C 8B F8 E1 96 F6 90   C1 5F 62 1B BC DE 1E 65  F,......._b....e
#     0040: 57 9D 6F CF DA 24 FD AB   BF 1A 28 7F 77 1C 7D 09  W.o..$....(.w...
#     0050: F2 C9 59 44 38 82 26 22   D6 58 77 F1 5E 3F CE C3  ..YD8.&".Xw.^?..
#     0060: 84 E6 AE B7 D6 AA 4D A4   A3 AF CF EB 26 3E 57 CF  ......M.....&>W.
#     0070: D4 3C BF 5F D6 63 A1 E7   A6 5C 2D 7A BF 32 EB 1E  .<._.c...\-z.2..
#     0080: 65 73 EC AC 20 5E 61 89   E1 F9 28 6F A3 C4 3E 9C  es.. ^a...(o..>.
#     0090: 15 2E 36 F5 81 AC 5B E7   11 A2 59 89 8E 57 F4 F1  ..6...[...Y..W..
#     00A0: D7 BA F5 0B B9 54 29 C2   B8 5F 5D 26 36 86 D0 A0  .....T).._]&6...
#     00B0: 9A 50 A9 7B 4F 38 F2 F5   CF DD 3B 1C 9E BB 93 1A  .P..O8....;.....
#     00C0: FA F4 02 C3 7B D5 4F 88   16 72 7E AB 04 13 FD 1C  ......O..r......
#     00D0: 0D 4D 00 8A C8 36 61 CA   14 72 40 CE CA C5 EC 15  .M...6a..r@.....
#     00E0: 4D 0D 68 F7 11 29 5A 46   71 35 C2 6E 1C 01 F1 15  M.h..)ZFq5.n....
#     00F0: FF F7 BC 84 B8 9F 3E 54   A4 79 88 D5 90 AF 5F 45  ......>T.y...._E
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.533 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 66 C6 A9 C8 1F 6C A9 F9   EB 00 A5 12 2B 5A 23 55  f....l......+Z#U
#     0010: CE 61 2A DB 45 01 F1 53   2A 47 EA 2E DE 1A AC FF  .a*.E..S*G......
#     0020: 2F 92 36 54 8D 98 9F 72   04 3A 1F 11 19 52 4E 61  /.6T...r.:...RNa
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.536 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:24.537 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.537 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:24.538 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.538 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:24.538 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:24.538 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.539 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.541 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 3A 26 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:59.000 UTC",
#       "not  after"         : "2024-01-28 11:33:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 4D 09 BC FF 09 AA BF   D7 26 6A 4D 1E BB B9 6B  .M.......&jM...k
#           0010: 06 33 29 26                                        .3)&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C D2 6A 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:53.000 UTC",
#       "not  after"         : "2024-01-28 11:33:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#           0010: 7D 9A DF 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.568 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0B 04 5E E7 50 E6 6E 11   BD 4A 69 07 60 73 DF F9  ..^.P.n..Ji.`s..
#     0010: 7D D0 FB 4F 2C 1E 60 F6   FF 2B EA 1A 83 35 ED DE  ...O,.`..+...5..
#     0020: F3 C8 46 02 5A EB 1B A2   67 E2 7D E2 C0 9D CC DF  ..F.Z...g.......
#     0030: 4F 34 54 E6 63 CC 82 7F   D4 61 7C 4B FE 21 A6 9F  O4T.c....a.K.!..
#     0040: 57 75 DD 3E 6F EC 46 9D   95 41 89 1C F2 2F 6C 57  Wu.>o.F..A.../lW
#     0050: F8 CA A0 F8 2A F5 D2 EF   DF 77 6B 4E C7 16 17 B3  ....*....wkN....
#     0060: A5 F5 B3 CD F8 75 22 86   12 7F 5F AB A4 6A 42 B1  .....u"..._..jB.
#     0070: 32 A8 A5 97 13 2C 7C 75   FE FF 69 1C 7F 05 87 D8  2....,.u..i.....
#     0080: 7D E2 EF 97 6B 2D 18 5C   75 93 2E 27 4C BF F0 0E  ....k-.\u..'L...
#     0090: 19 17 15 9A F4 00 ED 79   A8 FE F9 C8 FE B3 1D 7F  .......y........
#     00A0: 9D 1E D4 4C C1 CD 85 25   51 8F 6D 45 FE E2 26 50  ...L...%Q.mE..&P
#     00B0: C0 14 4C ED 5A 9D E9 72   EB 76 FC CD B6 3A 19 55  ..L.Z..r.v...:.U
#     00C0: 16 23 CE 61 96 44 E0 44   A8 52 24 50 91 DB D9 F3  .#.a.D.D.R$P....
#     00D0: 36 81 3B C1 93 FC 40 43   56 CD 26 C9 44 39 53 9C  6.;...@CV.&.D9S.
#     00E0: B2 88 37 7D DA E6 CA AD   53 44 1E C0 22 A0 63 41  ..7.....SD..".cA
#     00F0: 73 80 B6 B1 ED 9E CC 8F   92 C8 AB 79 C5 76 A3 89  s..........y.v..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.569 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A3 C1 EE A1 24 95 CC D2   C0 1A E6 40 48 21 88 F7  ....$......@H!..
#     0010: 1B 97 10 69 9F CE 45 46   B6 C5 88 A5 47 A2 81 C5  ...i..EF....G...
#     0020: 55 BE D2 DF 7E B5 DE 8C   01 E5 3A 8D 4E 78 DE 00  U.........:.Nx..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.570 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:24.630 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "39 C6 9D 42 17 EB 60 2F 19 71 77 80 74 C0 28 8A 7A 4F A7 77 F6 7A 42 AA 96 9B E8 DC 94 AF E3 6F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-30 11:34:24.994 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-30 11:34:24.996 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-30 11:34:25.969; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-30 11:34:25.975; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-30 11:34:26.364; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 11:34:26.367; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-30 11:34:26.367; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-gWjpHK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:26.400 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 26 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:59.000 UTC",
#     "not  after"         : "2024-01-28 11:33:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 4D 09 BC FF 09 AA BF   D7 26 6A 4D 1E BB B9 6B  .M.......&jM...k
#         0010: 06 33 29 26                                        .3)&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:26.405 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 7B ED 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:51.000 UTC",
#     "not  after"         : "2024-01-28 11:33:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:26.420 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:26.515 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:26.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:26.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:26.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:26.665 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.666 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:26.668 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:26.668 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.674 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.686 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.686 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.687 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:26.689 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "10 FE E9 60 50 D1 59 E5 46 55 C1 DF 01 36 3F 37 89 36 C7 71 F6 DA 17 CC A6 8B 4C D7 DC 72 0D B6",
#   "session id"          : "70 83 35 4B 39 95 73 D7 6B 6A 66 6A 91 8D 1F 3D 18 1D 5D 69 CA 19 F4 01 3A 31 95 B8 3F 60 55 7A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 22 69 93 0A 3B 18 9F F2   3B FD 45 19 FA E3 01 A2  "i..;...;.E.....
#             0010: 71 87 46 1B 40 60 A4 54   84 69 15 D1 5F D8 F7 1C  q.F.@`.T.i.._...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.794 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "27 33 C8 64 4F A4 2A 5F 8E 9C AF 96 B6 5E 6E 5E 3F 8E 71 6E F0 8B 32 6E 21 27 68 F7 23 FE 6B AD",
#   "session id"          : "70 83 35 4B 39 95 73 D7 6B 6A 66 6A 91 8D 1F 3D 18 1D 5D 69 CA 19 F4 01 3A 31 95 B8 3F 60 55 7A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 96 CE 9F 82 63 64 17   2A 60 0E D5 8F D4 A8 9F  .....cd.*`......
#           0010: EA E9 FE 50 A8 57 4C 6D   D3 CB 65 2E 3B 54 C3 46  ...P.WLm..e.;T.F
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.795 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.795 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.797 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.800 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.810 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.812 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.813 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.817 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.817 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.818 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.820 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.820 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.821 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.821 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.822 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.822 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.822 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.825 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 BE 66 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:55.000 UTC",
#       "not  after"         : "2024-01-28 11:33:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F CD 47 70 73 E3 61 34   0D 0E E0 E5 3D FF 2F CB  ..Gps.a4....=./.
#           0010: 04 D8 DE 90                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.826 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.911 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C D2 6A 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-30 11:33:53.000 UTC",
#     "not  after"         : "2024-01-28 11:33:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#         0010: 7D 9A DF 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#         0010: A4 01 C7 E4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.915 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 80 84 0C 97 B0 6A EA   B2 35 F1 3C 40 F6 BD DE  Q.....j..5.<@...
#     0010: B2 62 70 9F F2 AF 0B 82   5B 4B 4B 68 24 08 14 4C  .bp.....[KKh$..L
#     0020: E6 F5 7D 7C F8 B3 46 9E   30 19 09 7B 64 5E 56 B9  ......F.0...d^V.
#     0030: 6A AC B5 02 68 E9 57 F0   4A 49 8C F8 19 E2 B5 AF  j...h.W.JI......
#     0040: B0 D1 EC E4 1E 6C 4C 67   0F E8 52 C5 B9 3A 62 D3  .....lLg..R..:b.
#     0050: 64 1F 3D 4A 8A 29 DA F2   DE 72 8E 98 34 AA 5E 6C  d.=J.)...r..4.^l
#     0060: AD 3D 8A 44 D8 78 D0 9D   F2 D4 BA 00 85 CC 33 89  .=.D.x........3.
#     0070: 61 24 71 42 97 E3 B9 C8   B5 8E C8 FF DD 4A 0E 46  a$qB.........J.F
#     0080: C7 16 E1 78 79 1F 17 FE   BC D7 15 19 6C 32 BB 96  ...xy.......l2..
#     0090: 01 DC BB EC 10 69 E9 E7   75 21 FB 3B 8D 9E 00 2F  .....i..u!.;.../
#     00A0: D1 26 0F AE 59 22 42 6B   2E A6 FA 7D 94 94 3E 78  .&..Y"Bk......>x
#     00B0: 38 D7 05 F7 C6 AE 86 B0   A1 D6 58 1F 52 93 EA 58  8.........X.R..X
#     00C0: 13 D5 41 A2 73 D9 9B 48   0E 63 10 5F 8A 0F 38 47  ..A.s..H.c._..8G
#     00D0: 56 F3 67 C3 2C A8 2E 09   53 CB 1E 31 7D E6 B1 8B  V.g.,...S..1....
#     00E0: 0D CE 01 F0 D8 D8 15 68   41 07 A6 84 91 9A A0 CA  .......hA.......
#     00F0: 61 60 73 C3 83 13 C2 D5   67 C2 2C 52 EC 85 86 32  a`s.....g.,R...2
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.917 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2F C0 B8 F8 A3 8A 18 29   F4 83 F8 CC A7 64 9F CB  /......).....d..
#     0010: 9F 49 E2 8B 7C 4F AD CE   45 6F 3C B0 AA 21 59 0F  .I...O..Eo<..!Y.
#     0020: E7 57 7C 22 5E 33 85 21   33 A6 B9 7F 4B 94 35 D0  .W."^3.!3...K.5.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.919 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:26.920 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.921 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:26.921 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.921 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-30 11:34:26.921 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:26.921 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.922 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.924 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 3A 26 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:59.000 UTC",
#       "not  after"         : "2024-01-28 11:33:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 4D 09 BC FF 09 AA BF   D7 26 6A 4D 1E BB B9 6B  .M.......&jM...k
#           0010: 06 33 29 26                                        .3)&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C D2 6A 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:53.000 UTC",
#       "not  after"         : "2024-01-28 11:33:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#           0010: 7D 9A DF 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.951 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 16 BC A8 66 04 CE F8   24 87 1F 47 48 E7 99 9D  $...f...$..GH...
#     0010: AE DC 28 AB 92 E2 EE 27   2D 5B 09 64 1E AC C5 10  ..(....'-[.d....
#     0020: 29 31 54 F5 9C DB C2 F3   21 90 46 06 64 0C F3 3F  )1T.....!.F.d..?
#     0030: 3B B7 10 60 73 7B EF 2E   F1 76 F2 34 DB D9 DC 2B  ;..`s....v.4...+
#     0040: 2D E9 E5 60 DD B1 33 62   06 2B 98 22 C3 C7 B3 BB  -..`..3b.+."....
#     0050: 9B C6 AF 49 83 41 25 19   1E A9 76 6D 4F A1 08 37  ...I.A%...vmO..7
#     0060: 23 71 E5 81 F3 A9 5F C9   DC D2 23 38 54 62 E1 21  #q...._...#8Tb.!
#     0070: AC 2C 04 5F FD 55 19 CA   8B 7B F6 0E BB A3 32 EE  .,._.U........2.
#     0080: 93 E6 3E C4 D6 36 36 80   CE F4 3C 43 EC A8 64 9B  ..>..66...<C..d.
#     0090: 15 D1 E9 7A 6F A4 70 2A   58 F8 1B 66 EF 3E 1B 45  ...zo.p*X..f.>.E
#     00A0: 6A EF B8 E8 6D 9B A1 EA   30 32 F0 13 CE E8 19 2B  j...m...02.....+
#     00B0: D2 BC 1F 77 8E EE E4 48   8C 74 D3 67 C9 9C D4 96  ...w...H.t.g....
#     00C0: E9 97 B4 53 ED 02 8F 90   CB B4 F8 2B 59 FC 2C 71  ...S.......+Y.,q
#     00D0: B5 6F 8D 94 3D E8 43 CD   A3 B3 98 9F 3E 12 C4 82  .o..=.C.....>...
#     00E0: 53 5D DF CB D0 00 A0 AA   9F 12 52 D9 39 91 C1 99  S]........R.9...
#     00F0: 8D 9D CB 1F 58 0C 34 AB   5A C2 CE 0A 45 EA 5D 3E  ....X.4.Z...E.]>
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.953 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6A BE 25 7F D6 D8 41 DA   A8 1E A2 BC CD D4 50 82  j.%...A.......P.
#     0010: 0C 2D 23 A0 7F 46 1F 0B   8E 85 DF 50 3D A0 F5 73  .-#..F.....P=..s
#     0020: AA D1 76 D7 B4 BA 8E 82   75 41 C7 9E DC 7E 4F 15  ..v.....uA....O.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:26.954 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:27.012 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "90 B1 9A 0E 42 53 C2 2F BB DD 46 22 06 30 4C FF E5 98 DA E5 37 18 43 A1 32 CC FC DB 4F 00 EC 22",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-30 11:34:27.321 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-30 11:34:27.323 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-30 11:34:39.245; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:39.586 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C D2 6A 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:53.000 UTC",
#       "not  after"         : "2024-01-28 11:33:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#           0010: 7D 9A DF 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 DE 7C 84 8B D8 AD 4F   7A 0D 2E 62 9E ED D6 FD  .......Oz..b....
#           0010: A4 01 C7 E4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 7B ED 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-30 11:33:51.000 UTC",
#       "not  after"         : "2024-01-28 11:33:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D AB 87 6D 57 C1 F2 0A   A1 3F EF 66 13 49 D9 74  ...mW....?.f.I.t
#           0010: 7D 9A DF 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-30 11:34:39.602 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:39.704 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:39.705 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:39.705 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:34:39.705 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:39.855 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:39.858 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-30 11:34:39.858 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.863 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.876 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.876 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.876 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-30 11:34:39.878 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A4 BE 58 FD 40 2A F7 6B 65 A0 72 5C 08 72 D8 0C A0 D4 78 CD F0 DB 94 BF 10 78 C5 3C 39 4F EC 65",
#     "session id"          : "D4 5F 37 42 C6 04 CA 56 F4 06 E9 1A 15 BC 9D FC 31 C9 D3 1F 1B 8F 0F 9F B5 DD B3 86 DB 19 85 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DD CC 48 B0 A6 85 AD 88   45 F5 CA BD 39 E8 B9 F9  ..H.....E...9...
#               0010: 2B 70 C4 CA DA 6B 4B 95   F9 AC 6B 94 54 08 A5 7D  +p...kK...k.T...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.905 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1A 5F 1C 7A 6F FD 30 FD 54 01 F2 E5 79 0F 4F 3D 14 59 6A 54 76 AF 46 B6 87 DC 47 89 0A 9E DB E1",
#     "session id"          : "D4 5F 37 42 C6 04 CA 56 F4 06 E9 1A 15 BC 9D FC 31 C9 D3 1F 1B 8F 0F 9F B5 DD B3 86 DB 19 85 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8D 24 2B EC 1B 02 D0 F0   C0 0C F4 4A BC 8D 02 EE  .$+........J....
#             0010: 70 4A 52 68 85 45 31 E8   D2 4F 31 F3 4D BD 0D 22  pJRh.E1..O1.M.."
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.906 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.906 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.907 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.907 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.907 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.908 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.908 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.908 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.908 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.908 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.911 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.911 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.911 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:39.912 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:39.913 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.913 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.913 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.920 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.922 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.923 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.927 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.927 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.927 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:34:39.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-30 11:34:39.930 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-30 11:36:03.302 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:36:03.344 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:36:03.345 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:36:03.345 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-30 11:36:03.345 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44960/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28324ms
ok 65 stop command for single port in 31208ms
ok 66 status detects locally running solr in 14778ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2235ms
ok 69 copying files around in 6781ms
ok 70 upconfig in 2713ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1248ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 23s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m46s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5763 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5763/

4 tests failed.
FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server

Error Message:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>

Stack Trace:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>
	at __randomizedtesting.SeedInfo.seed([7EB94E43C0966DFA:F9B9AF13A52A9116]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:136)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 23 object(s) that were not released!!! [SolrZkClient, SolrZkClient, ZkController, ZKServerMain, ZkStateReader, ZkStateReader, Thread, Http2SolrClient, SolrZkClient, InternalHttpClient, InternalHttpClient, ZkController, InternalHttpClient, Http2SolrClient, Http2SolrClient, Http2SolrClient, SolrZkClient, SolrZkClient, InternalHttpClient, InternalHttpClient, ZkTestServer, Overseer, ZkStateReader]
org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:386)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkTestServer.init(ZkTestServer.java:469)
	at org.apache.solr.cloud.ZkTestServer.run(ZkTestServer.java:602)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:345)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.ZkController:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkController
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:415)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.ZkTestServer$ZKServerMain:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer$ZKServerMain
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer$ZKServerMain.runFromConfig(ZkTestServer.java:308)
	at org.apache.solr.cloud.ZkTestServer$1.run(ZkTestServer.java:568)

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:402)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:395)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:431)
	at org.apache.solr.client.solrj.impl.ZkClientClusterStateProvider.getZkStateReader(ZkClientClusterStateProvider.java:215)
	at org.apache.solr.common.cloud.ZkStateReader.from(ZkStateReader.java:224)
	at org.apache.solr.cloud.MiniSolrCloudCluster.getZkStateReader(MiniSolrCloudCluster.java:485)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForNode(MiniSolrCloudCluster.java:445)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForAllNodes(MiniSolrCloudCluster.java:425)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:397)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.ZkTestServer$1:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer$1
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer.run(ZkTestServer.java:576)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:345)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:203)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1100)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:152)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:427)
	at org.apache.solr.client.solrj.impl.ZkClientClusterStateProvider.getZkStateReader(ZkClientClusterStateProvider.java:215)
	at org.apache.solr.common.cloud.ZkStateReader.from(ZkStateReader.java:224)
	at org.apache.solr.cloud.MiniSolrCloudCluster.getZkStateReader(MiniSolrCloudCluster.java:485)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForNode(MiniSolrCloudCluster.java:445)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForAllNodes(MiniSolrCloudCluster.java:425)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:397)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:137)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:134)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.ZkController:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkController
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:415)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:134)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:203)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1100)
	at org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:288)
	at org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:55)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:802)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com

[...truncated too long message...]

tractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
        at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  46) Thread[id=516, name=h2sc-283-thread-2, state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
        at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
        at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
        at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$334/0x000000084049e440.run(Unknown Source)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$274/0x000000084042f440.run(Unknown Source)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  47) Thread[id=515, name=h2sc-283-thread-1, state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
        at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
        at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
        at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$334/0x000000084049e440.run(Unknown Source)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$274/0x000000084042f440.run(Unknown Source)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  48) Thread[id=465, name=TEST-JWTAuthPluginIntegrationTest.mockOAuth2Server-seed#[7EB94E43C0966DFA]-SendThread(127.0.0.1:42255), state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.IOUtil.drain(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.clearInterrupt(EPollSelectorImpl.java:266)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.processEvents(EPollSelectorImpl.java:203)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:137)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:136)
        at app//org.apache.zookeeper.ClientCnxnSocketNIO.doTransport(ClientCnxnSocketNIO.java:332)
        at app//org.apache.zookeeper.ClientCnxn$SendThread.run(ClientCnxn.java:1274)
  49) Thread[id=493, name=qtp1132574641-493, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  50) Thread[id=526, name=CloserThread, state=WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/java.lang.Object.wait(Native Method)
        at java.base@11.0.16/java.lang.Object.wait(Object.java:328)
        at app//org.apache.solr.core.CloserThread.run(CoreContainer.java:2605)
	at __randomizedtesting.SeedInfo.seed([7EB94E43C0966DFA]:0)




Build Log:
[...truncated 11215 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7EB94E43C0966DFA -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7EB94E43C0966DFA -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7EB94E43C0966DFA -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7EB94E43C0966DFA -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:jwt-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 5m 33s
630 actionable tasks: 613 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 5m56.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5762 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5762/

All tests passed

Build Log:
[...truncated 1317 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43201/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 22:40:15.128; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 22:40:15.133; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 22:40:16.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-29 22:40:16.058; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22487ms
ok 61 start solr with client truststore and security manager in 25258ms
not ok 62 start solr with mTLS needed in 58868ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-4oQLhd/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43201.
#
# Started Solr server on port 43201 (pid=200193). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43202.
#
# Started Solr server on port 43202 (pid=200641). Happy searching!
#
# INFO  - 2023-10-29 22:41:39.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 22:41:39.064; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 22:41:39.449; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 22:41:39.452; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 22:41:39.452; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:39.485 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 39 BF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:15.000 UTC",
#     "not  after"         : "2024-01-27 22:41:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 96 66 A2 A5 E5 BF E1   9A 6C F6 99 8C BA 83 75  W.f......l.....u
#         0010: AC A0 31 26                                        ..1&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:39.490 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 20 F1 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:06.000 UTC",
#     "not  after"         : "2024-01-27 22:41:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:39.504 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:39.742 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.743 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:39.744 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:39.745 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.750 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.761 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.762 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:39.764 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "25 E2 6A 42 AB 63 94 3D 15 39 B2 48 A5 71 95 90 9C 86 25 83 DA FF 66 38 0A 23 94 BE F2 F5 11 55",
#   "session id"          : "2C 11 75 67 6D B3 89 E4 ED 05 62 38 00 FF 16 E6 55 5E 83 02 9D C4 44 E0 B4 9D 8D E7 73 81 57 65",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FE 84 B1 AA E6 CD 05 DD   03 8F 14 26 ED EE EC CB  ...........&....
#             0010: E6 FB 96 62 28 34 0D 3C   CC 31 F4 44 2F D4 3D 10  ...b(4.<.1.D/.=.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.872 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "17 32 A7 D6 76 FF 78 71 E9 B2 51 DA 3C 90 A1 AE AA A4 9F 01 91 71 83 A4 54 44 71 F9 6E 22 84 CB",
#   "session id"          : "2C 11 75 67 6D B3 89 E4 ED 05 62 38 00 FF 16 E6 55 5E 83 02 9D C4 44 E0 B4 9D 8D E7 73 81 57 65",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 63 6D 82 06 30 82 89 1E   34 EB 22 2D 3C FA A8 56  cm..0...4."-<..V
#           0010: 3B 08 55 55 FA 77 59 E7   0C FC 04 22 6E E2 F3 00  ;.UU.wY...."n...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.872 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.873 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.874 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.875 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.877 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.878 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.887 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.888 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.889 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.893 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.893 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.894 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.894 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.894 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.895 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.896 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.896 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.896 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.897 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.898 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.898 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.901 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 03 C0 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:11.000 UTC",
#       "not  after"         : "2024-01-27 22:41:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 4C 4A 86 7E 12 28 29   63 D6 00 48 0F DF 79 E7  .LJ...()c..H..y.
#           0010: 40 B6 6B 4F                                        @.kO
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.901 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:39.937 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:39.938 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:39.938 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:39.938 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.978 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.982 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 83 F3 51 B5 E8 5A F0   F0 6A 7B 23 0A 46 60 8E  ...Q..Z..j.#.F`.
#     0010: A6 2F 1A 80 75 EC 68 7E   14 DE 13 36 1F A0 93 E1  ./..u.h....6....
#     0020: 19 BB 98 9E FE DD A4 B9   DF 60 E6 B1 7B 21 DA CB  .........`...!..
#     0030: 89 84 71 19 70 50 9D B3   55 06 A6 17 BF 37 C1 E8  ..q.pP..U....7..
#     0040: 5A 28 E6 B7 D2 EB 28 BB   C3 AA D6 AD 61 DE 86 1E  Z(....(.....a...
#     0050: B7 3F B1 8D 80 23 06 AA   CC 88 F9 41 F6 9D E4 AB  .?...#.....A....
#     0060: 3E 9A 01 11 7F 14 19 CD   B3 7A FC 05 F4 9F 3C 35  >........z....<5
#     0070: 24 BF 06 43 51 B2 BE D0   80 43 6D 03 4D 55 17 56  $..CQ....Cm.MU.V
#     0080: 40 48 74 DB C6 63 52 B2   FB CB 1F 8A 89 57 3C 0A  @Ht..cR......W<.
#     0090: 27 2C 89 B2 FD 39 28 D4   95 5E 60 9D 84 EB ED 1A  ',...9(..^`.....
#     00A0: 18 73 81 0C AE 3A B1 06   7C 2F 6B 16 4F B9 B1 D0  .s...:.../k.O...
#     00B0: A5 38 99 AD 6F FC 89 B3   3E DD 69 B1 B0 ED 4F 08  .8..o...>.i...O.
#     00C0: AD 0C 02 66 28 2C DB F8   15 52 66 C2 0E 35 1E 7D  ...f(,...Rf..5..
#     00D0: DA B3 9E 38 B4 64 7B 03   19 DA 28 3E E3 15 15 6C  ...8.d....(>...l
#     00E0: C6 9C AE 49 15 5A 1E 71   DA 8B 73 91 95 B8 3B BE  ...I.Z.q..s...;.
#     00F0: 49 CC 15 B0 55 79 84 41   BB C0 79 0E E4 26 09 9D  I...Uy.A..y..&..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.984 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B DD 3B A4 DA F5 E6 D3   42 27 C2 61 63 78 0E 7F  ..;.....B'.acx..
#     0010: A0 0D 5A 7F 6A 34 27 82   8C F1 3B 01 43 BA 03 2F  ..Z.j4'...;.C../
#     0020: 5C 34 9D BF D7 CF 36 F9   92 D2 00 A2 22 EF 80 45  \4....6....."..E
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.986 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:39.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.988 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:39.988 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.988 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:39.988 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:39.988 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.989 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:39.991 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 39 BF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:15.000 UTC",
#       "not  after"         : "2024-01-27 22:41:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 96 66 A2 A5 E5 BF E1   9A 6C F6 99 8C BA 83 75  W.f......l.....u
#           0010: AC A0 31 26                                        ..1&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 49 C4 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:08.000 UTC",
#       "not  after"         : "2024-01-27 22:41:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#           0010: 1D 4C 45 BF                                        .LE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:40.017 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 5D 01 F7 53 A3 8C F4   EF E8 A2 17 E4 0D 51 AF  2]..S.........Q.
#     0010: 14 A1 83 25 32 4F D2 74   28 D2 A6 94 33 FF 98 34  ...%2O.t(...3..4
#     0020: 55 95 88 C9 F4 A8 7D EA   B6 3D 20 14 45 DF 5C 5F  U........= .E.\_
#     0030: 39 29 12 02 02 77 0E 98   35 9C D2 75 8D BB 62 C4  9)...w..5..u..b.
#     0040: 2A 53 4D 1E EC C2 CF 2C   95 B4 64 40 21 9D 92 2A  *SM....,..d@!..*
#     0050: FE CB EA 67 E3 A7 CA 59   4C A9 CA 28 7D E7 23 53  ...g...YL..(..#S
#     0060: 1C 1A EC 7D 6A 47 3E 88   60 3A 24 83 73 8C 17 5B  ....jG>.`:$.s..[
#     0070: AE A5 F1 A7 60 33 D8 19   0F 88 A7 EA 9A 55 C5 6E  ....`3.......U.n
#     0080: 8C C6 C5 A9 C9 06 E1 80   22 6D A4 88 2D 0A 2B 81  ........"m..-.+.
#     0090: 76 2C F9 45 51 CE 88 21   07 38 4A 55 AC 30 E5 5B  v,.EQ..!.8JU.0.[
#     00A0: FF 1B 71 D2 77 D5 DB 0A   18 4B AE 26 EA 74 9C 7D  ..q.w....K.&.t..
#     00B0: 86 FA 4D 51 8E 5E AE B5   59 7A 74 FB EF B7 F9 FA  ..MQ.^..Yzt.....
#     00C0: 8B 7F C3 40 7A E1 89 DB   5A AB B2 C5 98 86 37 79  ...@z...Z.....7y
#     00D0: 61 46 4C 9C BD B3 5A 17   95 94 9B 5A 06 5B 54 93  aFL...Z....Z.[T.
#     00E0: 4D B9 F8 CE 10 68 7B 89   99 93 EC 66 82 B2 0C 0B  M....h.....f....
#     00F0: 5A EF D9 AB 18 E0 7D 90   C6 0F C1 DD FC 1E FC 3D  Z..............=
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:40.018 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 35 83 29 E2 36 BD 9A 72   9B 57 75 4D BA 0C 40 D7  5.).6..r.WuM..@.
#     0010: 7D 0B 3D 51 1A 2D C2 11   03 AE 33 DE 48 9C C3 B1  ..=Q.-....3.H...
#     0020: 56 FC 13 98 F0 9F 82 D7   7A AB 30 8E 70 18 B3 A6  V.......z.0.p...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:40.018 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:40.073 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D1 A1 02 E6 F9 DA 99 29 5A 14 7A BF 68 FC B0 CA D1 6A 68 61 D2 F9 F5 40 8C A0 6D 72 A1 49 D4 37",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 22:41:40.343 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 22:41:40.344 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-29 22:41:41.277; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 22:41:41.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 22:41:41.659; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 22:41:41.661; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 22:41:41.662; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4oQLhd/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:41.694 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 39 BF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:15.000 UTC",
#     "not  after"         : "2024-01-27 22:41:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 96 66 A2 A5 E5 BF E1   9A 6C F6 99 8C BA 83 75  W.f......l.....u
#         0010: AC A0 31 26                                        ..1&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:41.698 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 20 F1 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:06.000 UTC",
#     "not  after"         : "2024-01-27 22:41:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:41.713 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:41.943 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.943 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:41.945 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:41.945 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.951 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.963 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.963 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.963 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:41.965 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F4 46 5A F1 F0 18 41 43 02 FB 01 20 61 99 BC 2C EA 78 B0 08 20 53 47 75 74 1C CE 96 E0 89 42 30",
#   "session id"          : "69 02 26 FC BD BF 28 67 0E 5F A6 F2 BB 95 B4 9A FC 1B DB 0A CC F1 2D 1E 5F 08 DF 80 5F 70 13 A9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 09 6C D6 CD AC 68 8E 47   60 BC E5 74 3A D3 4A 78  .l...h.G`..t:.Jx
#             0010: 0E 33 42 5C 70 E3 B2 88   FD F4 AE BC 83 76 0E 50  .3B\p........v.P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.065 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D1 8D 6D 55 8C 86 2E 6A 46 33 9B 8C 93 E4 41 65 A2 65 01 35 E8 74 14 B3 A1 50 C8 A6 A0 96 7E 67",
#   "session id"          : "69 02 26 FC BD BF 28 67 0E 5F A6 F2 BB 95 B4 9A FC 1B DB 0A CC F1 2D 1E 5F 08 DF 80 5F 70 13 A9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 34 16 06 29 54 A4 3F 83   32 B6 1B 5E 49 F8 44 75  4..)T.?.2..^I.Du
#           0010: 2C B6 10 57 4D D3 14 74   43 F3 8E 77 DD 0D 9F 4F  ,..WM..tC..w...O
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.066 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.068 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.071 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.071 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.083 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.085 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.086 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.089 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.090 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.090 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.090 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.092 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.092 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.093 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.093 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.094 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.095 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.095 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.098 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 03 C0 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:11.000 UTC",
#       "not  after"         : "2024-01-27 22:41:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 4C 4A 86 7E 12 28 29   63 D6 00 48 0F DF 79 E7  .LJ...()c..H..y.
#           0010: 40 B6 6B 4F                                        @.kO
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.098 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:42.152 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:42.152 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:42.153 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:42.154 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.196 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 49 C4 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 22:41:08.000 UTC",
#     "not  after"         : "2024-01-27 22:41:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#         0010: 1D 4C 45 BF                                        .LE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#         0010: CE 4C C1 7C                                        .L..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.200 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 8F 51 9A 03 07 D0 98   05 F2 ED 3F D2 C3 B9 C6  _.Q........?....
#     0010: 5F 7C 79 CA 93 38 4A 78   28 98 47 E0 9C A5 4C 3B  _.y..8Jx(.G...L;
#     0020: 33 A3 D8 D8 2B 08 A2 21   42 E1 E8 00 09 74 05 4F  3...+..!B....t.O
#     0030: 1D C9 B1 64 11 E6 C8 A2   4A B9 BB 1E 99 C1 EE 58  ...d....J......X
#     0040: 10 53 C4 7E 81 2F DD 2F   37 53 0B CC 57 24 69 03  .S..././7S..W$i.
#     0050: 57 4F D8 10 FA FF DA AE   09 6D 0A F2 03 66 17 73  WO.......m...f.s
#     0060: C9 77 EC BD 2D 80 C8 7F   59 79 1B EF 5F 7D 96 71  .w..-...Yy.._..q
#     0070: A4 C8 D5 3F F3 03 FB 08   74 17 85 9F FE 6F 25 E6  ...?....t....o%.
#     0080: 71 DA 1B E5 69 74 83 79   49 AE 8D 89 10 CD BA B0  q...it.yI.......
#     0090: 17 9D BF 38 D5 89 9A 69   D4 BD 63 42 D3 72 11 AA  ...8...i..cB.r..
#     00A0: 0A BB 37 C8 4F 95 D8 DA   F9 D1 7A A7 78 57 E4 65  ..7.O.....z.xW.e
#     00B0: 11 CF 94 54 C9 22 BE 39   F1 FD 29 B9 24 35 CC F4  ...T.".9..).$5..
#     00C0: 21 6E A3 69 47 EA D5 09   2A 04 7E 81 1A E5 42 53  !n.iG...*.....BS
#     00D0: 04 F3 EF 39 C2 C8 17 05   E3 DF 8B 9E 86 59 DB E0  ...9.........Y..
#     00E0: 11 46 CB 96 C6 FC 2A 8B   D3 E2 40 53 C9 81 D0 65  .F....*...@S...e
#     00F0: F9 0A 61 66 D1 A7 4D 81   2F 20 08 85 66 54 B2 04  ..af..M./ ..fT..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.202 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 BD BC 20 76 C2 83 89   37 A6 74 BD 4D F6 8E 1F  ".. v...7.t.M...
#     0010: B5 D9 85 C1 5C B6 6C A9   33 6E 7B 49 A5 04 63 29  ....\.l.3n.I..c)
#     0020: 95 E9 23 95 FE 01 F4 DE   28 EF 07 C0 DF CA D2 84  ..#.....(.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.205 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:42.205 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.206 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:42.206 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.206 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 22:41:42.207 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:42.207 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.208 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.210 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 39 BF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:15.000 UTC",
#       "not  after"         : "2024-01-27 22:41:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 96 66 A2 A5 E5 BF E1   9A 6C F6 99 8C BA 83 75  W.f......l.....u
#           0010: AC A0 31 26                                        ..1&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 49 C4 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:08.000 UTC",
#       "not  after"         : "2024-01-27 22:41:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#           0010: 1D 4C 45 BF                                        .LE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.236 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 3F 39 54 86 83 36 D1   DB 57 C7 2B 67 AB 84 3F  .?9T..6..W.+g..?
#     0010: DE 45 52 7C 9A 48 B5 5B   09 21 A6 2E 18 01 43 A7  .ER..H.[.!....C.
#     0020: 38 3E 3C D6 48 05 9E 91   C7 CA 3B 17 14 15 12 49  8><.H.....;....I
#     0030: E8 B5 60 29 8B D0 E7 89   A4 9C D4 3B 74 52 5D DE  ..`).......;tR].
#     0040: DA 89 27 82 FD 69 78 12   AE 9E 4B 0E 6E 19 20 8A  ..'..ix...K.n. .
#     0050: 09 05 0E A5 DA F8 A7 66   88 CE AE 9C BE DC D5 59  .......f.......Y
#     0060: 13 A7 C8 34 63 43 64 9A   7A 63 9E 55 8B FC 1C 5B  ...4cCd.zc.U...[
#     0070: D8 43 29 8F 6A 5C C1 C5   FE 6B DB 73 75 65 99 7B  .C).j\...k.sue..
#     0080: 1A 5F B2 DD 4C 50 27 96   3D 44 C7 49 6F 58 0E 8D  ._..LP'.=D.IoX..
#     0090: 35 E5 A2 0F AA 16 B8 36   9B 84 9E DD D2 24 3D E4  5......6.....$=.
#     00A0: B1 6C D5 4C 2E 29 DE CA   C1 E4 A8 C7 A4 58 68 A8  .l.L.).......Xh.
#     00B0: 4B 45 4C 8D 2A EC 52 98   60 44 BC D7 BF CE 8E 4E  KEL.*.R.`D.....N
#     00C0: 07 DB 09 B3 AA 1F FF B6   BB 3A E6 03 1B A5 3D 2F  .........:....=/
#     00D0: 1B D1 FB 4C 5B 01 54 5B   7E 8A 72 F1 46 90 E7 DB  ...L[.T[..r.F...
#     00E0: C3 33 B4 FF D8 1C 7F 03   77 87 1F C0 E4 54 BD 0B  .3......w....T..
#     00F0: 78 3B 1D 12 85 A8 14 4B   94 F4 5D CE 74 10 71 25  x;.....K..].t.q%
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.238 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 F6 74 F2 75 32 34 BE   74 EC F3 87 4E 2E C9 FD  ..t.u24.t...N...
#     0010: 21 E1 A3 68 3A 30 D4 8F   CE F3 ED E8 5B D0 ED B0  !..h:0......[...
#     0020: 23 CF 97 27 9F F7 DA 7F   B6 94 0E 38 ED 46 60 15  #..'.......8.F`.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.239 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:42.296 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B4 84 D5 A6 D6 31 6D 64 0A 29 0E 4C BA D2 C8 14 8B 1F 34 81 AD 44 A6 B3 72 D4 5C 7E 6B C4 D0 84",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 22:41:42.589 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 22:41:42.591 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-29 22:41:54.088; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:54.407 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 49 C4 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:08.000 UTC",
#       "not  after"         : "2024-01-27 22:41:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#           0010: 1D 4C 45 BF                                        .LE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 5C 3F FB 9F AC 49 88   65 4C 5C 8B A3 59 AF C2  Q\?...I.eL\..Y..
#           0010: CE 4C C1 7C                                        .L..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 20 F1 AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 22:41:06.000 UTC",
#       "not  after"         : "2024-01-27 22:41:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 3F AA A2 61 7A 31 0C   AE 79 AD F8 5B 60 F7 A0  .?..az1..y..[`..
#           0010: 1D 4C 45 BF                                        .LE.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 22:41:54.422 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:54.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:54.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:54.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:41:54.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:54.654 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:54.656 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 22:41:54.657 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.673 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.673 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.673 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 22:41:54.675 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "BD 8C 12 09 E1 01 5C 04 C2 46 BF FF 39 9D E0 10 4C 2F C2 2C 58 07 49 0D 9A 43 A3 F6 5B 12 23 FA",
#     "session id"          : "5F 4A E2 3D 39 80 2F AA 34 3E 43 CC 28 4B A9 76 E8 B8 01 35 2B AF C8 4E 59 45 6F 45 C8 24 79 C8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B1 77 0A D9 6D D3 A1 58   56 78 65 27 5B 3C EE 1C  .w..m..XVxe'[<..
#               0010: C2 4B 11 36 6B 1C 5D 13   CC A4 34 01 09 56 BE 6F  .K.6k.]...4..V.o
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.694 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "22 45 63 3A 48 28 CC BE 47 1A 42 00 C8 09 58 4F 6C C1 85 2F 35 DB 8E F9 E1 D6 AB 22 89 3A 7F 9C",
#     "session id"          : "5F 4A E2 3D 39 80 2F AA 34 3E 43 CC 28 4B A9 76 E8 B8 01 35 2B AF C8 4E 59 45 6F 45 C8 24 79 C8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 AA D3 24 5C 41 B5 33   D3 C0 42 3E CF D5 42 CF  ...$\A.3..B>..B.
#             0010: 68 F3 87 8A 12 DF F1 35   FC 5B EF AC D9 D4 D5 39  h......5.[.....9
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.695 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.695 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.697 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.699 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.699 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.699 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:54.700 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.707 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.709 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.710 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:54.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:41:54.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 22:41:54.716 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 22:43:15.084 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:43:15.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:43:15.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:43:15.134 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 22:43:15.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43202/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28421ms
ok 65 stop command for single port in 31079ms
ok 66 status detects locally running solr in 14335ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2156ms
ok 69 copying files around in 6529ms
ok 70 upconfig in 2642ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 35s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m58s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5761 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5761/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35383/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 17:21:34.256; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 17:21:34.261; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 17:21:35.175; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-29 17:21:35.217; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22879ms
ok 61 start solr with client truststore and security manager in 25361ms
not ok 62 start solr with mTLS needed in 59075ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-mRIwhM/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35383.
#
# Started Solr server on port 35383 (pid=199880). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35384.
#
# Started Solr server on port 35384 (pid=200334). Happy searching!
#
# INFO  - 2023-10-29 17:22:58.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 17:22:58.725; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 17:22:59.094; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 17:22:59.097; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 17:22:59.098; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:22:59.129 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 1C 65 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:34.000 UTC",
#     "not  after"         : "2024-01-27 17:22:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC 28 31 A1 F3 8D A9 8F   8F B9 84 B5 12 C5 5E FA  .(1...........^.
#         0010: 62 6A 25 E8                                        bj%.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:22:59.133 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 79 BA 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:26.000 UTC",
#     "not  after"         : "2024-01-27 17:22:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:22:59.148 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:22:59.368 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.368 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:22:59.370 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:22:59.370 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.375 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.387 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.387 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:22:59.389 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8B C1 ED 5C BD 98 D5 59 61 C2 E0 32 8F 5B 70 11 0C A7 61 34 64 73 AA 35 C6 F2 63 97 77 E0 1E 7E",
#   "session id"          : "EE 8E FE 2D 7B 22 DE D5 98 E9 8B 0D 5B 2C A8 47 21 0B 2B 83 C2 20 84 E5 64 CF CE 10 5C 51 2A DE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3F 1E 99 BE 26 3E ED 49   08 AF E6 34 C2 3B 79 7F  ?...&>.I...4.;y.
#             0010: 28 56 CF B7 DE B7 34 9B   32 05 DB 2A 52 7F 50 38  (V....4.2..*R.P8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.504 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "13 FB BD 99 08 39 4C 43 41 DA E4 72 63 07 6B 3D F9 DD 31 61 92 05 FA 39 BC 57 8C D1 B8 01 D0 CD",
#   "session id"          : "EE 8E FE 2D 7B 22 DE D5 98 E9 8B 0D 5B 2C A8 47 21 0B 2B 83 C2 20 84 E5 64 CF CE 10 5C 51 2A DE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 73 9B 5A A2 20 7E 89 97   8D 81 0B C7 44 02 94 B7  s.Z. .......D...
#           0010: 53 A9 DC DE 53 90 33 EA   20 5F B6 D6 6D 0F 33 35  S...S.3. _..m.35
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.504 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.504 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.506 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.509 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.518 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.520 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.521 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.525 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.525 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.525 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.527 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.528 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.528 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.528 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.529 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.530 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.530 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.533 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B FD AF B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:31.000 UTC",
#       "not  after"         : "2024-01-27 17:22:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 E8 C9 1C 1B 1E FE EA   74 7B 33 BD 1E CF 07 96  ........t.3.....
#           0010: EA CD E5 46                                        ...F
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.533 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:22:59.587 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:22:59.588 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:22:59.588 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:22:59.588 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.613 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.617 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2B 83 4E 2B 8A F7 2A 57   35 38 B3 39 5C 43 DA A7  +.N+..*W58.9\C..
#     0010: FF 70 4B E9 25 13 EE CD   34 22 72 03 11 83 99 BC  .pK.%...4"r.....
#     0020: 00 FB 1A C3 DE 30 16 21   1D 72 A2 A0 D2 FA 48 B2  .....0.!.r....H.
#     0030: A5 7D E3 4E 60 6D E8 FD   12 0E 1A 70 FD 11 01 16  ...N`m.....p....
#     0040: 17 0D 30 8C F8 73 EF 24   37 AC 87 B3 F3 E0 77 C5  ..0..s.$7.....w.
#     0050: 70 50 A2 1E 3C C4 7E 66   1F 7B 86 69 04 22 0D 1E  pP..<..f...i."..
#     0060: 5E 9D 91 03 45 5D 63 D1   3E 07 BE C1 51 76 46 D1  ^...E]c.>...QvF.
#     0070: 24 51 88 32 9B E2 7C F6   0F 46 FB 3B 20 1A A4 94  $Q.2.....F.; ...
#     0080: 32 54 6F 94 5E 1A 11 E2   E2 88 92 96 E1 EA 07 3D  2To.^..........=
#     0090: 7E 45 E9 D3 6F EC 25 F5   34 3E 21 FE 80 5E E6 FD  .E..o.%.4>!..^..
#     00A0: 62 83 20 D2 74 42 A9 4D   BE 31 42 72 9F 79 11 60  b. .tB.M.1Br.y.`
#     00B0: 04 84 6C 10 C3 64 70 AB   68 DA 75 E7 05 74 B6 92  ..l..dp.h.u..t..
#     00C0: FE FC 4D 91 04 70 BE C8   E0 DD A7 D6 33 DB 9A 24  ..M..p......3..$
#     00D0: BF 94 9B 71 37 E9 D8 3E   55 49 2A 3E 64 17 F0 44  ...q7..>UI*>d..D
#     00E0: 96 56 12 38 8F 59 1C 02   16 BA AD F0 74 8B E7 BC  .V.8.Y......t...
#     00F0: 7E 07 12 A6 86 4C D3 0D   F1 E2 82 8C 28 EC 96 36  .....L......(..6
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.619 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A8 C8 A1 51 95 0C 7A BF   F6 EA BA A5 27 56 75 5B  ...Q..z.....'Vu[
#     0010: 5C 58 77 7A 5C 6C D4 6A   52 2E 68 B6 38 BB 6F AB  \Xwz\l.jR.h.8.o.
#     0020: 5A A5 8F 20 62 BB BE 55   5D 2A 2B 21 16 C0 B0 AC  Z.. b..U]*+!....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.621 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:22:59.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:22:59.623 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.623 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:22:59.623 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:22:59.623 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.624 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.626 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 1C 65 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:34.000 UTC",
#       "not  after"         : "2024-01-27 17:22:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 28 31 A1 F3 8D A9 8F   8F B9 84 B5 12 C5 5E FA  .(1...........^.
#           0010: 62 6A 25 E8                                        bj%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 78 A2 CB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:28.000 UTC",
#       "not  after"         : "2024-01-27 17:22:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#           0010: 1A 98 7E 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.652 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 57 D3 CC B8 C2 A2 50   41 0E D8 1E 53 FB 97 27  "W.....PA...S..'
#     0010: 25 9C 46 98 3B 83 60 D3   C6 DB 55 28 37 E9 22 56  %.F.;.`...U(7."V
#     0020: A9 F6 A3 FA 26 A7 C7 C8   7B A4 0E 92 E9 CD CD 07  ....&...........
#     0030: 75 DB 03 30 E2 18 4B 84   83 97 35 8A 0F C2 78 73  u..0..K...5...xs
#     0040: 54 BE BF A2 84 2B 58 C7   D7 8B 61 58 24 CA ED 23  T....+X...aX$..#
#     0050: 01 92 4F 88 CE 2D 5B 21   65 EA ED B3 19 34 95 27  ..O..-[!e....4.'
#     0060: 0A E4 65 3F 42 A1 01 11   43 6B 18 06 F7 D3 DE 9E  ..e?B...Ck......
#     0070: 76 09 3A A8 56 3E FF A3   FF CE 5A EA EE 56 86 92  v.:.V>....Z..V..
#     0080: F2 6E 9F 01 E7 30 02 B5   6F 33 24 03 52 FD 62 D6  .n...0..o3$.R.b.
#     0090: C5 A7 EC 19 8B 95 2E 2E   D6 2C 99 13 7A F5 6A 91  .........,..z.j.
#     00A0: A5 12 AF C1 F2 F4 40 C8   CC D7 A1 D4 BF 71 87 73  ......@......q.s
#     00B0: BF 01 FA 28 CC 88 36 A4   DD 41 B6 BF 85 1E 97 61  ...(..6..A.....a
#     00C0: 96 75 76 A2 6B 3B 89 36   F0 62 D9 5C 06 0B AD 68  .uv.k;.6.b.\...h
#     00D0: 28 53 A8 2A E9 30 26 6E   79 AD 3C 0B C9 E7 C4 31  (S.*.0&ny.<....1
#     00E0: 4F 6C 3E 25 9F 45 39 D6   3C 16 A2 99 67 ED 39 EF  Ol>%.E9.<...g.9.
#     00F0: 3D 5A D4 79 7C 46 E1 75   A5 A3 2C F5 3D 26 68 6F  =Z.y.F.u..,.=&ho
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.653 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4B 30 7C C8 29 79 B3 1C   F9 42 DD AA 53 EC BE 4A  K0..)y...B..S..J
#     0010: D8 5C F3 D4 AF 98 22 75   B2 FD AE 6F 1A D9 AD 2A  .\...."u...o...*
#     0020: 7F A7 88 FF 26 61 47 C0   2C F5 F7 EA 09 D2 15 00  ....&aG.,.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.654 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:22:59.710 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 2E 8A 0B 1F E7 AA 3D 81 02 44 95 13 08 C3 39 17 CB AB EC C8 BA 0D 7A 2A 1A 03 4E E2 81 95 2D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 17:23:00.007 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 17:23:00.008 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-29 17:23:00.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 17:23:00.971; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 17:23:01.356; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 17:23:01.359; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 17:23:01.359; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mRIwhM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:23:01.390 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 1C 65 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:34.000 UTC",
#     "not  after"         : "2024-01-27 17:22:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC 28 31 A1 F3 8D A9 8F   8F B9 84 B5 12 C5 5E FA  .(1...........^.
#         0010: 62 6A 25 E8                                        bj%.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:23:01.395 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 79 BA 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:26.000 UTC",
#     "not  after"         : "2024-01-27 17:22:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 17:23:01.409 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:01.634 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:01.636 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:01.636 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.655 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:01.658 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "18 F2 66 C0 88 16 92 BB C8 05 BC DE 32 56 77 B6 12 AC 8D 00 B9 DB 14 51 9B 87 C4 66 09 EA 71 C9",
#   "session id"          : "CA 61 37 56 DA C1 62 6C B9 5E 32 AB CD 1D D0 C3 ED 71 E9 F9 48 C5 44 B8 2B 55 1F E1 9B B7 B8 08",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BE D5 5B 09 AF 56 A7 0F   A6 DC F5 72 6A 43 88 0E  ..[..V.....rjC..
#             0010: E1 3F BE 67 CB A3 F2 BE   32 81 E9 8D CB 3F A7 7E  .?.g....2....?..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.754 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA 7C 0A 0F 2D 20 66 28 7B 29 D6 87 B5 64 D5 18 E1 C4 81 6E 24 6E 6D F7 AD EA 97 B4 8F 57 CB 19",
#   "session id"          : "CA 61 37 56 DA C1 62 6C B9 5E 32 AB CD 1D D0 C3 ED 71 E9 F9 48 C5 44 B8 2B 55 1F E1 9B B7 B8 08",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 92 A5 33 6F 52 41 10 E8   7E FF 59 AA 2F F0 9E 4E  ..3oRA....Y./..N
#           0010: AC E5 C0 99 D6 C2 7F 79   98 B7 1A 01 FF AF EC 69  .......y.......i
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.754 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.755 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.757 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.760 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.760 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.763 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.763 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.763 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.763 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.773 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.775 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.776 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.779 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.781 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.781 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.782 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.782 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.783 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.783 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.784 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.784 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.785 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.788 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B FD AF B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:31.000 UTC",
#       "not  after"         : "2024-01-27 17:22:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 E8 C9 1C 1B 1E FE EA   74 7B 33 BD 1E CF 07 96  ........t.3.....
#           0010: EA CD E5 46                                        ...F
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.788 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:01.843 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:01.844 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:01.844 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:01.844 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.884 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 78 A2 CB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 17:22:28.000 UTC",
#     "not  after"         : "2024-01-27 17:22:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#         0010: 1A 98 7E 21                                        ...!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#         0010: 09 49 D8 F0                                        .I..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.888 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 FB BA 58 9D D3 9A 37   8B 9E A2 F5 4E 0F 10 3A  (..X...7....N..:
#     0010: CD 6B 0D 59 E6 04 7D 61   B5 96 0C C7 3D 49 C4 4E  .k.Y...a....=I.N
#     0020: 9A 19 D5 82 6D 2E 71 96   58 41 03 F8 B6 12 D6 04  ....m.q.XA......
#     0030: 73 78 CB 15 ED BD BC A1   6B A7 BA 32 AB 92 F9 43  sx......k..2...C
#     0040: FA 26 86 53 FA 07 0D 2D   24 54 A8 FC A8 34 36 4B  .&.S...-$T...46K
#     0050: E4 1E 44 19 F3 E0 5C 25   8B 3F EC EA 1D 6F BC 55  ..D...\%.?...o.U
#     0060: 35 17 75 F5 AE 1B DB C6   35 E7 3F 98 36 AF 2D 0E  5.u.....5.?.6.-.
#     0070: 20 3B EE 01 8C 92 AF 8C   5C A8 6A BD 66 FA 73 04   ;......\.j.f.s.
#     0080: DA F2 BD 64 4E 4F B4 34   16 87 FD 34 BE F3 AD AD  ...dNO.4...4....
#     0090: 10 A5 75 B2 B8 00 EA A9   60 81 99 4E DC 18 C7 3A  ..u.....`..N...:
#     00A0: C7 F7 BE EF 0C D0 D1 0B   40 1C 05 24 EF 06 35 06  ........@..$..5.
#     00B0: F3 60 B3 E3 98 3A 46 A4   AF 77 F8 81 45 13 92 8B  .`...:F..w..E...
#     00C0: DF D1 C8 5C E1 A7 01 7B   AE F1 4F 52 C5 A0 28 FC  ...\......OR..(.
#     00D0: 08 CD F0 DA 88 69 D4 F4   EC 4D DA 3D A5 CA A5 2B  .....i...M.=...+
#     00E0: 5F FD 00 4A 02 03 B7 BB   B2 72 CC C4 E0 09 D2 BF  _..J.....r......
#     00F0: 3C 74 5E F7 3E 4D A6 C3   3A 3F 3E 15 69 A9 71 A9  <t^.>M..:?>.i.q.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.890 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 D7 D9 FE D0 EF 4A 00   04 10 A9 E2 9C 06 8E 76  A.....J........v
#     0010: BF F7 01 E0 20 E1 9C 1A   35 EA B0 AC 90 E5 D0 DA  .... ...5.......
#     0020: 72 54 30 32 DD 97 9C 92   78 79 CE D5 62 32 C9 9D  rT02....xy..b2..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.893 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:23:01.894 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.894 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:23:01.894 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.894 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 17:23:01.895 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:01.895 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.896 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.898 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 1C 65 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:34.000 UTC",
#       "not  after"         : "2024-01-27 17:22:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 28 31 A1 F3 8D A9 8F   8F B9 84 B5 12 C5 5E FA  .(1...........^.
#           0010: 62 6A 25 E8                                        bj%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 78 A2 CB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:28.000 UTC",
#       "not  after"         : "2024-01-27 17:22:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#           0010: 1A 98 7E 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.926 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 CD 49 99 D3 BB F1 F9   B1 16 5B 8B 77 4A 73 51  ".I.......[.wJsQ
#     0010: FF A0 95 65 C3 02 B3 EF   23 CB 47 16 E2 0A 76 3C  ...e....#.G...v<
#     0020: C5 7D AF 4A 41 94 9B 49   95 0C DF 0A A4 FF CD E3  ...JA..I........
#     0030: 26 E2 3E F2 32 C1 43 E4   88 B3 D5 01 F1 2E 35 78  &.>.2.C.......5x
#     0040: F6 62 26 65 09 66 B8 34   E5 0C 91 8E 8C 36 CB 10  .b&e.f.4.....6..
#     0050: 3C 6D AB FC 86 80 68 85   B5 A2 4B 7F 59 EB A3 40  <m....h...K.Y..@
#     0060: E6 AB D0 5E 83 52 64 5E   87 4A CF FF 7C 59 64 7E  ...^.Rd^.J...Yd.
#     0070: 6F D1 C7 3E 41 CC C7 62   87 0E DA 00 E0 FF 2F 2F  o..>A..b......//
#     0080: 67 87 94 AE 77 D7 B9 50   53 89 D9 46 A9 13 67 F0  g...w..PS..F..g.
#     0090: 86 CB 7C A3 5F 45 6B 3B   B0 96 9D 08 AE 11 B5 CE  ...._Ek;........
#     00A0: 69 33 34 F2 15 8F 63 42   6B 9A 76 97 36 FD 70 D8  i34...cBk.v.6.p.
#     00B0: B2 28 1C B9 C9 E7 66 A9   8C D3 9F FE F3 0B 96 B8  .(....f.........
#     00C0: E9 D8 7D D3 BC 74 86 6D   DD C9 3A 1D E0 43 E6 B0  .....t.m..:..C..
#     00D0: C8 16 61 A1 8D E8 EF E6   5A CE BE 1B A5 10 A6 05  ..a.....Z.......
#     00E0: DB B1 6F 1C D9 B8 8F B2   CC 25 7F 11 3A DD F6 63  ..o......%..:..c
#     00F0: A4 68 4A 55 38 53 B6 0E   85 A5 8B 49 17 3C 45 90  .hJU8S.....I.<E.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.927 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD 5F 04 E8 E9 58 5D C5   3B 18 A2 96 F8 76 F3 4D  ._...X].;....v.M
#     0010: 34 78 A6 52 08 7C 01 21   1B 1C EE 17 D9 08 5F 4E  4x.R...!......_N
#     0020: 80 2B 1A 1C 63 5A C5 23   2F 01 1A 44 3F AB AA 91  .+..cZ.#/..D?...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.928 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:01.983 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0F 2B CB 31 67 3E 41 3C F6 6D 1C 31 01 81 E8 61 88 03 27 CC 69 DB 9A 01 F5 AD A0 11 96 02 3A BE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 17:23:02.276 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 17:23:02.277 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-29 17:23:13.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 17:23:13.909 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 79 BA 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:26.000 UTC",
#       "not  after"         : "2024-01-27 17:22:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#           0010: 1A 98 7E 21                                        ...!
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 78 A2 CB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 17:22:28.000 UTC",
#       "not  after"         : "2024-01-27 17:22:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 44 38 8B 34 81 8A A1   7D 66 88 E9 BC 2F 42 87  YD8.4....f.../B.
#           0010: 1A 98 7E 21                                        ...!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2C 21 2F D5 B4 0B 3C   88 8D 90 2D 21 42 32 10  5,!/...<...-!B2.
#           0010: 09 49 D8 F0                                        .I..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 17:23:13.924 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:14.016 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:14.016 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:14.016 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:23:14.017 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:14.161 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.161 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:14.163 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 17:23:14.163 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.168 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.179 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.180 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 17:23:14.182 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F6 A0 92 3D 13 E7 F6 A3 A2 74 BC F5 46 1F 79 29 E2 9C FC 4D B9 FA 59 48 BA 6C 40 13 89 C4 1C 27",
#     "session id"          : "A4 4D 3B 81 65 A6 F3 95 15 FB BF 24 08 51 F8 F9 0E 1C 87 A3 3C 58 5B 75 09 1B 4E 9B 8D C9 EE 49",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A8 84 AA 12 8A 30 65 8F   0C FF 00 AA E9 A0 37 55  .....0e.......7U
#               0010: CB 35 22 36 A0 38 9C A4   2C C4 F4 A1 77 E3 E2 7C  .5"6.8..,...w...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.203 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "6E DE 74 8E 93 C1 E2 67 8A B6 94 D4 FD BD 4C BC E6 0A F1 26 70 75 30 D9 C5 32 44 5A 81 9E 26 FF",
#     "session id"          : "A4 4D 3B 81 65 A6 F3 95 15 FB BF 24 08 51 F8 F9 0E 1C 87 A3 3C 58 5B 75 09 1B 4E 9B 8D C9 EE 49",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1F 1B 09 29 07 B3 D0 A0   31 E2 C5 77 BA B1 7E 4D  ...)....1..w...M
#             0010: 22 ED 50 1C E0 08 8C 92   99 DC 19 5B 81 A6 D8 44  ".P........[...D
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.203 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.203 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.204 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.205 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.207 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.209 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.216 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.217 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.218 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.222 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:14.223 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:23:14.223 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 17:23:14.224 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 17:24:35.399 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:24:35.443 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:24:35.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:24:35.444 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 17:24:35.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35384/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28629ms
ok 65 stop command for single port in 30827ms
ok 66 status detects locally running solr in 14390ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2163ms
ok 69 copying files around in 6593ms
ok 70 upconfig in 2631ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 20m 59s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m21.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5760 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5760/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39183/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 13:57:14.599; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 13:57:14.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 13:57:15.544; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-29 13:57:15.584; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22760ms
ok 61 start solr with client truststore and security manager in 25822ms
not ok 62 start solr with mTLS needed in 57323ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-LtiaMH/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39183.
#
# Started Solr server on port 39183 (pid=198576). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39184.
#
# Started Solr server on port 39184 (pid=199023). Happy searching!
#
# INFO  - 2023-10-29 13:58:39.452; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 13:58:39.457; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 13:58:39.828; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 13:58:39.832; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 13:58:39.833; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:39.869 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 56 01 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:15.000 UTC",
#     "not  after"         : "2024-01-27 13:58:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 42 88 42 CF 18 7F 5E   C4 E0 AD 9B A4 F1 6C 0D  AB.B...^......l.
#         0010: C5 37 BD C6                                        .7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:39.874 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 55 76 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:07.000 UTC",
#     "not  after"         : "2024-01-27 13:58:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:39.890 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:39.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:39.962 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:39.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:39.962 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:40.143 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.143 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:40.145 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:40.145 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.152 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.164 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.164 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.165 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:40.168 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B6 C8 EA 74 8F B6 85 D7 18 1E 4E 7B 5C 13 5D AD 1A D6 AC 85 30 66 E3 97 42 C3 82 3C FF 23 DA 19",
#   "session id"          : "CB 9C DD E8 41 C9 00 C0 18 7E 5D 8A 64 B8 4B A8 CC E5 2A 7D F5 25 DA 8E 30 74 E1 CB B9 2D AA 49",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C5 D0 0D B5 AC 8C FC 85   4C 15 E3 38 FD 82 37 F5  ........L..8..7.
#             0010: 20 B6 AE A3 33 39 11 3A   81 32 37 BA 60 29 72 51   ...39.:.27.`)rQ
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.280 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "25 D5 81 2F 0F 2F 93 7A 77 52 8A B6 79 88 3D 37 A5 6A 9D D6 DA C4 3E 38 94 EA 4D 7E D3 B1 84 27",
#   "session id"          : "CB 9C DD E8 41 C9 00 C0 18 7E 5D 8A 64 B8 4B A8 CC E5 2A 7D F5 25 DA 8E 30 74 E1 CB B9 2D AA 49",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8B 3D 87 B9 60 AC 5D 5E   78 F3 51 D8 E8 23 A7 74  .=..`.]^x.Q..#.t
#           0010: D9 12 FF 97 68 C9 2C B2   CA 51 13 1A 45 4D 17 10  ....h.,..Q..EM..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.281 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.281 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.283 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.283 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.283 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.283 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.283 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.286 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.287 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.287 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.287 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.287 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.288 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.296 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.298 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.299 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.303 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.303 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.307 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.308 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.310 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.310 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.314 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 A2 2F 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:11.000 UTC",
#       "not  after"         : "2024-01-27 13:58:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 56 36 9E A0 B3 F8 97   E6 7A 7A 23 A5 E3 D1 64  .V6......zz#...d
#           0010: C4 9B E6 80                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.315 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.402 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.406 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 77 F8 55 F4 A4 52 69   CE 7D 28 77 78 A4 F0 AE  vw.U..Ri..(wx...
#     0010: A0 65 5F DE 9B F0 3F C1   11 29 AE 33 A5 FB 51 E2  .e_...?..).3..Q.
#     0020: FB 0D 78 97 F7 52 88 82   A8 12 EB EB E5 BC 14 8E  ..x..R..........
#     0030: 84 C7 0F 11 54 9C EE 4C   C1 E9 C4 91 15 F1 B9 0B  ....T..L........
#     0040: 96 99 D5 B6 38 F9 F6 1C   DF 8E FF D1 7F C5 3F 17  ....8.........?.
#     0050: 90 5A 31 B6 2E 26 AA 19   AD 08 61 1F 54 5C 72 32  .Z1..&....a.T\r2
#     0060: 4D 1F 27 66 4D E0 32 93   14 99 EC 30 8C E5 5D A1  M.'fM.2....0..].
#     0070: 33 B7 FD B9 5A 79 70 01   E0 AD 55 91 31 0A 29 0A  3...Zyp...U.1.).
#     0080: 4B 40 CB 51 23 50 54 A1   D2 2D 7B 8A EE CA 9A C3  K@.Q#PT..-......
#     0090: E9 74 C1 27 24 19 F6 FA   53 4A A2 6F 45 4C 57 38  .t.'$...SJ.oELW8
#     00A0: 0F 62 C6 87 ED 57 C7 9D   88 85 99 67 AA D2 9A F7  .b...W.....g....
#     00B0: 71 88 8F FF 19 AA F9 D4   E3 A9 09 CC 6A 8F 17 1E  q...........j...
#     00C0: A0 AF B0 01 A6 79 69 08   3A 0E 50 22 DE B7 26 8A  .....yi.:.P"..&.
#     00D0: 02 F2 1F 64 68 38 04 BC   42 EC 0D DC FC 68 32 C7  ...dh8..B....h2.
#     00E0: 49 0A 66 CB FF 43 61 FD   CA 12 86 F7 87 15 CA 6D  I.f..Ca........m
#     00F0: F2 DF 80 00 E1 D3 C3 F9   76 35 FE C8 F7 28 D4 67  ........v5...(.g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.408 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 96 71 F0 DB A6 80 3F   1B BE 77 D7 CC 99 AC 16  ..q....?..w.....
#     0010: A9 A5 0F 7E F0 FE 21 A5   5A 80 BF 3E 6A 52 5D 6B  ......!.Z..>jR]k
#     0020: 14 A9 2A 21 FD 9C 98 24   A9 44 4E DE 07 16 11 90  ..*!...$.DN.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.411 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:40.412 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.412 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:40.413 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.413 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:40.413 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:40.414 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.414 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.417 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 56 01 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:15.000 UTC",
#       "not  after"         : "2024-01-27 13:58:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 42 88 42 CF 18 7F 5E   C4 E0 AD 9B A4 F1 6C 0D  AB.B...^......l.
#           0010: C5 37 BD C6                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A D0 70 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:09.000 UTC",
#       "not  after"         : "2024-01-27 13:58:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#           0010: 7D 42 B1 80                                        .B..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.442 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 0B BE 1B 23 21 A2 68   5A 1E CC B7 53 6F 0E 87  e...#!.hZ...So..
#     0010: EB 6D E8 09 D1 5E FB F3   14 7B A0 93 E6 15 E9 93  .m...^..........
#     0020: 48 D8 87 7E BD 57 7A 51   5F BA 35 27 35 E0 B1 31  H....WzQ_.5'5..1
#     0030: 0C 0E 16 45 0E 39 DD 51   42 B5 AB F8 C0 0A 02 B8  ...E.9.QB.......
#     0040: 5D 68 CD F3 73 C5 59 36   AE 4E 4A 70 B3 36 F7 4A  ]h..s.Y6.NJp.6.J
#     0050: 30 C6 6D 7B D2 3C 65 86   61 AA 46 E6 49 3E 2C 67  0.m..<e.a.F.I>,g
#     0060: CF 1D A3 2F 1B A1 EA C9   E9 C8 A2 9C 50 5A 57 31  .../........PZW1
#     0070: E0 89 C8 67 06 29 CE 66   98 ED 91 D6 A6 A8 7F 79  ...g.).f.......y
#     0080: A8 00 74 E2 E2 74 F4 4C   2F F0 C7 23 F3 83 58 93  ..t..t.L/..#..X.
#     0090: 22 B4 BC 25 4B 98 44 D9   A2 FB 8A 1A 77 4E C4 50  "..%K.D.....wN.P
#     00A0: 65 87 C9 3D 39 6A E6 4A   43 6F CF 9F FC E7 EF AC  e..=9j.JCo......
#     00B0: D6 91 FC 21 85 A6 98 AF   B2 B9 18 CD 2D C6 67 15  ...!........-.g.
#     00C0: 29 DA C3 2D FB AC 01 E5   73 4E DB B8 E6 93 EB FC  )..-....sN......
#     00D0: FE F3 7A E0 FE D0 D7 6E   B4 12 46 BC 5B E1 30 6C  ..z....n..F.[.0l
#     00E0: 69 21 47 16 0B E3 2B B6   B0 F3 E7 4F 9B D7 E6 DE  i!G...+....O....
#     00F0: 6B 62 34 73 3F 63 36 3D   06 4B 55 9B 74 90 3E A8  kb4s?c6=.KU.t.>.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.444 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A 3E EA 65 22 A0 26 02   92 A3 14 A2 D6 68 C1 2B  .>.e".&......h.+
#     0010: 12 D1 8F 03 D1 D1 C2 2A   A7 25 76 5C 5C CC 45 7B  .......*.%v\\.E.
#     0020: A7 3E C0 9C 6D E1 68 1C   E7 C6 1E 57 AB 3F 20 5D  .>..m.h....W.? ]
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.444 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:40.510 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D6 47 2C D7 92 B4 BA 10 EE EC AF CC DA 69 ED CA FC 60 C5 B2 A4 53 E7 25 6B 0C 48 E8 55 2F B0 63",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 13:58:40.812 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 13:58:40.813 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-29 13:58:41.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 13:58:41.763; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 13:58:42.129; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 13:58:42.132; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 13:58:42.132; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(ca,h=[localhost],a=[],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LtiaMH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:42.165 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 56 01 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:15.000 UTC",
#     "not  after"         : "2024-01-27 13:58:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 42 88 42 CF 18 7F 5E   C4 E0 AD 9B A4 F1 6C 0D  AB.B...^......l.
#         0010: C5 37 BD C6                                        .7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:42.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 55 76 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:07.000 UTC",
#     "not  after"         : "2024-01-27 13:58:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:42.183 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:42.416 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.416 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:42.418 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:42.418 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.435 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.436 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.436 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:42.438 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F3 EC 3B 65 37 17 41 0A 37 DE 02 09 11 C8 52 00 5B B8 F8 53 7D 8C 1A B0 F5 9B AA E6 B7 17 6D 4D",
#   "session id"          : "44 AE 19 FF CE 57 97 B3 BF 73 DB F5 D9 D2 55 4C B8 77 AA 8A 30 24 3A 94 FE FA 1B DB FA A8 8C 57",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 42 D4 95 3A 7E 91 D7 32   6C 8A FE 73 CC 00 C0 B2  B..:...2l..s....
#             0010: 38 A2 67 8C E2 59 EA 59   B9 10 70 0F 8D 8F B5 1B  8.g..Y.Y..p.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.549 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C 35 D1 64 2C AC C5 5C F3 6A 71 7F 78 85 F2 5B 4A 74 60 EC 89 37 C6 35 5C DC 6D 5C 70 6C 5E 84",
#   "session id"          : "44 AE 19 FF CE 57 97 B3 BF 73 DB F5 D9 D2 55 4C B8 77 AA 8A 30 24 3A 94 FE FA 1B DB FA A8 8C 57",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 28 F5 8C 02 74 78 78 1A   3C DA 4E 00 73 5F 07 88  (...txx.<.N.s_..
#           0010: A3 52 53 61 82 A4 F6 F1   03 80 6D 12 1A 28 36 01  .RSa......m..(6.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.550 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.550 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.551 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.552 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.552 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.552 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.554 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.555 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.555 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.557 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.557 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.564 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.565 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.566 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.570 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.571 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.573 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.573 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.573 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.574 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.574 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.575 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.575 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.578 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 A2 2F 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:11.000 UTC",
#       "not  after"         : "2024-01-27 13:58:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 56 36 9E A0 B3 F8 97   E6 7A 7A 23 A5 E3 D1 64  .V6......zz#...d
#           0010: C4 9B E6 80                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.578 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:42.641 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:42.641 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:42.642 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:42.642 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.664 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A D0 70 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 13:58:09.000 UTC",
#     "not  after"         : "2024-01-27 13:58:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#         0010: 7D 42 B1 80                                        .B..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#         0010: 64 E9 92 94                                        d...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.667 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3D 91 EE 6D EF A0 A5 D9   E8 D5 3E A2 C9 92 BC 0D  =..m......>.....
#     0010: 3A 89 0D E7 4C BE A1 53   6C 29 75 30 FE 19 31 1C  :...L..Sl)u0..1.
#     0020: 9B 2F 4D 69 CE 6E CB FC   9E 79 9F EB ED 23 8F C2  ./Mi.n...y...#..
#     0030: 9C 60 B6 72 52 0D BA 6C   D5 0B CC A5 C5 01 77 E6  .`.rR..l......w.
#     0040: 62 FA 14 B2 55 CD CE 3F   5B 18 47 71 43 B2 5C 15  b...U..?[.GqC.\.
#     0050: A7 19 7C 58 30 8B A7 E0   A2 D5 C0 B7 FD 3C 1E D9  ...X0........<..
#     0060: 1A 57 BE 70 9A 1F 33 8D   55 06 34 66 40 58 26 EF  .W.p..3.U.4f@X&.
#     0070: A0 3E AA A5 48 4F DC 4E   4B E3 AA 95 17 08 4A 10  .>..HO.NK.....J.
#     0080: C5 46 5E 40 12 E1 8A BB   59 95 96 17 25 06 2F 9C  .F^@....Y...%./.
#     0090: E8 9D D0 B1 D7 33 2B 56   1E 70 C9 96 50 85 DC 2B  .....3+V.p..P..+
#     00A0: F4 FA 15 67 30 25 7A 4F   67 89 B5 1F C8 02 FF AE  ...g0%zOg.......
#     00B0: EA F9 8E 46 FF C4 6D F5   4B 90 1C D8 C5 D1 DE C9  ...F..m.K.......
#     00C0: FF 0F C5 0E E5 A8 F6 B7   3B 15 ED D2 D3 57 0C EE  ........;....W..
#     00D0: 3F 05 0C 3B 11 3D CC 00   70 BE 81 15 B8 AD 2B 5E  ?..;.=..p.....+^
#     00E0: BC 5F E5 1D 5B A0 B5 C1   F9 E1 ED B9 90 D2 69 EF  ._..[.........i.
#     00F0: C4 CC 26 68 62 36 78 A9   4E 72 D3 6F 23 9B FE E6  ..&hb6x.Nr.o#...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.669 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B7 1F 08 37 8D 74 2C FF   DD 47 0D BA BB CE B7 2C  ...7.t,..G.....,
#     0010: 80 25 96 86 70 4C 31 14   FE 27 82 63 6E B6 8C 4E  .%..pL1..'.cn..N
#     0020: DC 60 00 8F E0 B1 B8 13   C1 C5 79 28 D8 04 39 D0  .`........y(..9.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.672 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:42.673 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.673 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:42.673 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.673 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 13:58:42.674 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:42.674 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.674 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.677 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 56 01 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:15.000 UTC",
#       "not  after"         : "2024-01-27 13:58:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 42 88 42 CF 18 7F 5E   C4 E0 AD 9B A4 F1 6C 0D  AB.B...^......l.
#           0010: C5 37 BD C6                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A D0 70 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:09.000 UTC",
#       "not  after"         : "2024-01-27 13:58:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#           0010: 7D 42 B1 80                                        .B..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.703 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 17 80 95 A7 2D 74 27   11 E7 00 35 37 09 7B 91  M....-t'...57...
#     0010: C5 96 DC AD 62 CC C3 CA   12 85 E3 DE 31 03 1F 6A  ....b.......1..j
#     0020: 40 94 6B A7 68 89 48 26   A9 D2 AA 86 5F DD 18 64  @.k.h.H&...._..d
#     0030: D3 B5 45 D5 07 58 38 E5   44 19 C6 A3 78 27 C9 A4  ..E..X8.D...x'..
#     0040: A1 26 2A D7 AB 69 41 A4   7A BF 97 BD 33 8A 8A D3  .&*..iA.z...3...
#     0050: 62 B8 6C DA 74 F2 42 F2   D0 B8 15 5D F7 D5 99 CF  b.l.t.B....]....
#     0060: 0C 70 1F 7F 75 A3 B6 34   29 FA 37 F6 D9 AA D1 51  .p..u..4).7....Q
#     0070: CF F1 1B 78 F7 92 DE 8F   23 63 8D 9B 0D AD 4A F1  ...x....#c....J.
#     0080: 71 FF EF 56 7E 97 5C 38   87 5A BD A3 06 03 58 03  q..V..\8.Z....X.
#     0090: 46 1C BE 02 85 91 22 47   CA 73 96 EC 8A C5 BF BC  F....."G.s......
#     00A0: 20 A1 79 17 8E 80 5B 68   75 62 B0 FA 44 5D 54 A6   .y...[hub..D]T.
#     00B0: 64 2F 05 40 F3 E9 75 3A   D8 55 36 30 95 66 14 48  d/.@..u:.U60.f.H
#     00C0: 7B 67 D1 D7 1E 19 0B 9D   EE A9 F0 42 E0 69 19 33  .g.........B.i.3
#     00D0: 65 D8 2D EC 50 D8 4F 77   DA CB BD F4 01 CF F6 02  e.-.P.Ow........
#     00E0: 32 E6 75 44 17 F0 1C C0   E9 A5 C3 59 EF 68 FF 8F  2.uD.......Y.h..
#     00F0: 3F EA 14 41 09 46 B2 3B   66 FA 4D DB 7A 47 D6 AF  ?..A.F.;f.M.zG..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.705 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 87 D2 E4 A1 2C 20 C7 9A   14 DD C6 A5 D8 49 09 C4  ...., .......I..
#     0010: C0 3B 0D 31 E2 08 D5 4E   E8 AA 2F CE 71 60 DB 40  .;.1...N../.q`.@
#     0020: 0D 10 66 75 20 99 7A C7   E7 06 5C 38 0D D4 8D 2E  ..fu .z...\8....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.706 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:42.762 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "08 C3 A1 6A 44 37 3C 4C 15 35 FD 10 86 5B 5A 19 67 4D 92 A6 AB 35 E1 47 B1 F0 ED 98 F9 D6 7B CB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 13:58:43.061 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 13:58:43.062 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-29 13:58:54.455; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:54.794 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 55 76 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:07.000 UTC",
#       "not  after"         : "2024-01-27 13:58:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#           0010: 7D 42 B1 80                                        .B..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A D0 70 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 13:58:09.000 UTC",
#       "not  after"         : "2024-01-27 13:58:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 02 E3 2A B4 29 97 92   79 4C 01 1E D9 EA 75 C3  ...*.)..yL....u.
#           0010: 7D 42 B1 80                                        .B..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 F2 5B ED 79 B2 C5 B6   A6 A0 71 6A 7B 42 B1 A7  H.[.y.....qj.B..
#           0010: 64 E9 92 94                                        d...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 13:58:54.811 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:55.228 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:55.228 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:55.228 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 13:58:55.229 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:55.366 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.366 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:55.368 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 13:58:55.369 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.375 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.388 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.388 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.388 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 13:58:55.391 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "DD DC DE D8 1E 92 1E 84 8A 80 BF 3E 28 92 79 88 DD 9D 89 3F 4B 8D F8 D8 12 F9 FE C5 C1 D8 56 86",
#     "session id"          : "3F 2A E0 3F DB 2D 73 60 D3 36 3E B5 97 E2 2F 5A 20 7B FC 50 98 83 34 6E DE 70 98 15 19 A7 F5 6C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A0 1E C6 AA DF E3 33 34   A8 7E 12 C7 1B B8 D3 4F  ......34.......O
#               0010: EF 57 63 A7 7B EB 66 E2   65 EF 64 7E FF 50 33 63  .Wc...f.e.d..P3c
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.410 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "A8 B2 C7 73 01 A6 C8 01 AE 7D BE 4F 71 61 F7 A7 F4 3C BB 6A C1 B0 0D A4 80 CA 11 B7 EB 17 6B 16",
#     "session id"          : "3F 2A E0 3F DB 2D 73 60 D3 36 3E B5 97 E2 2F 5A 20 7B FC 50 98 83 34 6E DE 70 98 15 19 A7 F5 6C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3B 28 12 1A 0C 54 02 EC   16 D9 C2 3B 6F 97 D9 32  ;(...T.....;o..2
#             0010: C0 44 60 1C 35 7F DF 0B   1C CD BD C2 78 7B 40 3D  .D`.5.......x.@=
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.410 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.411 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.413 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.413 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.416 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.416 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.416 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:55.417 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:55.418 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.425 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.427 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.428 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.432 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:55.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 13:58:55.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 13:58:55.436 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 14:00:13.946 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 14:00:13.989 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 14:00:13.990 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 14:00:13.990 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 14:00:13.991 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39184/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28563ms
ok 65 stop command for single port in 31223ms
ok 66 status detects locally running solr in 14388ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2203ms
ok 69 copying files around in 6672ms
ok 70 upconfig in 2661ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1246ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1234ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 8s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5759 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5759/

2 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([727438C7D9104363:4780D39C32CC753D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset

Error Message:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/index
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0

Stack Trace:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/index
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs
hdfs://localhost:33957/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1
hdfs://localhost:33957/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0
	at __randomizedtesting.SeedInfo.seed([727438C7D9104363:798DA7CE41521574]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertFalse(Assert.java:65)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testSkipConfigset(AbstractIncrementalBackupTest.java:375)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5594 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=727438C7D9104363 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=727438C7D9104363 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 55s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m19s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5758 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5758/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43071/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 07:14:47.670; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 07:14:47.675; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 07:14:48.601; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-29 07:14:48.640; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22807ms
ok 61 start solr with client truststore and security manager in 25566ms
not ok 62 start solr with mTLS needed in 60135ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lvWBlZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43071.
#
# Started Solr server on port 43071 (pid=199551). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43072.
#
# Started Solr server on port 43072 (pid=199997). Happy searching!
#
# INFO  - 2023-10-29 07:16:12.015; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 07:16:12.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 07:16:12.402; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 07:16:12.405; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 07:16:12.405; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:12.437 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 13 D7 FC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:48.000 UTC",
#     "not  after"         : "2024-01-27 07:15:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 13 6A DA 8A C0 39 D2   38 F3 69 EC F5 6D E2 D8  ?.j...9.8.i..m..
#         0010: DE DA CF 60                                        ...`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:12.441 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 27 14 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:40.000 UTC",
#     "not  after"         : "2024-01-27 07:15:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:12.455 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:12.679 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.680 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:12.681 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:12.682 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.687 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.699 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:12.702 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D9 7B D2 EA E1 7C D9 48 D2 C3 0F 12 41 95 23 7E B4 C4 A5 FB 40 A1 23 E7 EB 78 A9 E1 14 BD A3 3D",
#   "session id"          : "96 8E 90 78 5D FF 4A 3B D5 F2 9A 3A F7 1C 46 81 84 DB 18 CD E8 48 E6 C6 E3 0E 4E F8 03 21 F1 6F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 27 EA 4A F9 55 67 96 B9   70 65 99 9A BA FD B2 17  '.J.Ug..pe......
#             0010: 4D 0C 3A 79 3E E4 A6 74   2C 56 D7 4B 50 13 B2 10  M.:y>..t,V.KP...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.803 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D8 E2 CB 0A F7 1D 47 7F 0C 46 BA 8A 78 E4 29 C7 AA A6 95 E8 27 58 F8 F9 A4 D3 F4 42 D4 A0 41 B5",
#   "session id"          : "96 8E 90 78 5D FF 4A 3B D5 F2 9A 3A F7 1C 46 81 84 DB 18 CD E8 48 E6 C6 E3 0E 4E F8 03 21 F1 6F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 72 52 C7 93 98 09 ED 1E   90 2E BA 29 F7 9B EF 98  rR.........)....
#           0010: BD 0C 70 86 07 B9 76 99   35 F0 2D 9D 90 99 14 2E  ..p...v.5.-.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.804 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.804 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.806 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.809 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.809 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.810 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.820 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.822 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.823 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.826 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.826 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.827 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.827 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.827 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.830 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.830 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.831 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.831 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.832 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.832 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.832 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.836 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 74 01 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:44.000 UTC",
#       "not  after"         : "2024-01-27 07:15:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 F8 3D 11 A0 E0 F9 E3   BF 4F BC EB 27 6F DA 77  ..=......O..'o.w
#           0010: 11 85 BA 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.836 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:12.909 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:12.909 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:12.909 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:12.909 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.933 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.937 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 F6 A3 4C 2D 61 D2 04   FA 42 07 FE 0E 4B 54 67  ...L-a...B...KTg
#     0010: 8F 8D F4 F2 8E 88 4A 3F   35 EF CC B9 CF C2 95 DC  ......J?5.......
#     0020: FE 3C 3D 71 14 7A BC A0   1D B3 41 65 03 0D 9A 66  .<=q.z....Ae...f
#     0030: FC 5E 85 E6 B1 2B 95 94   29 C2 57 06 16 23 E5 5E  .^...+..).W..#.^
#     0040: 53 89 33 B5 6E C5 11 AF   1F EF 83 6E 6A BA E9 C0  S.3.n......nj...
#     0050: 91 E2 BD 63 45 67 C8 F9   CC B6 4D F1 DE 25 8E C1  ...cEg....M..%..
#     0060: 38 41 E0 3F FD 66 0E BB   85 8D 17 D5 60 44 03 E0  8A.?.f......`D..
#     0070: 85 29 E8 0B FC 48 68 00   9C CA B3 F4 11 CB E9 2D  .)...Hh........-
#     0080: 44 ED 16 C2 1B 01 69 40   06 67 07 D2 DB B3 AC C2  D.....i@.g......
#     0090: B1 77 A8 5A D1 8D 93 06   80 D0 6E 8C 2C B6 6D 3D  .w.Z......n.,.m=
#     00A0: F9 21 B2 57 E7 41 AC 3A   92 A2 22 11 E6 64 C1 0D  .!.W.A.:.."..d..
#     00B0: D9 03 CC 39 28 41 2E 2F   50 E9 3D 79 7F 9D 8D E3  ...9(A./P.=y....
#     00C0: 60 DF B7 BB 04 34 2D 12   2B DE 10 66 93 23 F2 F9  `....4-.+..f.#..
#     00D0: 72 59 B8 F1 8C D8 16 C7   10 55 FE D4 29 23 F5 9C  rY.......U..)#..
#     00E0: FF 42 81 DD 98 E8 34 E0   E5 45 35 89 23 1E 19 56  .B....4..E5.#..V
#     00F0: E0 B4 8D 26 B0 0F 0A 45   F4 C1 15 9B 2D 69 96 73  ...&...E....-i.s
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.939 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C 98 D8 29 73 5E 8D F5   90 0B 34 C4 BC 85 23 C1  ...)s^....4...#.
#     0010: 09 85 EC E9 F1 8A 49 59   A9 4C 91 86 E4 3A 9D F7  ......IY.L...:..
#     0020: D5 4A 37 C0 86 95 FD C6   EB 0E 64 1C 2C CF F2 2D  .J7.......d.,..-
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.941 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:12.942 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.943 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:12.943 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.943 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:12.943 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:12.944 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.944 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.947 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 13 D7 FC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:48.000 UTC",
#       "not  after"         : "2024-01-27 07:15:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 13 6A DA 8A C0 39 D2   38 F3 69 EC F5 6D E2 D8  ?.j...9.8.i..m..
#           0010: DE DA CF 60                                        ...`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 37 2A 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:41.000 UTC",
#       "not  after"         : "2024-01-27 07:15:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#           0010: 04 0A 31 65                                        ..1e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.977 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D 13 6B 26 69 85 BF 67   BA CF BC 1C B8 35 1E 0D  ..k&i..g.....5..
#     0010: 44 9C B9 79 AF 20 9D 02   51 D9 D4 C2 37 18 70 40  D..y. ..Q...7.p@
#     0020: 62 22 61 F1 07 01 5C 48   A9 9C 4C 22 B3 70 5C 6C  b"a...\H..L".p\l
#     0030: 9D 90 A2 E2 8B BA 25 55   E2 32 A0 13 F3 DF 0A BD  ......%U.2......
#     0040: 4A 7B CE E8 BC 7C 65 52   5B C5 E7 E3 BB 7F 19 C0  J.....eR[.......
#     0050: 26 B8 13 6C A2 22 BA A1   F6 B0 C9 62 D7 12 0B 73  &..l.".....b...s
#     0060: 64 E0 BA 44 C8 BE 53 62   CF E3 2E AB F2 36 49 72  d..D..Sb.....6Ir
#     0070: 7D C5 94 E2 05 40 4D E7   CA E4 97 60 AB AF 64 67  .....@M....`..dg
#     0080: ED F7 FF A4 65 29 6E 0C   CB 15 77 23 0B 4D 88 5C  ....e)n...w#.M.\
#     0090: A3 30 05 E1 AD 83 7A 98   44 FA 8E F3 B4 50 47 90  .0....z.D....PG.
#     00A0: 1D D3 4B 52 36 83 22 71   14 58 31 F1 A4 41 F0 8C  ..KR6."q.X1..A..
#     00B0: 03 DC 6D 0F DD 2C 22 CC   82 38 28 30 07 D0 40 23  ..m..,"..8(0..@#
#     00C0: 57 88 06 7F DF 00 3C C2   A9 56 6C A4 55 7D 59 D5  W.....<..Vl.U.Y.
#     00D0: 45 D7 BA 1C 96 E5 21 B3   CF 59 A5 50 3B C2 AA FF  E.....!..Y.P;...
#     00E0: 66 41 1D 84 3B F5 85 F6   10 2C 20 ED 6C D2 72 9F  fA..;...., .l.r.
#     00F0: CD 09 A8 5D 33 60 90 2D   31 15 53 3D 44 F6 20 8D  ...]3`.-1.S=D. .
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.978 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 70 E4 38 8D 26 E2 44   83 65 67 23 81 F5 A6 9F  .p.8.&.D.eg#....
#     0010: EF EA 7F 9D 8D 97 96 60   6A 06 28 5D 38 FF 11 11  .......`j.(]8...
#     0020: 1E D9 53 73 97 13 6F 3E   6E 8C AF 55 25 FD EC A8  ..Ss..o>n..U%...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:12.979 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:13.039 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "06 7B 84 6D 7F DF DC A4 A3 E3 8E A4 05 45 45 2D BB 4F A2 0F 6E F9 50 88 D0 28 3D B3 34 19 68 F4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 07:16:13.362 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 07:16:13.363 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-29 07:16:14.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 07:16:14.307; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 07:16:14.696; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 07:16:14.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 07:16:14.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lvWBlZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:14.730 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 13 D7 FC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:48.000 UTC",
#     "not  after"         : "2024-01-27 07:15:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 13 6A DA 8A C0 39 D2   38 F3 69 EC F5 6D E2 D8  ?.j...9.8.i..m..
#         0010: DE DA CF 60                                        ...`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:14.734 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 27 14 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:40.000 UTC",
#     "not  after"         : "2024-01-27 07:15:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:14.748 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:14.977 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.977 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:14.979 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:14.979 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.984 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.996 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.996 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.996 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:14.998 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "58 77 C6 B3 17 A9 72 34 84 7E 05 6D 2E 58 5F 0F 7F 7E 87 A0 42 45 2B 81 EF 6E 92 DB EF E0 02 F7",
#   "session id"          : "06 58 FA 5A 04 84 4C 05 E0 DE 3B C5 E8 7C DF 8E 82 77 41 5C 37 3E DF 03 8C 15 39 B3 64 FC D2 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C5 02 06 5E A2 B4 20 5C   4D F5 88 5A A9 07 08 FB  ...^.. \M..Z....
#             0010: 5C 7A 56 0E 42 D2 08 57   2C 81 77 19 95 07 31 01  \zV.B..W,.w...1.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.097 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "81 1A 34 7D 2C C5 0A A0 60 02 AE D1 77 4C 8C BA BF 74 D9 67 F5 96 8C 4F 97 A0 9B 42 B5 54 9C CD",
#   "session id"          : "06 58 FA 5A 04 84 4C 05 E0 DE 3B C5 E8 7C DF 8E 82 77 41 5C 37 3E DF 03 8C 15 39 B3 64 FC D2 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 28 D7 E0 6D F1 94 C0 E0   55 D8 E7 5A 7E D3 75 CB  (..m....U..Z..u.
#           0010: 68 21 E7 3E A6 50 DE 84   A2 B8 32 3B 10 21 60 1B  h!.>.P....2;.!`.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.097 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.097 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.099 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.101 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.102 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.104 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.111 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.112 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.113 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.117 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.118 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.120 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.121 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.121 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.122 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.125 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 74 01 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:44.000 UTC",
#       "not  after"         : "2024-01-27 07:15:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 F8 3D 11 A0 E0 F9 E3   BF 4F BC EB 27 6F DA 77  ..=......O..'o.w
#           0010: 11 85 BA 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.125 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:15.181 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:15.181 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:15.182 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:15.182 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.210 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 37 2A 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 07:15:41.000 UTC",
#     "not  after"         : "2024-01-27 07:15:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#         0010: 04 0A 31 65                                        ..1e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#         0010: FA 06 E3 7C                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.215 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3F 2F 4D A3 6F AD 19 A6   B5 BA E7 6E 3C EC D1 92  ?/M.o......n<...
#     0010: 8A 65 16 39 DE 7A 50 33   8E BF 57 E7 62 EE 6D 8B  .e.9.zP3..W.b.m.
#     0020: 9C D7 CF 66 64 1D B4 E9   89 EA E9 2F 6A 2A 2B B6  ...fd....../j*+.
#     0030: 88 43 F2 F1 A3 14 37 5F   C5 CA 6E 77 EE A2 51 CE  .C....7_..nw..Q.
#     0040: EF 8F C5 AD A8 2A 2C 68   1E 4E 93 20 44 70 15 99  .....*,h.N. Dp..
#     0050: 70 A2 45 A7 43 63 58 0E   61 AB 94 55 E2 01 25 74  p.E.CcX.a..U..%t
#     0060: E4 8B D3 24 94 E5 3D F9   CA D4 CF B0 27 4D 53 22  ...$..=.....'MS"
#     0070: C4 03 61 3B AD 88 36 AF   FE 26 3D 97 0B 16 F2 00  ..a;..6..&=.....
#     0080: 5D E8 EA 6F 13 5C 87 2C   87 67 38 26 E3 FF E3 DE  ]..o.\.,.g8&....
#     0090: E5 B4 C7 17 AA 7B 51 16   D6 C6 B9 12 E7 19 A2 FD  ......Q.........
#     00A0: 45 4D A7 02 8D B5 5D E8   01 98 30 8B EC 0A 8A 0E  EM....]...0.....
#     00B0: D6 74 B6 6C 8C 61 B7 89   35 0B 05 1D C8 37 72 A3  .t.l.a..5....7r.
#     00C0: 7A E2 70 75 C1 9C BF 88   E0 75 DB CC 15 60 A9 69  z.pu.....u...`.i
#     00D0: C3 AF F9 52 AE 07 CB 17   2D D1 A9 F4 42 C7 0E D4  ...R....-...B...
#     00E0: 3A CC B4 15 54 68 94 1A   B6 90 A6 25 64 D7 48 33  :...Th.....%d.H3
#     00F0: 6A C2 20 8D 42 EB 3E 3F   B7 9B 1A 22 91 CD 46 5F  j. .B.>?..."..F_
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.217 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DE E2 66 93 11 84 34 5E   A3 C9 7B FC F8 9C EC B4  ..f...4^........
#     0010: 14 B2 7A 00 24 C1 AD F7   FB 0F 51 31 AC 86 E9 DB  ..z.$.....Q1....
#     0020: 53 7A 3B DF E0 8B D5 94   8E 21 43 67 50 CD C6 73  Sz;......!CgP..s
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.219 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:15.220 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.220 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:15.220 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.220 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 07:16:15.221 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:15.221 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.221 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.224 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 13 D7 FC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:48.000 UTC",
#       "not  after"         : "2024-01-27 07:15:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 13 6A DA 8A C0 39 D2   38 F3 69 EC F5 6D E2 D8  ?.j...9.8.i..m..
#           0010: DE DA CF 60                                        ...`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 37 2A 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:41.000 UTC",
#       "not  after"         : "2024-01-27 07:15:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#           0010: 04 0A 31 65                                        ..1e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.250 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 9B 11 43 2F 95 E5 4B   49 DD FC 81 39 DF DC B2  ,..C/..KI...9...
#     0010: 39 77 5A FD 78 08 BA BF   9D 1E 07 0F D4 A4 C3 16  9wZ.x...........
#     0020: 52 A6 10 2D C6 17 20 3C   CA BA 4D 14 DA 97 70 82  R..-.. <..M...p.
#     0030: 7D 65 CE C3 B9 B4 2C BD   15 3D AD D7 B1 84 16 04  .e....,..=......
#     0040: 4E E7 59 77 9B F1 9E AE   FC 9C D0 FE 4F 7E 9E F2  N.Yw........O...
#     0050: FA A0 DB 51 91 24 0A C4   F1 64 A5 F5 8D 64 BD 80  ...Q.$...d...d..
#     0060: 92 95 EE 3A 5B EE B4 56   3E B8 13 5A E8 A0 9D E5  ...:[..V>..Z....
#     0070: 03 55 42 7F 2B 97 4A 42   7B C3 13 4F 2E 73 BE 2E  .UB.+.JB...O.s..
#     0080: 9F 28 D9 A2 36 E3 D8 EB   1F 3C 95 3E 18 EE 39 57  .(..6....<.>..9W
#     0090: 66 6D 1D E3 BD 5F 1A 08   8F 96 16 12 CB 29 B6 45  fm..._.......).E
#     00A0: 42 45 37 D9 A8 F9 E1 05   5D A3 CD 2E 47 9F 3A DA  BE7.....]...G.:.
#     00B0: 74 8C 47 D4 37 8D 6F 47   EE A4 88 64 A1 18 18 61  t.G.7.oG...d...a
#     00C0: EB 4C C1 71 38 CC 4B 5A   32 60 E1 A5 24 41 96 29  .L.q8.KZ2`..$A.)
#     00D0: E5 AE 61 72 92 AF E2 98   CE 2A 88 0F 77 01 E6 19  ..ar.....*..w...
#     00E0: F1 49 61 F0 61 A2 24 54   80 F3 52 3D BC AC BD 02  .Ia.a.$T..R=....
#     00F0: AC F0 BB CD 0D 6F 2A 86   56 AB D8 4A 50 3A 38 EB  .....o*.V..JP:8.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.251 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 16 A9 15 18 97 8B 9A D7   00 9B 6B 81 9F 8C 6B 24  ..........k...k$
#     0010: 8D 51 34 50 96 CE A7 CE   B0 DF E7 EB 4E 00 0A BD  .Q4P........N...
#     0020: 3A 01 8E 7D 81 68 17 FD   1A 0A F3 BE C9 E3 DE 5A  :....h.........Z
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.252 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:15.310 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "29 0F 45 1A EA AE AB 42 0E 7F B3 BB 81 5A A1 45 95 6B 7D 14 0C CD 6D 1C F2 EB 79 06 99 D4 F1 3F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 07:16:15.597 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 07:16:15.598 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-29 07:16:26.484; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:26.841 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 27 14 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:40.000 UTC",
#       "not  after"         : "2024-01-27 07:15:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#           0010: 04 0A 31 65                                        ..1e
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 37 2A 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 07:15:41.000 UTC",
#       "not  after"         : "2024-01-27 07:15:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6C 3A 19 79 D2 DC 53 70   B9 FD CA E0 3E 5C 18 25  l:.y..Sp....>\.%
#           0010: 04 0A 31 65                                        ..1e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 5C 91 D0 6F FD 32 09   8A 1B 13 1E 72 3B 2E 4B  .\..o.2.....r;.K
#           0010: FA 06 E3 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 07:16:26.857 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:26.945 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:26.945 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:26.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:16:26.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:27.081 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.081 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:27.083 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 07:16:27.083 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.088 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.100 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.100 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.100 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 07:16:27.102 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "16 AF 5A 13 49 46 34 FE 2B 6A 8B BF 55 85 E0 A7 E2 66 02 47 B8 07 9A DC 40 B5 65 A6 A1 84 9C FF",
#     "session id"          : "CC 20 3C B4 9D DA 5E 2D 20 39 5B 78 67 B2 B3 89 0A DB 3F 45 4A 51 6A 2B 7F F4 DF 1F 28 97 74 7C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A9 02 A2 DF 17 D2 E4 BF   56 C8 81 A9 1E 93 FD 67  ........V......g
#               0010: 80 C1 ED CA 4E 57 16 72   F4 CE 94 A1 36 2F D7 53  ....NW.r....6/.S
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.121 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "12 B0 CD A1 B0 81 E6 0F 32 93 1F D8 98 77 C3 5F 24 EA D2 3B DC 8F 35 6C E4 22 54 65 2A B4 C4 BF",
#     "session id"          : "CC 20 3C B4 9D DA 5E 2D 20 39 5B 78 67 B2 B3 89 0A DB 3F 45 4A 51 6A 2B 7F F4 DF 1F 28 97 74 7C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 DE E9 93 3C 49 D9 0C   D6 1A A8 62 AA 0D 26 A8  ....<I.....b..&.
#             0010: 48 63 5D 3D 01 90 4F 00   A4 BD F3 89 AA 3A A6 37  Hc]=..O......:.7
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.121 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.121 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.122 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.122 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.123 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.126 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.126 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:27.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.135 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.136 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.137 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:27.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:16:27.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 07:16:27.143 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 07:17:50.178 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:17:50.227 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:17:50.228 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:17:50.228 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 07:17:50.228 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43072/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28389ms
ok 65 stop command for single port in 31001ms
ok 66 status detects locally running solr in 14351ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2188ms
ok 69 copying files around in 6530ms
ok 70 upconfig in 2625ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 6s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m30s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5757 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5757/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39951/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-29 02:15:14.782; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 02:15:14.787; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-29 02:15:15.677; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-29 02:15:15.715; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22174ms
ok 61 start solr with client truststore and security manager in 24398ms
not ok 62 start solr with mTLS needed in 56753ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MwLaSk/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39951.
#
# Started Solr server on port 39951 (pid=199889). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39952.
#
# Started Solr server on port 39952 (pid=200322). Happy searching!
#
# INFO  - 2023-10-29 02:16:37.286; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 02:16:37.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 02:16:37.656; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 02:16:37.659; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 02:16:37.659; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:37.693 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 D9 F0 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:13.000 UTC",
#     "not  after"         : "2024-01-27 02:16:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 B3 66 DE AA E9 92 9C   66 5D 1A 68 2C 7D 8A E9  v.f.....f].h,...
#         0010: 41 7D 67 29                                        A.g)
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:37.697 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C E5 3B E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:05.000 UTC",
#     "not  after"         : "2024-01-27 02:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:37.712 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:38.051 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:38.052 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:38.052 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:38.053 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:38.207 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.207 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:38.209 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:38.209 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.226 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:38.229 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B5 99 83 E1 22 68 F1 64 1E 6B 60 A4 6C 07 59 8F 26 1C 5F 80 D9 6C 60 84 3E 31 47 B8 50 AF E8 FF",
#   "session id"          : "F0 63 CC 68 A0 37 77 BF D9 24 E1 E9 44 F5 D3 93 1E 2A 83 D6 94 7C 15 1E E6 91 CF 78 D7 57 BF 7D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7A F1 C0 E1 16 AF 7E 70   86 41 6C 70 5A DE AA EF  z......p.AlpZ...
#             0010: 27 7E 84 E7 93 AE 71 B8   CC DC 78 CF 0B 00 06 50  '.....q...x....P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.346 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8C 36 B1 36 59 82 EB 16 E1 D2 94 7A 68 2A 18 FE 88 F0 7A F9 0D 10 FA 1E FA 38 C4 4E 74 E4 BC 1B",
#   "session id"          : "F0 63 CC 68 A0 37 77 BF D9 24 E1 E9 44 F5 D3 93 1E 2A 83 D6 94 7C 15 1E E6 91 CF 78 D7 57 BF 7D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3B 6C EE 83 E2 5E 6C BC   D7 89 25 2F 28 8D 71 1E  ;l...^l...%/(.q.
#           0010: 23 42 07 11 BF F7 91 FE   E3 12 22 AB 09 9B 15 59  #B........"....Y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.347 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.347 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.350 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.352 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.353 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.355 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.362 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.364 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.365 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.369 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.369 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.369 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.369 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.370 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.372 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.372 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.373 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.373 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.374 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.375 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.375 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.379 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D E0 A6 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:09.000 UTC",
#       "not  after"         : "2024-01-27 02:16:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 C4 3D E5 A6 C1 87 01   A7 EF D5 7D 1E B2 0E 37  ..=............7
#           0010: 56 C9 1A 1E                                        V...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.379 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.462 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.466 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B9 7F FD B8 53 3F B6 36   19 1C 3E 51 3F A2 05 11  ....S?.6..>Q?...
#     0010: 93 0C C8 A5 74 DA 2A 48   57 6C 66 BA 3F 96 D8 CC  ....t.*HWlf.?...
#     0020: 5B E4 19 57 38 76 EE 48   15 CF 10 34 11 34 40 A3  [..W8v.H...4.4@.
#     0030: 44 97 5D D2 88 2E 3E 21   CE 60 58 07 9B 5D 4A 8C  D.]...>!.`X..]J.
#     0040: FF 70 E1 99 24 F2 41 84   F9 EB 3D 29 B2 47 A8 CD  .p..$.A...=).G..
#     0050: 34 5B DE D8 2C C3 38 C8   40 3B 6D 64 F2 F1 A2 29  4[..,.8.@;md...)
#     0060: 2F E6 ED 26 5B D5 A0 BA   F6 E9 52 5D E1 D7 3B FE  /..&[.....R]..;.
#     0070: B4 CC 44 F3 A3 2C AD 86   49 1A F7 20 DB 8A 5D 9B  ..D..,..I.. ..].
#     0080: E3 BB 80 15 56 41 E3 F6   A9 82 A4 2C 8F BC EC BD  ....VA.....,....
#     0090: A2 46 49 14 28 22 43 9B   F8 B6 81 39 9B F8 B7 9C  .FI.("C....9....
#     00A0: CA 5E 4D 98 22 0B 13 D2   C9 FD FA 0E C6 45 1B D9  .^M."........E..
#     00B0: F2 50 7C 06 30 EA 3E 66   18 17 B0 9F C0 73 13 40  .P..0.>f.....s.@
#     00C0: D3 2D FE 82 18 FD DA 0E   A8 2A 0E B9 7D 1B B9 80  .-.......*......
#     00D0: 0F 09 A3 09 62 4A D2 0E   8E AF 4F 1A 32 E5 7F 98  ....bJ....O.2...
#     00E0: B1 0A 1A F1 DA CC 60 A5   E9 F2 BE 82 AA 87 A4 98  ......`.........
#     00F0: 30 8C EE 97 DF 7B 76 5C   72 EA 4F 91 0E EA 83 D7  0.....v\r.O.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.467 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 34 D2 37 78 19 D5 6F 44   CA 82 C7 72 5A B2 76 F7  4.7x..oD...rZ.v.
#     0010: F2 07 D7 76 FF AD E5 03   5A 92 49 A9 D5 FA 0B 10  ...v....Z.I.....
#     0020: 9B 56 45 E8 1F 24 B1 65   AE 35 80 3E AB D6 2B 9C  .VE..$.e.5.>..+.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.469 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:38.470 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.471 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:38.471 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.471 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:38.471 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:38.472 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.472 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.474 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 D9 F0 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:13.000 UTC",
#       "not  after"         : "2024-01-27 02:16:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 B3 66 DE AA E9 92 9C   66 5D 1A 68 2C 7D 8A E9  v.f.....f].h,...
#           0010: 41 7D 67 29                                        A.g)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 26 73 7E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:07.000 UTC",
#       "not  after"         : "2024-01-27 02:16:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#           0010: 69 FB FA DF                                        i...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.501 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5B 7C 3F D2 8D 81 D2 2A   CF 3B 07 1C BA 64 DB B2  [.?....*.;...d..
#     0010: DB B3 4B 70 66 2B A8 0E   C0 BE 6D CF D6 0F AA 2E  ..Kpf+....m.....
#     0020: EE 95 2D A0 AF 8E 59 22   57 0D 69 54 E4 8C C2 D6  ..-...Y"W.iT....
#     0030: 16 46 62 89 81 9C 3B EB   33 49 ED F7 29 27 64 31  .Fb...;.3I..)'d1
#     0040: 42 2F 7E 81 93 5C 94 6D   B5 1E 35 82 48 93 D6 C6  B/...\.m..5.H...
#     0050: 4E D9 AB 2F DD 5C F8 7F   79 79 D5 21 DE AC 30 F3  N../.\..yy.!..0.
#     0060: FC 7B 67 52 F7 86 9C 98   C4 1D 4E 11 09 2B 7A 5E  ..gR......N..+z^
#     0070: 78 4A 97 FE DE DB 5B 46   A4 45 01 81 27 E3 1F 0F  xJ....[F.E..'...
#     0080: 34 39 CE 7D B2 4C 44 36   CF 43 73 9D A5 30 E5 B7  49...LD6.Cs..0..
#     0090: 13 95 53 51 2B 6F 4F F9   45 2B 15 FD 46 BD F0 45  ..SQ+oO.E+..F..E
#     00A0: 9E 69 CE 45 32 FC 00 D7   64 85 0C E7 77 A3 B9 5E  .i.E2...d...w..^
#     00B0: 50 C0 E7 29 8C D4 88 CF   DE 5E 39 58 77 29 CC E5  P..).....^9Xw)..
#     00C0: 94 3A 3A F0 F7 3E 0D CC   29 3D 64 7E 6C 89 13 7A  .::..>..)=d.l..z
#     00D0: D2 E2 B3 40 3A A6 55 99   F7 81 D5 70 6E A4 8C 67  ...@:.U....pn..g
#     00E0: 1B E2 BD 17 7A 1A A0 BE   CC 2F 69 88 E5 40 C0 D4  ....z..../i..@..
#     00F0: 8F 98 6A C9 8D 01 EA 25   6A 6C D8 7D 2A C2 5D 46  ..j....%jl..*.]F
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.501 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 76 0A 93 F3 39 AF 7D   32 B0 9B B6 8A 13 42 7C  .v...9..2.....B.
#     0010: F4 D0 7D 66 A5 43 63 70   22 7D AF C5 43 59 C5 2B  ...f.Ccp"...CY.+
#     0020: 78 95 C0 5A F5 77 ED 20   A9 AC DF 7C 38 2F 79 C1  x..Z.w. ....8/y.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.502 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:38.567 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "41 17 1D D2 09 9B 84 61 7D B6 17 B7 6F D2 55 26 97 7D 85 18 E8 C0 D1 48 04 15 08 06 0E 45 E5 64",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 02:16:38.873 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 02:16:38.874 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-29 02:16:39.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-29 02:16:39.807; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-29 02:16:40.206; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 02:16:40.209; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-29 02:16:40.209; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MwLaSk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:40.241 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 D9 F0 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:13.000 UTC",
#     "not  after"         : "2024-01-27 02:16:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 B3 66 DE AA E9 92 9C   66 5D 1A 68 2C 7D 8A E9  v.f.....f].h,...
#         0010: 41 7D 67 29                                        A.g)
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:40.245 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C E5 3B E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:05.000 UTC",
#     "not  after"         : "2024-01-27 02:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:40.259 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:40.346 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:40.347 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:40.347 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:40.347 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:40.483 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.483 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:40.485 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:40.485 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.491 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.503 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:40.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3E AC 15 41 0F C8 CE 59 99 8D 67 F2 9F E5 76 2B A8 60 C7 06 EC 50 AF 49 A5 E3 55 D1 EF E4 1E F5",
#   "session id"          : "C6 35 55 79 A6 7F D3 A7 E3 83 0C CD B0 3B 71 81 B9 46 21 1C 05 FC 7D 83 CB F1 D3 D7 E2 1D F0 45",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 74 EE 1A D9 0A 48 CE 77   A4 B4 A6 19 7E 52 1E 46  t....H.w.....R.F
#             0010: 06 C6 F5 80 50 0C FB CD   06 23 A2 84 67 14 DD 04  ....P....#..g...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.593 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "49 D3 09 89 5A FA 57 19 C4 E9 54 E3 DE 3E 0B 42 00 09 36 6E 36 B2 E2 97 FB 8B 36 30 19 1B 8F A7",
#   "session id"          : "C6 35 55 79 A6 7F D3 A7 E3 83 0C CD B0 3B 71 81 B9 46 21 1C 05 FC 7D 83 CB F1 D3 D7 E2 1D F0 45",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E 6E DD 6E DE 47 7D 71   70 95 7F E4 DB 92 D2 57  .n.n.G.qp......W
#           0010: D9 0B DA 35 22 A6 AD 4C   25 7A B1 91 AC 38 B7 7A  ...5"..L%z...8.z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.593 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.594 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.598 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.607 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.609 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.610 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.613 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.616 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.616 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.617 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.618 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.621 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D E0 A6 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:09.000 UTC",
#       "not  after"         : "2024-01-27 02:16:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 C4 3D E5 A6 C1 87 01   A7 EF D5 7D 1E B2 0E 37  ..=............7
#           0010: 56 C9 1A 1E                                        V...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.621 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.699 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 26 73 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-29 02:16:07.000 UTC",
#     "not  after"         : "2024-01-27 02:16:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#         0010: 69 FB FA DF                                        i...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#         0010: AE 36 15 37                                        .6.7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.703 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0B 23 55 38 B5 16 B7 6C   25 14 44 7B 49 1C 65 88  .#U8...l%.D.I.e.
#     0010: 1A BA 1A BA 8F DA E5 2C   72 7F 4B 2C 6A 04 B7 DD  .......,r.K,j...
#     0020: FE 45 28 3F 61 DD A7 BC   08 79 DC DC 87 53 AE 97  .E(?a....y...S..
#     0030: EA 87 77 13 F5 EA 86 7F   3C 0D D4 9E F2 6B 37 E8  ..w.....<....k7.
#     0040: 49 06 7B F2 5B CE 96 47   8E CB 11 7B 67 34 8C F4  I...[..G....g4..
#     0050: 17 BE 06 C9 39 98 F8 DF   2A 84 0C 11 35 F5 13 B6  ....9...*...5...
#     0060: AC 7E AD A6 E3 2E B0 8D   E3 47 A6 13 9C EE F8 CA  .........G......
#     0070: A9 C9 8C D4 18 11 1D F3   15 86 46 A4 39 2D F9 A3  ..........F.9-..
#     0080: 88 01 09 31 D6 56 A4 D3   85 1D 08 B2 11 46 14 B0  ...1.V.......F..
#     0090: 46 A1 EB 3C 0B 51 26 AC   D9 58 AC 80 4E 56 95 5C  F..<.Q&..X..NV.\
#     00A0: 97 85 69 56 E8 79 EE DD   E3 64 D4 57 20 47 E7 32  ..iV.y...d.W G.2
#     00B0: 0C 7A B7 5A 2C 50 06 EC   53 4D C4 D7 CE 0C 56 7C  .z.Z,P..SM....V.
#     00C0: 1F F2 CB 66 EA 0D FD FE   70 FB FC 96 55 5A F0 3C  ...f....p...UZ.<
#     00D0: B0 46 32 E6 9E 0F 63 BB   77 AB 89 EF 65 6E AF 69  .F2...c.w...en.i
#     00E0: A3 44 26 C5 A9 81 11 30   0B A6 33 CA 9E 55 2F 33  .D&....0..3..U/3
#     00F0: A4 40 5E 2D 3A 5D 18 EC   5A 9D 11 59 A3 10 36 05  .@^-:]..Z..Y..6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.704 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 60 83 6E 1B DC E0 F5   C0 F9 5D F4 BA 99 4A 68  .`.n......]...Jh
#     0010: 01 46 8C CB B4 8B C4 73   E6 D9 B6 38 B9 B2 0A A8  .F.....s...8....
#     0020: EE 8E 7B C0 55 CF 6E 89   5B E7 54 78 E1 AB 55 E7  ....U.n.[.Tx..U.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.707 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:40.708 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.708 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:40.708 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.708 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-29 02:16:40.709 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:40.709 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.709 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.712 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 D9 F0 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:13.000 UTC",
#       "not  after"         : "2024-01-27 02:16:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 B3 66 DE AA E9 92 9C   66 5D 1A 68 2C 7D 8A E9  v.f.....f].h,...
#           0010: 41 7D 67 29                                        A.g)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 26 73 7E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:07.000 UTC",
#       "not  after"         : "2024-01-27 02:16:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#           0010: 69 FB FA DF                                        i...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.738 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0B 01 EA DC 6E 88 A1 04   33 D5 F5 1C A8 FB 94 80  ....n...3.......
#     0010: E3 39 86 5F D4 91 64 8C   ED 27 05 6E 3E 36 8C C4  .9._..d..'.n>6..
#     0020: E7 C1 53 AE 48 78 20 89   23 4E E5 B8 4A DC D8 C7  ..S.Hx .#N..J...
#     0030: A8 41 78 D6 4D 03 E9 09   15 55 0C E3 83 44 F2 80  .Ax.M....U...D..
#     0040: 6A 5E D0 02 F4 BB F4 CA   1F 7E B6 A7 D4 03 DE E2  j^..............
#     0050: 30 ED 3F 3E AC 63 48 AD   3A 05 BD 94 E4 91 04 EC  0.?>.cH.:.......
#     0060: 33 C4 BA D4 33 23 77 DA   5E A5 66 47 0B 1F 95 1C  3...3#w.^.fG....
#     0070: 3F DE 68 6F 63 B3 B3 42   05 70 E7 03 14 49 56 6D  ?.hoc..B.p...IVm
#     0080: 2D 6B 2A 76 43 65 70 82   DB 17 DD F7 AF 89 13 F8  -k*vCep.........
#     0090: 4C AB 8A 00 1C BD DA 48   A5 EC E6 E3 5C 91 EC 6A  L......H....\..j
#     00A0: 7D 34 7A C3 42 E3 4A 68   44 F4 6B 8A F9 8F A4 42  .4z.B.JhD.k....B
#     00B0: E3 02 60 D5 B4 0D 4B FB   D6 AC 43 F4 65 05 EA D3  ..`...K...C.e...
#     00C0: E8 74 5C 79 D0 E7 4C 82   C2 2D E5 65 6C 04 59 C7  .t\y..L..-.el.Y.
#     00D0: 92 72 5C 50 8D A2 6A FE   D4 E4 86 B1 C9 AB 33 12  .r\P..j.......3.
#     00E0: 78 1D F3 55 6C BD FC 6A   54 C0 0C B9 9A 35 09 A1  x..Ul..jT....5..
#     00F0: 7F 76 02 9C 52 4D 61 DB   0F E1 5D C3 A6 7E 9A 96  .v..RMa...].....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.739 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 7B 60 B7 CA 48 16 6B   81 EB 9B 9C 7A 4B 68 0E  0.`..H.k....zKh.
#     0010: 27 8F DD F3 B0 57 40 19   E4 51 F9 C3 E3 D0 05 FE  '....W@..Q......
#     0020: 86 3D 2E F8 D5 88 3F 93   BF A7 9D 33 A6 36 7A FC  .=....?....3.6z.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.740 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:40.795 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "10 67 EF B5 17 88 F4 1D A5 60 A0 8F 1F E7 86 EF 05 C9 C1 00 F7 CB 7B 70 B9 3B 77 0D 69 8A AD 18",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-29 02:16:41.064 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-29 02:16:41.066 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-29 02:16:52.082; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:52.396 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 26 73 7E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:07.000 UTC",
#       "not  after"         : "2024-01-27 02:16:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#           0010: 69 FB FA DF                                        i...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 9F 0F 19 1F 5A FB 4C   84 48 CA 39 77 C9 CC D7  $....Z.L.H.9w...
#           0010: AE 36 15 37                                        .6.7
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C E5 3B E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-29 02:16:05.000 UTC",
#       "not  after"         : "2024-01-27 02:16:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F9 54 E3 04 24 FD E2   29 E6 19 49 D4 BD 56 2C  ..T..$..)..I..V,
#           0010: 69 FB FA DF                                        i...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-29 02:16:52.411 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:52.506 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:52.506 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:52.506 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:16:52.506 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:52.645 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.645 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:52.647 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-29 02:16:52.647 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.652 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.664 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.664 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.664 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-29 02:16:52.666 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "95 64 76 18 CE 2C 2B 15 DE 4E 44 DE F5 EE 3B 9E D5 D4 FF D8 A6 68 6F D8 44 77 A3 6B 42 6A A9 F2",
#     "session id"          : "7C D5 3C 4B E3 AA 83 16 B1 79 1C 81 88 D1 D5 54 1C C9 F1 21 3F B8 2D 5A 66 D8 40 5A A9 91 42 E8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 40 A3 81 03 AC C2 D2 A2   76 BB C9 5E 97 0E BD 16  @.......v..^....
#               0010: 78 1D D6 AE 6D A5 A6 B4   E2 BF 64 EA B6 87 A9 70  x...m.....d....p
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.684 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "50 B0 E5 03 78 12 68 21 AB 33 57 70 3B 1A 93 0A 1F DD 8A 2E 75 99 ED 0A A0 48 DC 35 08 9C B7 4B",
#     "session id"          : "7C D5 3C 4B E3 AA 83 16 B1 79 1C 81 88 D1 D5 54 1C C9 F1 21 3F B8 2D 5A 66 D8 40 5A A9 91 42 E8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 25 FD 92 12 DD 32 09 68   86 61 B7 A9 48 47 1C 99  %....2.h.a..HG..
#             0010: 7F 6A B7 E2 26 6A 73 6A   0B D8 C9 60 C0 7E 4C 77  .j..&jsj...`..Lw
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.684 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.685 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.687 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.688 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.688 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.697 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.698 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.699 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.703 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.704 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:52.704 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:16:52.704 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-29 02:16:52.705 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-29 02:18:11.173 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:18:11.219 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:18:11.219 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:18:11.219 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-29 02:18:11.219 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39952/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28356ms
ok 65 stop command for single port in 30697ms
ok 66 status detects locally running solr in 14657ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2164ms
ok 69 copying files around in 6510ms
ok 70 upconfig in 2593ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1233ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 5s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m28s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5756 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5756/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44229/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-28 19:30:24.848; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 19:30:24.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-28 19:30:26.059; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-28 19:30:26.097; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22238ms
ok 61 start solr with client truststore and security manager in 25027ms
not ok 62 start solr with mTLS needed in 56662ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-G33Jwh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44229.
#
# Started Solr server on port 44229 (pid=199821). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44230.
#
# Started Solr server on port 44230 (pid=200247). Happy searching!
#
# INFO  - 2023-10-28 19:31:48.455; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 19:31:48.460; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 19:31:48.844; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 19:31:48.847; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 19:31:48.848; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:48.881 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 42 74 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:24.000 UTC",
#     "not  after"         : "2024-01-26 19:31:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F CC 73 8A 20 93 75 7B   B7 6B A2 15 91 E4 B8 2E  _.s. .u..k......
#         0010: E4 38 9D D3                                        .8..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:48.886 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 8A BD 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:16.000 UTC",
#     "not  after"         : "2024-01-26 19:31:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:48.900 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:49.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:49.261 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:49.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:49.262 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:49.419 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:49.421 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:49.422 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.439 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:49.442 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "01 34 C1 24 6A F7 52 AF 4B 33 96 07 7D DC E6 D1 B1 95 04 D3 30 4C 77 66 A7 60 BC A9 4E BA F5 42",
#   "session id"          : "BE 13 23 1A 03 91 07 67 D3 1E AA E3 09 43 BF AF F6 E1 02 3B CD 33 1F 2D 66 DF C3 23 48 1E 66 1F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 79 FA 23 7D 3C 1B FA C5   12 8A 74 BA DB BB 1F 03  y.#.<.....t.....
#             0010: BE 40 31 42 E9 A9 72 DE   57 38 A7 F5 EE E5 D4 05  .@1B..r.W8......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.542 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9A 7E B2 4E C4 D2 BC 07 06 39 95 F7 A0 7A BE 2F 51 8F 4B AA F5 63 FC D6 65 FC 99 29 AC 88 B9 9A",
#   "session id"          : "BE 13 23 1A 03 91 07 67 D3 1E AA E3 09 43 BF AF F6 E1 02 3B CD 33 1F 2D 66 DF C3 23 48 1E 66 1F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 41 38 D3 12 D0 BC B2 40   C6 9B 3C 8F B0 56 9A 50  A8.....@..<..V.P
#           0010: 79 BC 0E 72 2A C0 9B CF   50 4D D0 9D 89 A0 41 2E  y..r*...PM....A.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.542 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.542 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.545 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.547 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.547 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.549 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.549 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.557 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.558 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.559 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.563 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.563 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.564 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.564 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.566 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.568 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.569 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.570 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.570 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.574 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 CF 0D 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:20.000 UTC",
#       "not  after"         : "2024-01-26 19:31:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA E4 D4 4C C5 BD 99 7C   81 C5 90 E5 54 CF F5 4E  ...L........T..N
#           0010: 46 C2 75 14                                        F.u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.574 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.659 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.662 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 09 5A 90 A9 EB 1C BB   8F 52 DE 63 09 DA BF B5  `.Z......R.c....
#     0010: 1F 6C 95 A3 43 C4 EF 63   F5 BD FD 86 52 A0 53 91  .l..C..c....R.S.
#     0020: 85 41 49 54 2C 1E AE BC   C5 D3 A3 BD 81 00 A2 6D  .AIT,..........m
#     0030: 77 D0 15 31 95 8B C8 42   BE FA A3 EE 74 B0 B3 00  w..1...B....t...
#     0040: 70 C5 A6 26 20 F4 4B D8   B5 BF 2D A7 04 F9 CC FD  p..& .K...-.....
#     0050: DB 69 19 C7 4C D2 35 3B   AC 97 E9 CB 56 53 E9 0F  .i..L.5;....VS..
#     0060: AD 0F 42 3E A6 EB 19 0A   E7 8C E6 43 0C C4 15 1B  ..B>.......C....
#     0070: 28 33 B7 19 0D C7 6D ED   54 42 A1 CA F7 F5 52 E1  (3....m.TB....R.
#     0080: A4 EA AC DC 6A 93 2E 36   2E 81 08 74 45 75 CA 0A  ....j..6...tEu..
#     0090: 57 8F D4 98 BB 7A 56 17   01 B5 3C F3 FB 9F D3 F5  W....zV...<.....
#     00A0: EE 63 CE 71 AA 70 6B 13   06 6A 9A 97 7F E9 6C C4  .c.q.pk..j....l.
#     00B0: B3 1B 35 BF 3A 24 E0 F9   CA 3D C4 E3 AA 04 2E 54  ..5.:$...=.....T
#     00C0: C1 90 68 34 62 72 96 D4   A9 7E C8 7E 07 3E DC 1E  ..h4br.......>..
#     00D0: DF BB A1 D7 9B C3 46 10   BE A7 E0 D3 3E 74 5F BB  ......F.....>t_.
#     00E0: 32 37 AE E7 B3 CC C1 E4   7E CC 6B BC 0C 77 F5 D9  27........k..w..
#     00F0: E2 CC 03 8B C1 9D 85 4E   39 B4 71 7E E3 5C 1C C8  .......N9.q..\..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.664 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4C DA 04 76 84 E8 F9 00   02 82 33 2A 6B 4D 53 64  L..v......3*kMSd
#     0010: F5 F6 90 30 7E 8A CB C2   AA 60 C7 D5 92 D3 2F 04  ...0.....`..../.
#     0020: 5C 36 17 18 A8 51 AA 35   A8 4E D9 74 28 B6 61 CB  \6...Q.5.N.t(.a.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.666 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:49.667 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:49.668 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:49.668 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:49.669 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.669 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.672 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 42 74 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:24.000 UTC",
#       "not  after"         : "2024-01-26 19:31:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F CC 73 8A 20 93 75 7B   B7 6B A2 15 91 E4 B8 2E  _.s. .u..k......
#           0010: E4 38 9D D3                                        .8..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 42 48 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:18.000 UTC",
#       "not  after"         : "2024-01-26 19:31:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#           0010: 63 FA FF BA                                        c...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.698 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B9 06 C8 70 7E A5 E9 45   85 08 51 81 23 AE 7E EC  ...p...E..Q.#...
#     0010: FF BA B9 13 6E B2 60 A2   83 04 F5 75 E6 50 84 42  ....n.`....u.P.B
#     0020: DD D5 AF CA 24 A8 10 D5   CA 00 88 5D FE 43 A5 1A  ....$......].C..
#     0030: 42 79 0D B3 76 91 CC B2   F7 3F 6F 40 52 32 51 16  By..v....?o@R2Q.
#     0040: AA 6F E1 7D 5F 7C DD C6   97 CD 6F 4E 8C 98 00 1A  .o.._.....oN....
#     0050: 43 5D 9E 66 97 9A C0 2F   BA 3D 4F 4B 9A 56 BB D1  C].f.../.=OK.V..
#     0060: 93 56 6E 3F 62 F2 D6 0E   81 CC F8 EF B2 ED B7 DF  .Vn?b...........
#     0070: F4 F0 DA DE D6 DE 4B 66   F8 25 A1 20 70 1F 03 02  ......Kf.%. p...
#     0080: A8 92 5D CA 95 D5 6E 77   92 34 40 CD 69 53 EC DE  ..]...nw.4@.iS..
#     0090: 1E D5 8D EC 8B AB 63 52   A3 E6 0A E0 72 F6 74 DE  ......cR....r.t.
#     00A0: 50 3E 06 D1 A2 FD A5 80   35 BF 3F 57 B8 B7 24 45  P>......5.?W..$E
#     00B0: 0E 03 B3 6D 46 A4 F5 6A   05 4B D5 37 E5 CE FD A2  ...mF..j.K.7....
#     00C0: 02 A9 58 C1 7D 2E 4F B5   09 04 79 5A 72 B2 C0 00  ..X...O...yZr...
#     00D0: E8 62 5C 37 75 D6 4B F7   4E 88 10 7D 1C AA 9A 51  .b\7u.K.N......Q
#     00E0: 54 6B D3 45 7F B0 E1 36   D5 0F 32 AF 62 56 4D 98  Tk.E...6..2.bVM.
#     00F0: 84 B2 50 FF C4 2D 97 9F   89 55 2C 1F 01 B4 F0 1A  ..P..-...U,.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.699 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 47 7C 41 47 13 B3 19 AC   1E C2 D3 FA 45 AC 25 38  G.AG........E.%8
#     0010: 5D C6 7D B9 91 D8 6F F4   BC E4 1D 3B 7D B4 62 47  ].....o....;..bG
#     0020: AF DE DB 19 55 D7 37 ED   9B 32 41 B8 53 FF FB AE  ....U.7..2A.S...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.700 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:49.767 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8A E6 01 BE 4C EA F2 74 4E 9D FE C4 52 8E 97 EE 64 6E 7A FB B6 3B F6 62 DC 03 B0 69 33 F8 B2 4B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 19:31:50.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 19:31:50.072 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-28 19:31:51.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 19:31:51.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 19:31:51.400; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 19:31:51.403; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 19:31:51.404; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G33Jwh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:51.436 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 42 74 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:24.000 UTC",
#     "not  after"         : "2024-01-26 19:31:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F CC 73 8A 20 93 75 7B   B7 6B A2 15 91 E4 B8 2E  _.s. .u..k......
#         0010: E4 38 9D D3                                        .8..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:51.440 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 8A BD 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:16.000 UTC",
#     "not  after"         : "2024-01-26 19:31:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 19:31:51.455 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:51.966 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:51.968 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:31:51.968 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.974 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.986 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.986 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.986 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:31:51.989 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "06 C5 82 2E A6 E7 A0 39 BF F4 19 19 85 9A 82 6D 9C 9F A6 DF D5 74 9C 4C BE DB 7E C4 02 F4 12 99",
#   "session id"          : "DE 03 E5 8E B9 5A 52 E7 EF B0 5C 9A C5 52 3F C4 9E E8 14 ED 1D 65 FF 91 D7 2E F8 6F 38 8F A6 25",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9F 8B B8 19 CA 7F 3C CE   7A 10 09 56 E7 28 AC 62  ......<.z..V.(.b
#             0010: 70 3C 23 3C B2 A0 2A 59   BC 7E 6A 74 AC 8A 0C 39  p<#<..*Y..jt...9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.081 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A3 D9 DD 51 D4 13 AD 0F D9 67 9E 68 5A 71 44 04 B6 45 B2 5E 8C B2 71 AF DB A5 31 2E 6C 33 78 6E",
#   "session id"          : "DE 03 E5 8E B9 5A 52 E7 EF B0 5C 9A C5 52 3F C4 9E E8 14 ED 1D 65 FF 91 D7 2E F8 6F 38 8F A6 25",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 94 87 42 C0 81 FB B5 81   7A E3 43 D2 39 22 73 0C  ..B.....z.C.9"s.
#           0010: A3 44 3C A2 2B A4 0D 35   13 FD E2 91 91 FA E4 4A  .D<.+..5.......J
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.082 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.082 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.083 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.088 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.090 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.092 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.100 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.101 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.102 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.106 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.106 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.108 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.109 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.109 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.110 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.110 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.111 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.111 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.114 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 CF 0D 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:20.000 UTC",
#       "not  after"         : "2024-01-26 19:31:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA E4 D4 4C C5 BD 99 7C   81 C5 90 E5 54 CF F5 4E  ...L........T..N
#           0010: 46 C2 75 14                                        F.u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.115 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:52.167 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:52.168 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:52.169 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:31:52.169 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.213 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 42 48 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 19:31:18.000 UTC",
#     "not  after"         : "2024-01-26 19:31:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#         0010: 63 FA FF BA                                        c...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#         0010: 84 D9 C3 18                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.217 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A 5F FA 8D 65 AE AB 3F   34 E2 36 9A F0 CE 76 11  ._..e..?4.6...v.
#     0010: BF DF C6 A3 B2 C8 4F E3   E4 B8 74 17 68 ED A8 2B  ......O...t.h..+
#     0020: BC 38 48 98 9F 1B 93 39   B9 3A 0E 5A 2C F5 8D 45  .8H....9.:.Z,..E
#     0030: 54 47 1A 25 7F E3 7B 98   21 D6 C5 6D 82 DD 9E 82  TG.%....!..m....
#     0040: 6F A6 E1 34 63 B7 12 CE   E7 9A 92 6A 60 BD 61 2A  o..4c......j`.a*
#     0050: DA 8B E5 C5 90 83 27 EB   41 37 A5 19 3C 6A 82 98  ......'.A7..<j..
#     0060: 3E CA A3 0F 00 72 A8 68   99 A2 3A 42 84 87 75 F4  >....r.h..:B..u.
#     0070: BB 81 13 2A 02 D7 91 5C   99 70 F6 B3 53 E1 27 35  ...*...\.p..S.'5
#     0080: 7F 46 9C 46 E1 F6 2D 1C   D2 3D C0 BA 48 DA 6B F8  .F.F..-..=..H.k.
#     0090: 6B 60 59 8F 7E 5D 8F 2D   FF 0C 74 70 F1 AD F9 59  k`Y..].-..tp...Y
#     00A0: 6C 42 5F 52 5D 75 38 A8   6C BD 97 83 B5 F7 0B 33  lB_R]u8.l......3
#     00B0: 7F 8D 68 F4 CC 89 87 24   75 32 43 A2 B6 73 2F 34  ..h....$u2C..s/4
#     00C0: 72 4B 9D EE 9C AE 13 9E   1F C1 A8 3E C5 7D 28 19  rK.........>..(.
#     00D0: 24 1F C4 E7 0D 61 1A 47   EE 1A C9 62 A1 7F A4 A2  $....a.G...b....
#     00E0: BD 53 57 21 17 B3 F2 0B   FB A7 C3 46 2B 2A 00 50  .SW!.......F+*.P
#     00F0: 41 5F 3A AE 8A 24 D5 A2   59 BC 41 6F EF C9 F6 5D  A_:..$..Y.Ao...]
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.219 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B 6B 50 54 69 C1 94 67   E6 46 14 AE 9A F9 7D D0  +kPTi..g.F......
#     0010: F2 F2 94 F8 BA C4 BD DE   CE F8 84 2E 19 BB 00 B3  ................
#     0020: 56 37 68 FD 5D 13 5F 24   61 79 88 42 5D 9D 82 5F  V7h.]._$ay.B].._
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.221 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:52.222 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.222 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:52.223 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.223 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 19:31:52.223 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:31:52.223 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.224 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.226 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 42 74 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:24.000 UTC",
#       "not  after"         : "2024-01-26 19:31:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F CC 73 8A 20 93 75 7B   B7 6B A2 15 91 E4 B8 2E  _.s. .u..k......
#           0010: E4 38 9D D3                                        .8..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 42 48 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:18.000 UTC",
#       "not  after"         : "2024-01-26 19:31:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#           0010: 63 FA FF BA                                        c...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.252 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AE C2 21 A9 07 B8 F4 9E   1D 9F A2 4D AE 85 0D 18  ..!........M....
#     0010: B6 9B 82 3E 84 EC DA 7B   93 99 E8 7E 36 73 A1 3A  ...>........6s.:
#     0020: 04 E8 69 05 21 96 26 96   6E 6E 01 65 CD BC C5 D8  ..i.!.&.nn.e....
#     0030: 09 2F 8A 0D B2 EA 4C CC   EE AF FE 9C E3 E8 94 ED  ./....L.........
#     0040: 09 1F 26 C9 8A 76 CC 9E   FA 7C 32 C3 56 98 E2 18  ..&..v....2.V...
#     0050: FB 25 E5 BA 42 26 88 17   13 52 1C EA 92 72 24 E9  .%..B&...R...r$.
#     0060: EC D7 D5 18 F0 95 14 36   A4 51 64 85 47 69 38 AE  .......6.Qd.Gi8.
#     0070: CB 9E F5 13 F0 D8 5B 7B   E8 45 1C B1 53 92 3A C9  ......[..E..S.:.
#     0080: E7 43 49 41 5D 39 B7 FA   F1 AF 99 57 EF 83 91 F2  .CIA]9.....W....
#     0090: 83 6A 5A 0D 13 D5 02 70   79 57 C1 E3 43 1D 4C EB  .jZ....pyW..C.L.
#     00A0: C3 1A 28 A0 A0 E4 09 FE   66 04 9D EA 73 C5 06 D4  ..(.....f...s...
#     00B0: 5D 95 52 D5 57 0E 55 90   F8 3C F5 83 0B 15 4C 7D  ].R.W.U..<....L.
#     00C0: B8 99 71 E5 75 7A 63 71   F4 6D F3 62 E4 15 22 44  ..q.uzcq.m.b.."D
#     00D0: 15 08 B0 F1 A5 46 20 DA   1B C2 FD FA D5 C2 4F AA  .....F .......O.
#     00E0: 96 80 9C 2A 64 AC D1 BB   39 51 C2 09 F0 59 17 BC  ...*d...9Q...Y..
#     00F0: C7 D1 2A E4 78 0B 1E 2B   7F EE 01 EC 6E 3B 77 9C  ..*.x..+....n;w.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.253 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D 1F 67 11 E4 8C 93 3B   BA 14 56 B2 E1 31 B4 B9  =.g....;..V..1..
#     0010: 2A 5B 84 EB F5 65 FC 00   89 8C F7 7F 2F CF CB B7  *[...e....../...
#     0020: 77 52 35 68 CC 90 01 77   C4 5B 82 6D 69 C1 22 30  wR5h...w.[.mi."0
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.254 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:31:52.310 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 CF B8 1E 82 E2 BC 83 18 0B 39 2E 8C ED F0 69 43 65 83 96 25 A9 65 79 7C 80 86 0A C9 FA 89 D6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 19:31:52.589 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 19:31:52.590 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-28 19:32:03.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-28 19:32:03.711 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 42 48 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:18.000 UTC",
#       "not  after"         : "2024-01-26 19:31:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#           0010: 63 FA FF BA                                        c...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 D9 22 7F 11 FA 05 C6   81 76 84 19 04 37 29 AB  .."......v...7).
#           0010: 84 D9 C3 18                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 8A BD 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 19:31:16.000 UTC",
#       "not  after"         : "2024-01-26 19:31:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D3 9C FD CA F5 21 AA F0   D8 8E AC 03 82 ED 70 2E  .....!........p.
#           0010: 63 FA FF BA                                        c...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-28 19:32:03.726 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:32:03.841 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:32:03.841 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:32:03.841 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:32:03.841 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:32:03.974 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.975 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:32:03.976 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 19:32:03.977 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.982 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.994 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 19:32:03.996 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "41 55 9F FF 39 24 7C A0 60 BF 20 71 24 85 E4 AF 7E 58 27 09 5A B8 7F C6 3F 45 5A BD 49 0D 67 55",
#     "session id"          : "23 C7 8E 8C 20 BC C6 A6 9D E5 D3 7D 0E 99 16 43 00 34 EA 34 2C 6A DD 6D 57 BB 7F BA 72 F8 EF A0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D6 5A 77 15 E1 BA 42 A9   91 DF 41 65 95 3C 74 B3  .Zw...B...Ae.<t.
#               0010: AA 44 C7 95 FA FA C9 02   A6 D7 EE D0 35 69 11 53  .D..........5i.S
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.015 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "00 29 16 18 1C F2 31 5F 5A 31 D8 F6 E2 68 CD 2F 1B 94 CF 55 5B AA 5A 8A 80 0D 64 C3 B9 67 95 D3",
#     "session id"          : "23 C7 8E 8C 20 BC C6 A6 9D E5 D3 7D 0E 99 16 43 00 34 EA 34 2C 6A DD 6D 57 BB 7F BA 72 F8 EF A0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F8 F0 BE 8E 05 DE 41 CC   8B 9E 99 F1 B8 CE 52 5A  ......A.......RZ
#             0010: 63 19 B8 67 F7 68 6B 84   AA 23 E8 B3 35 B8 1C 7C  c..g.hk..#..5...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.016 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.016 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.017 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.017 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.017 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.018 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.020 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.021 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:32:04.023 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:32:04.023 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.023 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.023 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.032 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.034 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.035 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:32:04.040 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:32:04.040 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 19:32:04.041 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 19:33:21.703 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:33:21.744 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:33:21.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:33:21.745 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 19:33:21.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44230/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28050ms
ok 65 stop command for single port in 31056ms
ok 66 status detects locally running solr in 14348ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2154ms
ok 69 copying files around in 6465ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 13s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m44.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5755 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5755/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([705D8054BD27D074:45A96B0F56FBE62A]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5877 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=705D8054BD27D074 -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 50s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m16.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5754 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5754/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34057/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-28 09:07:45.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 09:07:45.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-28 09:07:46.527; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-28 09:07:46.567; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22542ms
ok 61 start solr with client truststore and security manager in 25445ms
not ok 62 start solr with mTLS needed in 57333ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-QpDoLS/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34057.
#
# Started Solr server on port 34057 (pid=200151). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34058.
#
# Started Solr server on port 34058 (pid=200601). Happy searching!
#
# INFO  - 2023-10-28 09:09:09.397; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 09:09:09.403; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 09:09:09.778; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 09:09:09.781; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 09:09:09.781; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:09.815 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 CC 26 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:45.000 UTC",
#     "not  after"         : "2024-01-26 09:08:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 69 6E D7 2A FD 68 FF   32 E9 4C 98 45 47 3D 94  .in.*.h.2.L.EG=.
#         0010: B2 FA 22 69                                        .."i
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:09.820 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 1D 96 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:37.000 UTC",
#     "not  after"         : "2024-01-26 09:08:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:09.835 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:10.169 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:10.171 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:10.172 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:10.172 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:10.330 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.330 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:10.332 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:10.333 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.339 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.351 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.352 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:10.355 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AD 90 79 55 F4 03 FC 10 60 50 9D 11 B5 B4 E1 D3 F2 ED 3F CE 00 E1 43 34 B2 2A F0 D2 73 74 90 BA",
#   "session id"          : "BF 65 DA 7B 16 04 8B DD FB F6 98 BA 75 69 28 92 B0 E5 40 F5 CC AF 64 65 C4 D9 DA 37 78 48 9C 7D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C9 50 D9 11 61 A1 4E 4B   BB 34 2C AA 60 AF 5B D0  .P..a.NK.4,.`.[.
#             0010: D7 7A 6F 68 EC 22 5A 49   AC 5D 6C CE C3 AC F6 09  .zoh."ZI.]l.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.469 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "91 54 4D 7A 5A DC DD 89 A0 88 C9 97 4B 0D 2E 0A 10 1C F1 44 27 22 AD 27 CA DF C1 67 02 ED 4F 1B",
#   "session id"          : "BF 65 DA 7B 16 04 8B DD FB F6 98 BA 75 69 28 92 B0 E5 40 F5 CC AF 64 65 C4 D9 DA 37 78 48 9C 7D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C6 78 97 32 2B 2D C0 64   4C 6D EA CB 4A 32 54 37  .x.2+-.dLm..J2T7
#           0010: 97 5C 4E 77 84 62 81 90   37 62 06 C1 A0 9D 96 34  .\Nw.b..7b.....4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.469 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.470 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.472 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.475 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.476 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.485 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.487 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.488 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.492 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.492 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.493 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.493 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.493 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.495 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.496 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.496 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.496 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.498 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.499 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.499 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.502 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 B7 CA C1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:41.000 UTC",
#       "not  after"         : "2024-01-26 09:08:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 53 54 0B A8 46 94 10   2C 2A F2 D1 30 94 96 9C  QST..F..,*..0...
#           0010: 54 6B 93 E4                                        Tk..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.503 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.590 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.594 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 D5 FD CF 56 40 9D DE   37 F3 BD 33 8D B2 62 3C  S...V@..7..3..b<
#     0010: 06 A9 03 99 39 6A EE 67   17 03 65 F5 07 35 CB 05  ....9j.g..e..5..
#     0020: 3F D0 7A 63 E7 08 C3 8C   D5 1A 0A FB CA B7 CA FA  ?.zc............
#     0030: 1D 46 97 CA AA 6B 1A 28   27 0E 33 31 D7 5E 56 F0  .F...k.('.31.^V.
#     0040: 13 9A 6A 51 53 2D BF 9A   DD 9E D3 B2 C0 E7 E6 B1  ..jQS-..........
#     0050: 8F B4 95 A1 B2 D4 58 17   0A 60 3E EE A7 E4 9C 73  ......X..`>....s
#     0060: 0B 32 E6 E2 ED F3 38 F8   11 53 BF 6C 6E 6D A3 D5  .2....8..S.lnm..
#     0070: 77 ED 0B 33 4F F4 88 11   2A 8B 23 6B 5C 1B 78 B4  w..3O...*.#k\.x.
#     0080: BA 4B 96 F2 91 E8 00 00   0A 58 0F 6C 11 73 9A 06  .K.......X.l.s..
#     0090: 47 FD AA 54 20 87 FE F9   9A 26 58 FE 47 E0 3B B2  G..T ....&X.G.;.
#     00A0: B1 02 24 03 34 8C D5 2B   F0 68 78 F3 29 9F E1 FB  ..$.4..+.hx.)...
#     00B0: 5A D3 92 92 E9 F6 26 B0   0D D8 24 98 12 ED F8 FD  Z.....&...$.....
#     00C0: 6A 43 0D CF 5E 9A CD 46   88 B7 5A 6D F7 A4 27 BE  jC..^..F..Zm..'.
#     00D0: 10 2D E7 72 BB 00 E4 92   89 48 E4 E9 45 D0 3D FD  .-.r.....H..E.=.
#     00E0: F4 E2 FB FF 15 B5 F4 FC   A3 6C 6E 5B B2 08 18 0C  .........ln[....
#     00F0: 3E 83 6B BE 70 5A 0C 22   C5 21 62 54 AB 83 E7 F3  >.k.pZ.".!bT....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.595 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 9A C4 06 7E 79 74 44   FA C0 33 62 85 13 B0 AA  .....ytD..3b....
#     0010: 6A ED 71 E4 EB 73 26 40   AD 50 00 0D B2 14 4C 1B  j.q..s&@.P....L.
#     0020: 3A D7 A0 7F 3B 7A 98 DE   E2 40 28 40 D3 82 42 ED  :...;z...@(@..B.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.598 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:10.598 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.599 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:10.599 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.599 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:10.599 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:10.600 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.600 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.603 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 CC 26 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:45.000 UTC",
#       "not  after"         : "2024-01-26 09:08:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 69 6E D7 2A FD 68 FF   32 E9 4C 98 45 47 3D 94  .in.*.h.2.L.EG=.
#           0010: B2 FA 22 69                                        .."i
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 1A DB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:39.000 UTC",
#       "not  after"         : "2024-01-26 09:08:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#           0010: FB E9 FF F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.629 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D AB 8C B3 26 1F FF 87   4C ED 70 A1 1A C3 1B A1  m...&...L.p.....
#     0010: 2E E0 33 6D 63 73 D0 F3   6C 59 49 A6 15 14 97 B4  ..3mcs..lYI.....
#     0020: 2B 54 D4 66 7B 5C B9 BA   D6 9C A9 1E 20 AC 47 CD  +T.f.\...... .G.
#     0030: AB 88 64 12 9D 6D 1F 2F   D4 09 23 37 77 80 A0 62  ..d..m./..#7w..b
#     0040: 11 AA 5D 29 7E EF 3E FD   32 79 88 8E 83 71 8B 6B  ..])..>.2y...q.k
#     0050: C6 AF 05 F4 67 06 73 00   99 EC CC 47 A8 10 37 3F  ....g.s....G..7?
#     0060: E8 C2 15 F2 89 F2 26 52   40 DB 51 E9 7E 5D 5E 00  ......&R@.Q..]^.
#     0070: 31 43 59 58 EB FC 8B B2   E2 AF B6 E7 34 32 EB 11  1CYX........42..
#     0080: 93 C5 8C FD AB 89 4A 50   EC 91 A5 40 1C 76 CA 06  ......JP...@.v..
#     0090: B6 FE 6B 1A 29 79 27 2D   3F 91 A6 CF 01 30 9B 01  ..k.)y'-?....0..
#     00A0: 6A 53 CD E6 ED 32 BF 17   9A EF 70 B1 39 72 02 F0  jS...2....p.9r..
#     00B0: 6B 4F CD 29 C1 24 9F B2   FB D9 6A 4F 8E 10 1A 25  kO.).$....jO...%
#     00C0: 66 FE C0 AD 13 DB 5C E7   D2 46 05 36 AF 7D 5C 3D  f.....\..F.6..\=
#     00D0: 6A A0 3C 81 A0 3C BE 42   C6 94 83 FF C5 93 F1 E2  j.<..<.B........
#     00E0: C9 63 88 29 C0 12 65 EF   4C 4E 62 4E 21 11 6D 27  .c.)..e.LNbN!.m'
#     00F0: 46 85 7A F1 E0 19 0A D7   0E 18 7A 6F F7 A3 BD C6  F.z.......zo....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.630 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD A1 61 6D B2 12 4C 96   C0 D1 1C F9 39 2F 88 2F  ..am..L.....9/./
#     0010: 67 E4 74 EF D5 2C 2B 68   7E 86 F8 F6 FD C2 80 B3  g.t..,+h........
#     0020: 24 B0 AC F9 85 0F B4 B1   E0 65 D0 E2 FD 3B EB 03  $........e...;..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.630 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:10.691 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 62 09 EF 50 07 C4 38 B1 A5 44 6E EA B5 5B B5 CC 1D A8 65 73 E5 97 05 82 E6 F5 63 E8 3C C8 50",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 09:09:10.976 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 09:09:10.977 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-28 09:09:11.940; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 09:09:11.945; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 09:09:12.317; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 09:09:12.320; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 09:09:12.321; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QpDoLS/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:12.354 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 CC 26 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:45.000 UTC",
#     "not  after"         : "2024-01-26 09:08:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 69 6E D7 2A FD 68 FF   32 E9 4C 98 45 47 3D 94  .in.*.h.2.L.EG=.
#         0010: B2 FA 22 69                                        .."i
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:12.358 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 1D 96 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:37.000 UTC",
#     "not  after"         : "2024-01-26 09:08:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:12.374 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:12.870 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.871 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:12.873 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:12.873 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.893 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:12.896 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9F 88 E0 EA F1 DD 36 FC DF 77 5E 1A EB 27 4E 0B A3 8C 7D 5F 2C AB FB 4C 8B 91 FC 9D C9 71 DE 5E",
#   "session id"          : "8C E0 B3 37 9E A1 C9 51 42 80 46 E4 5A E0 30 25 A1 60 18 D8 3F A6 BE 1D 60 86 65 25 9C F1 31 A2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 13 D6 CC B6 44 8D C1 F5   30 CF A7 84 D3 B9 C4 6C  ....D...0......l
#             0010: D6 71 74 5F 1A A3 B4 58   E4 BF 2D 90 D2 52 07 64  .qt_...X..-..R.d
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.003 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2C C6 AC 52 89 18 59 97 79 93 77 E7 FE F8 9C E1 39 46 DA C5 00 31 15 85 93 1F 5A 9C B3 7F 07 1A",
#   "session id"          : "8C E0 B3 37 9E A1 C9 51 42 80 46 E4 5A E0 30 25 A1 60 18 D8 3F A6 BE 1D 60 86 65 25 9C F1 31 A2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 85 E5 9C 2C 46 9F 63 7D   DD 52 51 94 DA 39 64 51  ...,F.c..RQ..9dQ
#           0010: 7F 66 A5 93 14 C6 01 F5   BB AF 23 CF 18 10 64 38  .f........#...d8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.004 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.004 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.006 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.009 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.010 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.012 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.020 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.022 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.023 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.027 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.027 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.027 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.028 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.028 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.028 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.028 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.028 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.029 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.030 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.031 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.031 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.032 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.033 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.034 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.034 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.038 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 B7 CA C1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:41.000 UTC",
#       "not  after"         : "2024-01-26 09:08:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 53 54 0B A8 46 94 10   2C 2A F2 D1 30 94 96 9C  QST..F..,*..0...
#           0010: 54 6B 93 E4                                        Tk..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.038 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:13.111 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:13.112 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:13.112 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:09:13.112 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.154 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 1A DB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 09:08:39.000 UTC",
#     "not  after"         : "2024-01-26 09:08:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#         0010: FB E9 FF F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#         0010: DE 9C CA 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.158 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 05 61 E8 69 A9 2B 2D   26 05 52 86 23 9F 76 12  ..a.i.+-&.R.#.v.
#     0010: 00 6E 2B 30 36 BF 99 AD   89 08 1E FD AE 0E 07 C7  .n+06...........
#     0020: 2B 84 CB CA 01 5F D8 93   4B 93 0D 73 BC 50 BC AC  +...._..K..s.P..
#     0030: AA C6 DF 3D B3 43 FD F9   61 F8 02 F9 FB 7E 3C 18  ...=.C..a.....<.
#     0040: EA D0 9E 8E 15 B0 7B 97   A7 AA BD 7D ED 0F 41 A0  ..............A.
#     0050: 76 AD 92 84 E6 DF A8 52   2E 85 DB 12 61 5C A9 86  v......R....a\..
#     0060: 61 13 38 A8 99 33 7D D7   E6 23 70 7B 83 D2 82 B8  a.8..3...#p.....
#     0070: 48 CB 53 21 63 78 BE A1   43 68 2E B2 6A 37 F9 BC  H.S!cx..Ch..j7..
#     0080: 4A 3F C4 CC 18 2C 34 63   4D 2A 6D FA D6 00 D3 28  J?...,4cM*m....(
#     0090: F5 13 EA A3 7D 8B A6 9B   1A 94 8F 89 A2 21 0F 09  .............!..
#     00A0: D8 6D C2 64 1A 33 53 AC   C3 31 FE DB 41 14 59 93  .m.d.3S..1..A.Y.
#     00B0: 43 22 FA 05 3D B8 FD A4   A1 3A C8 CF 74 DF B3 0A  C"..=....:..t...
#     00C0: 8E 02 F3 45 4B DB 54 9F   E8 6C A1 3E BB 29 7A D7  ...EK.T..l.>.)z.
#     00D0: 38 2A B4 D2 8D C9 34 A5   94 EC A3 EB FF 8E 01 3C  8*....4........<
#     00E0: D7 FF 7E 09 1D DB F0 D2   0E 67 00 8E 9E 6F C3 D8  .........g...o..
#     00F0: C3 58 3C 3C 4F 3E 41 58   2E 43 01 97 8E 95 17 22  .X<<O>AX.C....."
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.159 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2F 56 AC 66 44 C4 5D 68   24 B4 70 D3 4F B8 5D 5E  /V.fD.]h$.p.O.]^
#     0010: DE 14 29 8C B4 8B 39 DA   8F AB 48 35 25 EF 8F 76  ..)...9...H5%..v
#     0020: 12 30 BA 89 BD 79 85 16   96 AC 29 60 08 7D 0F 03  .0...y....)`....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.162 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:13.163 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:13.163 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 09:09:13.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:13.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.165 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.167 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 CC 26 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:45.000 UTC",
#       "not  after"         : "2024-01-26 09:08:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 69 6E D7 2A FD 68 FF   32 E9 4C 98 45 47 3D 94  .in.*.h.2.L.EG=.
#           0010: B2 FA 22 69                                        .."i
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 1A DB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:39.000 UTC",
#       "not  after"         : "2024-01-26 09:08:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#           0010: FB E9 FF F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.194 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 46 30 C7 D6 B0 1E 6A   4A D9 6B 00 FA EE 05 74  gF0....jJ.k....t
#     0010: BC CF 65 D3 1E 95 FB 7E   DB EC 30 0C B7 D8 73 E4  ..e.......0...s.
#     0020: F6 BF 2E 4F F5 64 32 2C   8E E5 0F 75 7D 83 9C 2F  ...O.d2,...u.../
#     0030: 9C E8 28 75 E3 80 F7 D9   76 EC 4D 39 C3 F1 92 97  ..(u....v.M9....
#     0040: 60 DC EE 85 3E 2E 67 55   7A AE 6B 72 CB 9A DC 47  `...>.gUz.kr...G
#     0050: 8C 35 01 C7 6F B3 94 B2   97 74 5D 70 A3 DB ED 86  .5..o....t]p....
#     0060: 84 DA 08 4A 55 2D 4F AA   14 B0 ED D2 B6 C0 00 EF  ...JU-O.........
#     0070: 5E FD 55 BD 17 D0 4D 7C   7E 39 91 B0 5A 8F 9D 96  ^.U...M..9..Z...
#     0080: 0C 4D 3B E9 FF 8C 66 40   FF 5A 02 AB 9F 96 98 A3  .M;...f@.Z......
#     0090: 80 47 EA A1 A1 05 35 4D   3A FD D3 DC 7A B0 20 D0  .G....5M:...z. .
#     00A0: 7B CE DA F5 59 8A C5 0B   83 7D 0E 06 60 0F DE AE  ....Y.......`...
#     00B0: 6E 1A 01 D0 5B F8 5D F2   A5 AA 20 C2 FC A9 1C AD  n...[.]... .....
#     00C0: B1 7C 4A B1 5F 82 88 3F   A9 F0 EF 3E 1F 39 C4 E8  ..J._..?...>.9..
#     00D0: 59 51 56 BA D4 66 86 0C   81 F7 5E 86 B6 EC 78 06  YQV..f....^...x.
#     00E0: CA 3D C8 E8 03 7C A8 23   32 B6 C7 7A F9 71 89 16  .=.....#2..z.q..
#     00F0: F3 1F E8 2C C0 C1 E2 60   A2 11 43 83 E4 C5 E0 0F  ...,...`..C.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.195 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D A0 C5 96 DA 45 8C F2   B6 32 AD 3C F4 D3 8A 7B  =....E...2.<....
#     0010: A0 72 02 03 54 30 83 00   2F F6 97 60 7B CB D1 44  .r..T0../..`...D
#     0020: AD 7F 72 2A 9B C6 A8 56   56 F3 B4 5F 52 7A 8A B4  ..r*...VV.._Rz..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.195 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:13.257 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "63 59 28 FC 67 C3 90 2C E1 32 8A 22 7A 1C 2F 15 71 4A AF 1F 56 A8 CE 61 E8 C0 B3 CD 58 56 72 E7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 09:09:13.557 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 09:09:13.558 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-28 09:09:24.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:25.226 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 1A DB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:39.000 UTC",
#       "not  after"         : "2024-01-26 09:08:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#           0010: FB E9 FF F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 59 0F A1 1C E2 6E C9   59 36 78 A1 D4 8E B7 11  ZY....n.Y6x.....
#           0010: DE 9C CA 99                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 1D 96 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 09:08:37.000 UTC",
#       "not  after"         : "2024-01-26 09:08:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 54 7F F2 6A C5 2F 0E   FF 21 6C 53 EE 9C 2F 5C  .T..j./..!lS../\
#           0010: FB E9 FF F6                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-28 09:09:25.241 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:25.473 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.473 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:25.475 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 09:09:25.475 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.491 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.492 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 09:09:25.494 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6C 04 AF 48 6B 06 3A C3 E4 E0 28 A9 3C F6 81 B1 BB ED D8 29 CA 18 5F 3F 7E 3A 68 A8 4B 48 1B 62",
#     "session id"          : "6A 44 75 4D ED 8B EA A9 8B 76 61 93 8F F7 07 89 06 85 15 24 A1 CE CD BE 65 79 D6 8E D9 C6 B8 4F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C7 38 86 C9 73 06 92 7F   35 BC 75 F7 0D 0E 12 B5  .8..s...5.u.....
#               0010: 3D 8E A7 C9 D1 02 C9 19   BA 8A 58 1C AB CE 5C 35  =.........X...\5
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.516 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DB 75 27 82 9E FE 59 DC 40 12 28 53 FF 7E 46 CF 84 1C FB 03 C0 C8 CC 99 73 23 4C 71 28 1E BF 93",
#     "session id"          : "6A 44 75 4D ED 8B EA A9 8B 76 61 93 8F F7 07 89 06 85 15 24 A1 CE CD BE 65 79 D6 8E D9 C6 B8 4F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 29 3C 4A 81 50 CD 6B 83   DD 1F 29 EA 00 75 92 74  )<J.P.k...)..u.t
#             0010: 7C 61 26 5B 1E 88 FD 15   9E 24 3E 5E 30 FB FC 36  .a&[.....$>^0..6
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.516 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.516 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.521 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.521 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.521 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.521 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:25.522 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:25.523 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.530 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.532 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.533 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.536 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:09:25.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 09:09:25.539 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "cert

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 09:10:44.546 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:10:44.595 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:10:44.596 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:10:44.596 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 09:10:44.596 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34058/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28131ms
ok 65 stop command for single port in 31693ms
ok 66 status detects locally running solr in 14319ms
ok 67 status does not expose cli parameters to end user in 206ms
ok 68 listing out files in 2207ms
ok 69 copying files around in 6641ms
ok 70 upconfig in 2624ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 16s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m41s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5753 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5753/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41385/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-28 03:57:44.018; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 03:57:44.024; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-28 03:57:44.959; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-28 03:57:44.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23825ms
ok 61 start solr with client truststore and security manager in 25104ms
not ok 62 start solr with mTLS needed in 58153ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-CESMUg/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41385.
#
# Started Solr server on port 41385 (pid=199841). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41386.
#
# Started Solr server on port 41386 (pid=200266). Happy searching!
#
# INFO  - 2023-10-28 03:59:09.130; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 03:59:09.136; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 03:59:09.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 03:59:09.517; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 03:59:09.517; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:09.551 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C FC 34 22",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:45.000 UTC",
#     "not  after"         : "2024-01-26 03:58:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 3C 4B 9B 1D C6 7C 5C   0B CB FE B9 30 14 98 E5  b<K....\....0...
#         0010: E6 85 3D F8                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:09.556 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 04 D1 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:36.000 UTC",
#     "not  after"         : "2024-01-26 03:58:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:09.570 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:09.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:09.892 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:09.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:09.893 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:10.064 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.065 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:10.067 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:10.067 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.072 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.084 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.084 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.085 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:10.088 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D7 C0 4D 75 AD E9 92 06 DA CE 1C 09 C9 5B 2D 20 F0 5C C1 6E F1 7F 08 6A 67 6B 61 90 C6 42 68 ED",
#   "session id"          : "71 2A FA 75 E1 01 94 DC 67 04 71 CA 4B BB B8 BD DB 4E 33 08 41 B3 38 15 D5 65 5D 00 F7 C1 FA 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 46 FE 43 02 4E 2A 4F   EA 3B 70 53 50 94 EA 2C  .F.C.N*O.;pSP..,
#             0010: D7 A2 FA 64 FE EB 87 B5   74 E6 43 7F 3D 9A 06 50  ...d....t.C.=..P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.191 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 2D 3D 3A C5 71 CD D9 B8 E2 1B 68 56 27 3E 86 77 24 E2 AE 94 CF AD 52 C5 95 23 DA E4 E0 CD 14",
#   "session id"          : "71 2A FA 75 E1 01 94 DC 67 04 71 CA 4B BB B8 BD DB 4E 33 08 41 B3 38 15 D5 65 5D 00 F7 C1 FA 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 19 04 79 B1 AC 2E 7A E6   95 22 C0 B5 2A DC 43 E8  ..y...z.."..*.C.
#           0010: AF C8 F8 8E AC 73 7F 0F   7E 67 5A 95 D1 4E 97 74  .....s...gZ..N.t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.192 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.192 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.194 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.194 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.194 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.194 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.194 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.196 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.197 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.197 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.199 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.199 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.206 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.208 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.209 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.213 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.213 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.213 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.213 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.213 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.214 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.214 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.214 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.214 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.216 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.217 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.217 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.217 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.219 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.220 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.223 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 2C AC E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:41.000 UTC",
#       "not  after"         : "2024-01-26 03:58:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 81 0A A2 1C FE 05 88   BA D1 1E C5 EB ED 42 E2  K.............B.
#           0010: 9D D9 C1 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.224 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.307 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.310 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 1A 20 E1 64 5F 65 6F   17 B6 9A 6A 99 D1 D0 E7  w. .d_eo...j....
#     0010: CF 97 E8 25 B3 8F F7 07   2E 4C 81 C9 BF F5 F6 D7  ...%.....L......
#     0020: B7 C3 99 62 D3 DD C3 5A   CE ED 9C 0D AB 8C 80 AC  ...b...Z........
#     0030: E5 F9 F7 73 DD 3D 73 2E   F1 1D E9 F9 42 32 17 76  ...s.=s.....B2.v
#     0040: 81 7A 32 89 5E 59 2E 72   95 AB E6 2B E4 BA 4B FC  .z2.^Y.r...+..K.
#     0050: 61 06 A1 30 14 4C 6C 5B   EC 79 C2 94 2F 11 37 C4  a..0.Ll[.y../.7.
#     0060: C6 95 4E E0 1D B7 1E 81   16 2A 5E FD 31 C0 46 69  ..N......*^.1.Fi
#     0070: 8A C0 AE 87 F7 36 70 7C   C2 D5 6D 3F 6A A9 9B 6E  .....6p...m?j..n
#     0080: B5 18 A0 5B EC F0 52 85   DC 77 23 3F 0F 58 14 0B  ...[..R..w#?.X..
#     0090: 7F 5D 74 A5 1C 0C FD 0E   AB 04 72 51 E4 6A 12 77  .]t.......rQ.j.w
#     00A0: 00 8B C1 6D 93 04 3A 2D   4B 49 BE 24 68 DC 49 03  ...m..:-KI.$h.I.
#     00B0: 2B 78 A4 C7 B4 07 D6 BC   47 93 98 08 7C 9D 77 2B  +x......G.....w+
#     00C0: 2A 07 87 35 CC BC 2A 8C   EA A9 0E BA D7 B4 97 47  *..5..*........G
#     00D0: 3F BA 7B E2 7D 3F 22 86   75 EA F4 61 F5 7B 91 D1  ?....?".u..a....
#     00E0: B0 D5 87 E8 B2 E7 97 0A   1A BB 62 7C F8 5C E8 AA  ..........b..\..
#     00F0: 43 B9 56 0B 40 80 B7 8C   37 22 58 A4 D3 82 B1 99  C.V.@...7"X.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.312 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EB AC 71 10 8C 88 DB FD   1E 29 94 02 60 BE F5 E8  ..q......)..`...
#     0010: 1B 2F 83 6D 45 63 ED 6F   B4 E2 87 49 D1 BA 3F D1  ./.mEc.o...I..?.
#     0020: 07 7D 77 A0 FB C3 9B 32   8E BB 08 8F 68 F3 AB AC  ..w....2....h...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.314 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:10.315 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.315 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:10.316 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.316 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:10.316 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:10.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.317 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.321 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C FC 34 22",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:45.000 UTC",
#       "not  after"         : "2024-01-26 03:58:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 3C 4B 9B 1D C6 7C 5C   0B CB FE B9 30 14 98 E5  b<K....\....0...
#           0010: E6 85 3D F8                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 32 4D 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:39.000 UTC",
#       "not  after"         : "2024-01-26 03:58:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#           0010: CC 42 5E CA                                        .B^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.348 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 48 80 DB B8 43 5B 72   F2 28 CD 24 DD C6 C2 3A  .H...C[r.(.$...:
#     0010: A2 0D 79 41 1B D0 3D 71   FA 5F 53 44 51 F7 2F F8  ..yA..=q._SDQ./.
#     0020: DA 60 4A 23 05 86 02 A4   85 22 19 28 A1 DA E4 05  .`J#.....".(....
#     0030: CE 3B 69 1F 98 71 35 72   4C 3A F9 EE 1E 6E 85 31  .;i..q5rL:...n.1
#     0040: 18 8F 0D 1F 19 F5 F7 13   5D 8C CC 61 C3 97 AB 8B  ........]..a....
#     0050: AF EB C6 1A A4 5B 4B 29   CD B4 62 1A 42 F6 16 FA  .....[K)..b.B...
#     0060: 54 2A 4E 07 BE 18 CA BA   DF DC 70 92 BA 1D 95 FA  T*N.......p.....
#     0070: 39 37 FF 56 81 CA 8F 1A   46 B6 CA 7A 9D 36 3D DB  97.V....F..z.6=.
#     0080: 87 8B FB EB 1B EE 11 53   F5 7D 2A 45 47 B5 E8 F7  .......S..*EG...
#     0090: FC EE A1 95 F9 F7 31 08   7C F6 4E 80 54 FB F4 50  ......1...N.T..P
#     00A0: 4F 5D 3A DC 04 4D 0B EC   0C 69 91 4B B9 E7 FF 1D  O]:..M...i.K....
#     00B0: 28 E6 5E 04 46 BC A2 3F   17 4C EE 39 62 FB 7B 2F  (.^.F..?.L.9b../
#     00C0: 8F 91 6A ED 47 0B 47 DD   0B 7C 5F C0 05 91 BB F5  ..j.G.G..._.....
#     00D0: AD AA 09 FB 43 CC D6 8C   E2 C4 C3 AD 0C 75 10 69  ....C........u.i
#     00E0: 29 1C 26 18 E8 76 DA 3C   C0 27 86 C4 27 44 A3 91  ).&..v.<.'..'D..
#     00F0: BF 8A 7A 57 18 7E 0E 21   D1 CF 39 20 5B 41 D2 C3  ..zW...!..9 [A..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.349 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7B 02 AB 98 71 0D 4C E2   52 3B 9E BA 8D 85 1E 8E  ....q.L.R;......
#     0010: DB 5F FA C8 6C 2E BE 6A   EA 4A 49 26 0B 31 6D 19  ._..l..j.JI&.1m.
#     0020: E5 4C 26 34 5D 33 24 E3   4F 66 E5 9C 78 18 5B BE  .L&4]3$.Of..x.[.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.350 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:10.414 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7C 4B 50 DB 3A A1 95 25 A7 E9 1E 72 04 B5 AB E4 42 EA 0F DD CF BD 89 C1 D4 20 58 05 2E 45 6B 39",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 03:59:10.706 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 03:59:10.707 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-28 03:59:11.672; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 03:59:11.677; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 03:59:12.072; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 03:59:12.075; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 03:59:12.076; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CESMUg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:12.110 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C FC 34 22",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:45.000 UTC",
#     "not  after"         : "2024-01-26 03:58:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 3C 4B 9B 1D C6 7C 5C   0B CB FE B9 30 14 98 E5  b<K....\....0...
#         0010: E6 85 3D F8                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:12.115 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 04 D1 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:36.000 UTC",
#     "not  after"         : "2024-01-26 03:58:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:12.130 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:12.482 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:12.482 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:12.483 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:12.483 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:12.628 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:12.630 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:12.631 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.637 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.649 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.649 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.650 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:12.653 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "35 D0 7A 4E 14 8C F1 B4 5D E4 1B 88 73 65 20 3F 58 2B F6 E3 FB 66 CF 1B F6 29 57 6F 73 DE AE 48",
#   "session id"          : "F0 15 91 4A 99 BE EE A2 1C 23 F9 48 ED 88 9E 16 5B 94 93 81 8B 49 AA BC 7B 33 3D 3B 90 87 76 72",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 57 E2 D5 F3 B1 28 FC 3A   93 64 C7 18 08 E1 B9 43  W....(.:.d.....C
#             0010: 70 F7 EF CF BB 26 A3 8A   E2 4E 82 89 09 E0 DD 6A  p....&...N.....j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.747 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B3 31 E7 05 51 62 27 86 DC 9C 4C 75 C6 7A 7C 12 A0 03 D8 75 78 3B AE 3B 58 B6 C7 2C CA F5 CD 29",
#   "session id"          : "F0 15 91 4A 99 BE EE A2 1C 23 F9 48 ED 88 9E 16 5B 94 93 81 8B 49 AA BC 7B 33 3D 3B 90 87 76 72",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 52 D9 4B CB 7F BA FA   C8 E3 1D 72 01 31 7E E8  .R.K.......r.1..
#           0010: F9 EF E8 B1 DD 35 B4 3C   8F 59 72 04 77 C0 42 14  .....5.<.Yr.w.B.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.748 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.748 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.750 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.750 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.750 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.750 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.750 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.753 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.753 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.755 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.763 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.765 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.766 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.770 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.770 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.770 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.770 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.770 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.771 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.771 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.773 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.773 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.774 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.774 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.775 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.776 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.776 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.780 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 2C AC E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:41.000 UTC",
#       "not  after"         : "2024-01-26 03:58:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 81 0A A2 1C FE 05 88   BA D1 1E C5 EB ED 42 E2  K.............B.
#           0010: 9D D9 C1 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.781 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.866 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 32 4D 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 03:58:39.000 UTC",
#     "not  after"         : "2024-01-26 03:58:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#         0010: CC 42 5E CA                                        .B^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#         0010: D7 B3 52 C9                                        ..R.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.870 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 07 7F 52 5A 56 C2 40   FE 34 F4 90 30 EE FF A6  j..RZV.@.4..0...
#     0010: 32 BF 66 43 D5 F3 5E F7   51 20 45 9A 02 1D 79 B2  2.fC..^.Q E...y.
#     0020: 33 0A B6 57 EA 25 CB 8C   0D 8B 5C 7F 9B 3F 1A 5E  3..W.%....\..?.^
#     0030: 23 C3 B0 75 4C 4F E9 80   09 2B 52 86 C8 81 75 B0  #..uLO...+R...u.
#     0040: A1 D0 D0 2B 95 8B BF 12   12 C2 6E 22 25 E3 91 68  ...+......n"%..h
#     0050: 4D 51 9E 17 7C 81 FF 50   7A 32 BE 08 F7 0F 07 1C  MQ.....Pz2......
#     0060: 5A FC 08 6C 7D A5 CD 98   73 ED C3 B7 37 5C 38 54  Z..l....s...7\8T
#     0070: D9 A7 36 C9 B2 80 62 46   9E 1B 6B 98 F6 42 DC D1  ..6...bF..k..B..
#     0080: 65 9C CD 48 1D 7E 28 8D   48 49 EC B4 33 B3 C7 95  e..H..(.HI..3...
#     0090: C3 42 5F FD E1 1E DE 7F   CF 42 6F 24 84 EB 8C 13  .B_......Bo$....
#     00A0: 7A 9F 35 D7 80 4F F4 E3   16 B2 AB 77 55 4A 5B 88  z.5..O.....wUJ[.
#     00B0: 7B 5A CA EE 08 F4 94 E0   4D 19 F0 66 89 74 D9 FB  .Z......M..f.t..
#     00C0: FB 3D 7A 7B F2 FB 7F 30   20 EB 1E 34 83 3D BC C5  .=z....0 ..4.=..
#     00D0: D9 64 BF A7 34 E4 51 8E   FC F2 1F 98 68 BB C3 13  .d..4.Q.....h...
#     00E0: DE CD 5F CE C1 C2 0D 12   EC D9 8A 68 DF 3C 23 AB  .._........h.<#.
#     00F0: 36 B7 49 FC 30 79 0E 7B   F0 47 41 2C BB D0 7C C1  6.I.0y...GA,....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.873 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B 15 57 1E 30 AD D4 EB   34 73 96 B4 69 AD 28 B7  ;.W.0...4s..i.(.
#     0010: B1 AF E8 23 5A A7 16 37   73 9D 73 AB 64 3F F0 1F  ...#Z..7s.s.d?..
#     0020: 57 A4 7E D3 F6 87 8B 05   E9 23 EF C8 A2 92 2A 38  W........#....*8
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.875 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:12.876 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.877 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:12.877 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.877 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 03:59:12.878 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:12.878 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.879 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.882 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C FC 34 22",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:45.000 UTC",
#       "not  after"         : "2024-01-26 03:58:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 3C 4B 9B 1D C6 7C 5C   0B CB FE B9 30 14 98 E5  b<K....\....0...
#           0010: E6 85 3D F8                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 32 4D 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:39.000 UTC",
#       "not  after"         : "2024-01-26 03:58:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#           0010: CC 42 5E CA                                        .B^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.908 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 9F 7E 67 03 97 6C 22   0D 61 4B BD 0D 6C 6D E6  ...g..l".aK..lm.
#     0010: 39 D3 0A 01 B7 B0 5D 74   85 23 DD 01 6E 94 5C 73  9.....]t.#..n.\s
#     0020: 83 DB 03 D4 21 D7 C2 19   8C 11 3F 43 F0 7A F0 EF  ....!.....?C.z..
#     0030: 85 A9 87 81 4F 4E 8D B8   DF CF 3A 3B CF 79 7D 45  ....ON....:;.y.E
#     0040: 6A 38 DE C5 5C C6 56 B1   CA 9D 3C 9C 67 09 B0 FF  j8..\.V...<.g...
#     0050: 72 9C A0 CC 15 B2 19 08   01 9A 17 BF 8F 4B 3D 43  r............K=C
#     0060: 6D AE FB 33 AA 95 2B 5E   F1 08 08 B4 8C C7 65 D1  m..3..+^......e.
#     0070: 25 9D 6C 37 C6 B0 1D 5F   E0 01 F2 E0 EF A3 6B C9  %.l7..._......k.
#     0080: 92 B3 D7 B1 22 B3 6E 1D   CF 4F B4 6C 47 ED 65 65  ....".n..O.lG.ee
#     0090: 8D 27 75 55 63 BA B9 79   08 B2 E9 06 61 44 E8 86  .'uUc..y....aD..
#     00A0: 53 4E 7D E4 5E B8 0F BE   D4 57 06 A7 71 7E 15 8E  SN..^....W..q...
#     00B0: 1C 4C 07 1A A8 45 3E 67   15 F0 3E D3 21 FE A0 E6  .L...E>g..>.!...
#     00C0: D2 28 F8 A9 87 94 2E 6E   52 83 9A FB 5D 67 9B E5  .(.....nR...]g..
#     00D0: FF 7B D3 40 EC 95 9D 50   2E A4 AC D7 59 40 52 16  ...@...P....Y@R.
#     00E0: 1D 90 26 FA E7 9A E6 70   C9 FA 8D 0C 89 B0 18 37  ..&....p.......7
#     00F0: 44 A8 FC 87 7D F8 AC D1   8A B5 CD BF 72 29 6B 5E  D...........r)k^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.910 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C2 6C 9A 1C 66 0F 6A FD   81 EE 4C 33 36 C1 76 76  .l..f.j...L36.vv
#     0010: E5 FF 2B B4 D8 7A 35 76   11 9A 95 E0 AC 84 01 69  ..+..z5v.......i
#     0020: 8B BC 70 56 8A 19 18 7E   CB CD F8 28 04 7B 7D DD  ..pV.......(....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.910 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:12.972 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CA 55 0E A1 85 2C DA D0 8C 8A 31 6E 7A 5E 55 33 63 26 16 A5 A0 50 8E 09 92 EB B4 2E 9D 89 88 EE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 03:59:13.258 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 03:59:13.259 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-28 03:59:24.776; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:25.118 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 04 D1 F5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:36.000 UTC",
#       "not  after"         : "2024-01-26 03:58:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#           0010: CC 42 5E CA                                        .B^.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 32 4D 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 03:58:39.000 UTC",
#       "not  after"         : "2024-01-26 03:58:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 F3 A1 DB 57 E2 86 67   45 47 9E 56 D2 4D 28 29  ....W..gEG.V.M()
#           0010: CC 42 5E CA                                        .B^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 DD 1C C2 DF 9B 64 86   EA 80 C5 60 41 5C 8F 4E  ......d....`A\.N
#           0010: D7 B3 52 C9                                        ..R.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-28 03:59:25.135 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:25.475 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:25.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:25.476 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 03:59:25.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:25.620 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.621 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:25.623 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 03:59:25.623 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.642 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.642 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 03:59:25.644 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A9 93 C6 9D 8A 56 3D 18 A6 32 7A DB BD FC 20 2E AF 93 06 E3 23 B1 18 B0 52 0F 81 F3 8F 30 7F F1",
#     "session id"          : "BF 64 24 5F 09 A3 AD 0C 98 61 21 96 BC 18 F3 A4 B7 0F BF E3 F8 9A 86 C6 7B AE 06 F8 C5 5A A5 C0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C0 09 5E DC 5B 4C 92 C1   FF AB AA 08 7A DB B0 A3  ..^.[L......z...
#               0010: 29 C5 D7 04 0D 43 63 F0   EC A8 80 B2 02 5A 5A 48  )....Cc......ZZH
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.664 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "2E 59 24 43 3E 21 C7 76 74 6A 6C F5 A3 DC 2D A6 D9 98 76 83 9D 20 F0 FB 22 1A 23 58 66 35 E5 03",
#     "session id"          : "BF 64 24 5F 09 A3 AD 0C 98 61 21 96 BC 18 F3 A4 B7 0F BF E3 F8 9A 86 C6 7B AE 06 F8 C5 5A A5 C0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 64 2A C8 31 92 55 09 B0   2E AE 22 9B 8D E1 4C E6  d*.1.U...."...L.
#             0010: B5 95 A9 29 0B A3 F7 D5   19 88 92 DC A8 A8 4D 77  ...)..........Mw
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.664 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.665 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.667 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.670 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.679 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.680 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.681 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.685 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:25.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 03:59:25.687 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 03:59:25.688 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 04:00:45.270 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 04:00:45.312 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 04:00:45.313 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 04:00:45.313 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 04:00:45.313 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41386/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28451ms
ok 65 stop command for single port in 31447ms
ok 66 status detects locally running solr in 14380ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2192ms
ok 69 copying files around in 6640ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1220ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 35s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m0s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5752 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5752/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42795/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-28 00:15:48.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 00:15:48.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-28 00:15:49.804; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-28 00:15:49.843; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23118ms
ok 61 start solr with client truststore and security manager in 25594ms
not ok 62 start solr with mTLS needed in 56547ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-mZVec7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42795.
#
# Started Solr server on port 42795 (pid=197912). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42796.
#
# Started Solr server on port 42796 (pid=198366). Happy searching!
#
# INFO  - 2023-10-28 00:17:13.716; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 00:17:13.721; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 00:17:14.084; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 00:17:14.088; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 00:17:14.088; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:14.123 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 3E 3A A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:49.000 UTC",
#     "not  after"         : "2024-01-26 24:16:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE EB 7F CC 5A 9D 37 6A   AB 6D 02 8D AF 96 93 FC  ....Z.7j.m......
#         0010: CB 76 C6 4B                                        .v.K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:14.128 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 0B 43 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:41.000 UTC",
#     "not  after"         : "2024-01-26 24:16:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:14.144 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:14.519 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:14.520 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:14.521 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:14.521 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:14.668 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.668 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:14.670 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:14.670 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.676 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.687 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.688 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.688 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:14.691 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D6 51 EE 3B D3 55 C8 77 E5 CE F1 60 93 3B E2 D7 62 DE F1 E7 7D 52 A5 EF CE 94 71 3D A8 CD B6 81",
#   "session id"          : "FF 3D DC 8B 30 44 D8 1E 4A 9D DD FC B8 9C A7 1C E0 A3 35 35 61 91 36 EE CA 59 6E B6 96 74 DC B0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E1 75 54 75 B3 2B 5D 5B   2A 5F 89 20 A9 5F 90 CA  .uTu.+][*_. ._..
#             0010: 0D EB 08 59 C3 93 D2 DC   61 C1 51 C1 A7 52 B7 1D  ...Y....a.Q..R..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.803 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "13 FD CE 56 69 58 8E 84 FE 7D 71 2F B4 03 78 77 E7 89 3B F8 91 A2 0B 09 28 21 89 30 B4 F2 82 80",
#   "session id"          : "FF 3D DC 8B 30 44 D8 1E 4A 9D DD FC B8 9C A7 1C E0 A3 35 35 61 91 36 EE CA 59 6E B6 96 74 DC B0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BD 31 36 62 66 46 60 CE   CE 07 94 5F EE 7A C5 4A  .16bfF`...._.z.J
#           0010: 41 18 10 90 5D BF 34 EA   94 00 14 ED 29 FD 58 14  A...].4.....).X.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.803 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.803 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.804 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.806 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.808 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.809 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.821 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.823 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.824 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.828 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.828 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.828 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.829 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.829 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.831 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.832 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.832 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.833 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.834 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.835 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.839 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 1B 18 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:46.000 UTC",
#       "not  after"         : "2024-01-26 24:16:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 37 42 1C 40 9F 19 A6   4A 3E 83 1E 01 46 E0 7E  .7B.@...J>...F..
#           0010: 76 BF D7 4A                                        v..J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.840 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.945 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.951 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 28 5E 36 B7 22 51 57   39 E0 A7 9D 4A AF 25 9D  P(^6."QW9...J.%.
#     0010: 9B 1F 07 3A 66 DD 8F 84   D2 80 83 6B C5 0E C4 8F  ...:f......k....
#     0020: 17 1B 47 3F 2F C3 E0 18   1A 62 EA 95 80 EB 8A D0  ..G?/....b......
#     0030: FD 65 0D 1D 34 EE 76 AD   82 AA 40 EA AB 8A F2 7E  .e..4.v...@.....
#     0040: 7B A0 31 CE C6 4F C2 CE   A3 5C 2B F6 E9 DF DD 1D  ..1..O...\+.....
#     0050: CB 59 52 DC F5 F3 8B C3   3A 3A E7 75 6E 83 50 13  .YR.....::.un.P.
#     0060: 34 11 0B 97 EB 02 CA B5   7D C1 9F 2F 02 07 64 A4  4........../..d.
#     0070: CB 6D 55 0E 99 69 27 12   99 FA A4 60 3D C5 69 C8  .mU..i'....`=.i.
#     0080: 88 FD 1F 93 9C CF 6F 72   27 FA C6 EE B3 B5 99 E7  ......or'.......
#     0090: 5F 05 CF 2A 81 F3 15 18   E4 87 DC 11 3C 35 F2 37  _..*........<5.7
#     00A0: 31 16 71 9F 22 78 B5 31   6D BB AA 1F AA 8C CC 3F  1.q."x.1m......?
#     00B0: 7B C1 E4 D5 AD BB EC A5   EC 57 91 28 4A 51 87 CA  .........W.(JQ..
#     00C0: D6 39 21 4C C2 DA 32 EE   FF 44 38 0C ED 45 C9 80  .9!L..2..D8..E..
#     00D0: F6 CD F4 4C 2C 08 58 E0   43 35 D1 31 CC E3 A4 5D  ...L,.X.C5.1...]
#     00E0: F3 CD 5B 93 AC 9B 5B BA   D8 D8 68 5D 94 93 A8 35  ..[...[...h]...5
#     00F0: 72 8F 0F B5 32 C6 92 33   85 86 33 0A 4C 9C 62 19  r...2..3..3.L.b.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.953 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 BC 10 48 99 0A 22 0B   0B CF AA 06 A1 B0 79 D0  ...H..".......y.
#     0010: 59 C2 41 A1 EB D2 B8 03   19 83 4F 85 F1 48 71 45  Y.A.......O..HqE
#     0020: FA 57 42 B4 10 2B E9 A2   08 F9 06 20 CA 6B 3A A1  .WB..+..... .k:.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.956 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:14.957 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.958 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:14.958 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.958 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:14.958 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:14.959 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.959 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.962 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3E 3A A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:49.000 UTC",
#       "not  after"         : "2024-01-26 24:16:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE EB 7F CC 5A 9D 37 6A   AB 6D 02 8D AF 96 93 FC  ....Z.7j.m......
#           0010: CB 76 C6 4B                                        .v.K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 E7 30 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:43.000 UTC",
#       "not  after"         : "2024-01-26 24:16:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#           0010: 8D 48 7F E3                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:14.999 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 E1 7A 83 96 65 4E 0F   33 00 4F 96 44 EF 11 7F  y.z..eN.3.O.D...
#     0010: 89 76 E8 03 E1 EA 9A 09   55 6E A2 9E DD 97 EA 39  .v......Un.....9
#     0020: 8B 10 AD 1D B1 37 3D 5E   5F F0 50 3A 08 E8 52 7D  .....7=^_.P:..R.
#     0030: 00 A0 A4 C5 B5 26 D1 68   56 D4 75 14 0B 27 C7 2D  .....&.hV.u..'.-
#     0040: 47 BA A6 36 17 4B 53 7A   BD F8 E0 08 52 C8 40 CF  G..6.KSz....R.@.
#     0050: FB B3 89 FF F5 5C 4E 76   62 0B 94 19 BE 94 B1 FF  .....\Nvb.......
#     0060: 7C 32 5A FE DA 97 1D 70   45 12 C9 B7 F4 04 BE 54  .2Z....pE......T
#     0070: BF 9E 7E 3C 7E B9 56 5B   6A 28 68 D2 4C A3 83 06  ...<..V[j(h.L...
#     0080: E2 E7 03 38 6F 86 01 E8   62 4B D8 A3 EE FE DF 8D  ...8o...bK......
#     0090: 19 4B DD A6 35 31 79 BB   01 13 AC F0 4A 22 CB 58  .K..51y.....J".X
#     00A0: 03 4E 4C F4 DC 6D A7 B3   3C F4 E7 1D 35 E5 4A C1  .NL..m..<...5.J.
#     00B0: FF 44 F0 BF 3F BF 67 73   40 8C 2F 26 8D 18 E4 55  .D..?.gs@./&...U
#     00C0: 50 C1 64 9D C9 A7 39 1F   2C 74 61 DB C1 5B 61 E0  P.d...9.,ta..[a.
#     00D0: 8A 56 49 88 00 EB 14 EF   D8 47 75 3A 2A 17 30 32  .VI......Gu:*.02
#     00E0: D8 56 9D CE 19 73 7C 89   29 F2 08 F1 EE 07 F8 65  .V...s..)......e
#     00F0: FC 30 8E FA 8F F2 A6 13   41 C9 DE E5 E1 28 4A 7B  .0......A....(J.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:15.000 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF 8D A9 E2 A9 4D 58 8A   FF 71 55 E8 2A 08 1A 5D  .....MX..qU.*..]
#     0010: 66 26 50 07 DB 1B 83 D1   EC 79 F4 C3 18 08 6F 29  f&P......y....o)
#     0020: D0 EA DB 9D 7C CF 04 47   67 3B 28 95 61 D9 96 4B  .......Gg;(.a..K
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:15.001 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:15.067 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 B3 EB 0F A9 36 21 91 54 A4 36 3F 88 AC 22 A1 C9 51 BE 3A C4 80 4C 19 91 91 33 05 A3 85 CF 3E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 24:17:15.356 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 24:17:15.357 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-28 00:17:16.299; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 00:17:16.304; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 00:17:16.673; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 00:17:16.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 00:17:16.676; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mZVec7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:16.707 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 3E 3A A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:49.000 UTC",
#     "not  after"         : "2024-01-26 24:16:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE EB 7F CC 5A 9D 37 6A   AB 6D 02 8D AF 96 93 FC  ....Z.7j.m......
#         0010: CB 76 C6 4B                                        .v.K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:16.711 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 0B 43 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:41.000 UTC",
#     "not  after"         : "2024-01-26 24:16:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:16.725 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:16.814 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:16.814 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:16.815 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:16.815 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:16.954 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.954 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:16.956 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:16.956 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.973 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.973 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.973 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:16.975 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D7 53 A8 06 D7 7E 11 BB 14 28 9C 97 6D F5 4D B1 55 B0 F1 C4 8F FF 0E 48 E7 8D 68 63 55 EA 1F A5",
#   "session id"          : "AF B8 6B 1F 4D 67 A5 B2 70 CA 07 E7 7D 57 8B 01 B3 24 90 7D 3D F9 86 BC 9F 2E 77 E9 E6 A0 5E 94",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CE BD 81 BF 0A BC 51 C4   96 8C 44 EE 54 B0 E9 CD  ......Q...D.T...
#             0010: 99 66 78 DC A0 CF CA A1   39 47 54 0F 56 F2 AF 78  .fx.....9GT.V..x
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.069 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "21 A3 84 E5 CD 92 14 3E 84 0E A0 A1 68 D8 14 7D A3 7A 8B 4D 21 0D 35 A1 C3 3E C2 03 0A 8A 1F 0A",
#   "session id"          : "AF B8 6B 1F 4D 67 A5 B2 70 CA 07 E7 7D 57 8B 01 B3 24 90 7D 3D F9 86 BC 9F 2E 77 E9 E6 A0 5E 94",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 01 30 19 62 1B 7E 09 C1   E1 D0 D2 95 6F 24 77 2A  .0.b........o$w*
#           0010: 22 70 34 7C 0F 43 03 E7   03 71 3A 01 5D 47 B7 5B  "p4..C...q:.]G.[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.069 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.070 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.072 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.074 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.074 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.083 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.084 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.086 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.089 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.089 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.092 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.092 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.092 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.093 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.093 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.094 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.097 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 1B 18 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:46.000 UTC",
#       "not  after"         : "2024-01-26 24:16:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 37 42 1C 40 9F 19 A6   4A 3E 83 1E 01 46 E0 7E  .7B.@...J>...F..
#           0010: 76 BF D7 4A                                        v..J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.097 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.177 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 E7 30 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 24:16:43.000 UTC",
#     "not  after"         : "2024-01-26 24:16:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#         0010: 8D 48 7F E3                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#         0010: EA 97 3F F7                                        ..?.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.181 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 83 ED 7D 06 71 6A 99   18 FE CC 84 59 54 FE 6F  .....qj.....YT.o
#     0010: 95 DD 8C 00 07 47 6B 2B   82 FD 95 11 44 77 0C C2  .....Gk+....Dw..
#     0020: 60 C1 F7 3F 0B 21 F0 8A   4D 15 0A 27 E7 B6 2A 3A  `..?.!..M..'..*:
#     0030: 0D 5A BB 5F 96 9E 7C 76   7A DE 6C 36 01 1F 75 BB  .Z._...vz.l6..u.
#     0040: 82 4F 0E A6 DA CC 00 D2   A5 C8 6E 71 DE B7 DF C9  .O........nq....
#     0050: DA 4F 6D 53 A5 22 97 4D   45 2E 59 BF 36 53 9A 5E  .OmS.".ME.Y.6S.^
#     0060: B2 9F 2D E8 05 61 A4 67   9F 48 76 58 BD F2 22 56  ..-..a.g.HvX.."V
#     0070: 41 83 41 DD 2E 31 C3 53   0F 96 8E 58 B6 1D DD 5E  A.A..1.S...X...^
#     0080: D1 49 C4 A9 37 E6 92 2D   CD CC 8C C0 71 40 F6 0D  .I..7..-....q@..
#     0090: 45 4C BB 77 C8 80 DD D6   63 F1 F5 DF AF 33 28 78  EL.w....c....3(x
#     00A0: 90 AC 2F 48 19 DB 13 26   FD 0A DE 73 E4 EC E2 24  ../H...&...s...$
#     00B0: 21 B7 C5 60 8F 05 69 22   02 3D 9A 64 60 AE 8A 1D  !..`..i".=.d`...
#     00C0: BB 60 28 15 3C B2 94 55   EA 34 26 D0 DE F2 36 F0  .`(.<..U.4&...6.
#     00D0: B0 32 52 27 BA 2E 33 85   91 D6 41 A1 BB 4A D4 32  .2R'..3...A..J.2
#     00E0: 80 C0 C4 2B BB 73 FA 8E   EC 5A C2 34 1A E0 32 48  ...+.s...Z.4..2H
#     00F0: 2E CF 8A 7E B7 74 DF FC   3B 18 ED 91 36 0A 10 94  .....t..;...6...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.182 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 6A 3E C7 C2 77 B7 99   7A 61 20 0B 74 D4 14 B3  .j>..w..za .t...
#     0010: FB CD 8A 98 FE 88 C7 A6   64 8B 00 36 1E B7 2E 35  ........d..6...5
#     0020: 6E 3C 8A DF 29 6C 29 DA   16 86 AF CF 4C 5A 93 67  n<..)l).....LZ.g
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.185 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:17.186 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.186 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:17.186 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.186 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-28 24:17:17.186 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:17.187 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.187 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.189 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3E 3A A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:49.000 UTC",
#       "not  after"         : "2024-01-26 24:16:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE EB 7F CC 5A 9D 37 6A   AB 6D 02 8D AF 96 93 FC  ....Z.7j.m......
#           0010: CB 76 C6 4B                                        .v.K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 E7 30 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:43.000 UTC",
#       "not  after"         : "2024-01-26 24:16:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#           0010: 8D 48 7F E3                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.215 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 62 FC 18 C2 89 EA 92   86 39 C6 12 2F 5F B9 25  @b.......9../_.%
#     0010: F0 46 06 D8 26 5C 81 AE   D7 8D 89 F8 3B 24 0F 7B  .F..&\......;$..
#     0020: 0E BF 73 1F 55 2D B9 D2   D0 9D 77 E3 E8 15 48 FA  ..s.U-....w...H.
#     0030: 69 39 5C D2 6A E7 6F 5E   59 06 3D 1A 2C 4E D9 B6  i9\.j.o^Y.=.,N..
#     0040: 7A 60 F2 81 41 58 09 3B   E9 16 0A 76 5B 48 85 AA  z`..AX.;...v[H..
#     0050: 5A 4B 77 75 CF 64 03 7D   CB 1A 44 1E DB 0E 8B 27  ZKwu.d....D....'
#     0060: 2A CD 03 6F AC CA 81 26   34 96 42 1A 2E C5 AE 18  *..o...&4.B.....
#     0070: 23 8F 2B 03 E4 97 9A 21   79 AC 4B 36 DD 06 5A C3  #.+....!y.K6..Z.
#     0080: E4 3B D1 A2 7D 48 73 45   5A 05 7C B5 2A A2 F2 7B  .;...HsEZ...*...
#     0090: 10 56 68 C4 CA 66 1D FA   02 D6 A9 55 B8 31 90 38  .Vh..f.....U.1.8
#     00A0: D7 3F F2 16 3F 29 40 E1   14 F9 86 DC 4D 5F EE CA  .?..?)@.....M_..
#     00B0: 54 B9 B2 7E 69 46 12 5F   6C 02 56 01 1E E3 D6 E0  T...iF._l.V.....
#     00C0: 85 80 7F 99 00 30 FE 07   30 11 16 61 38 0F 70 97  .....0..0..a8.p.
#     00D0: C9 D3 6B 8D 36 49 C5 B7   44 B0 97 87 C2 7A 32 7B  ..k.6I..D....z2.
#     00E0: 3D AD 38 A8 34 9C D9 5B   5E 9C 58 E7 D3 20 F9 66  =.8.4..[^.X.. .f
#     00F0: 09 82 AA A7 BD BA 5E B2   6D FC FB 32 F4 BC 53 7B  ......^.m..2..S.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.216 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E BD A9 78 9E BA 45 22   04 4A 99 D0 AA C1 3F CB  ...x..E".J....?.
#     0010: 30 7C 3E BF E7 B1 78 3A   5F E1 13 DD 93 DF 4A A3  0.>...x:_.....J.
#     0020: 58 B4 5A 87 E6 B5 6B 59   08 B4 F3 98 5A 0D 59 F6  X.Z...kY....Z.Y.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.217 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:17.271 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "56 0A 66 16 19 10 36 0C 1A 7E 09 F3 28 0F 8C 2F BA 66 70 83 B9 98 1C 0F E4 0D A6 1C D3 BD 67 E4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 24:17:17.548 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 24:17:17.549 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-28 00:17:28.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:28.736 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 0B 43 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:41.000 UTC",
#       "not  after"         : "2024-01-26 24:16:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#           0010: 8D 48 7F E3                                        .H..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 E7 30 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 24:16:43.000 UTC",
#       "not  after"         : "2024-01-26 24:16:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 E9 61 DC 51 79 DE 33   FE AF E7 35 1F B4 9C F9  ..a.Qy.3...5....
#           0010: 8D 48 7F E3                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 8E 1F 1E 0C B5 27 7E   20 15 11 AF 03 E7 AB 09  m.....'. .......
#           0010: EA 97 3F F7                                        ..?.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-28 24:17:28.751 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:28.849 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:28.850 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:28.850 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:17:28.850 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:28.989 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:28.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:28.991 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-28 24:17:28.992 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:28.997 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:29.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:29.009 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:29.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-28 24:17:29.011 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "76 C3 CB 02 63 71 99 DB B6 97 AC FD 3F 2B 0A 6A 15 F8 C8 7F EF 2F F0 27 36 61 57 D9 44 41 95 63",
#     "session id"          : "2A 86 5D D7 8C 4E 6C C6 1C 40 47 EB 46 EB 24 B7 5D 32 22 5E 7C 03 6E DD 2C A4 73 39 22 06 C6 9E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 9A 24 1A CA 3E C7 CF BE   93 9B F3 59 74 E2 64 C0  .$..>......Yt.d.
#               0010: 50 47 7C 4B 43 2C 63 94   FB B0 E5 A4 0A EA C9 79  PG.KC,c........y
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.037 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "52 2A 04 4D DF DC 53 EE 54 E3 E6 AE 82 60 FF 4D EE 54 EB 0B 24 A7 3C 2B BF 57 A9 F1 C7 C3 8B 39",
#     "session id"          : "2A 86 5D D7 8C 4E 6C C6 1C 40 47 EB 46 EB 24 B7 5D 32 22 5E 7C 03 6E DD 2C A4 73 39 22 06 C6 9E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2B 7C F2 3E B1 D8 F7 60   50 99 33 82 18 ED E2 5B  +..>...`P.3....[
#             0010: E6 72 7C 22 AD 36 7B 49   DF B1 6F DD B8 BF D0 07  .r.".6.I..o.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.037 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.037 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.039 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.050 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.051 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.053 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.056 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.056 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.056 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:17:29.057 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-28 24:17:29.059 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-28 24:18:48.574 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:18:48.626 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:18:48.626 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:18:48.626 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 24:18:48.627 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42796/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28395ms
ok 65 stop command for single port in 31347ms
ok 66 status detects locally running solr in 14354ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2175ms
ok 69 copying files around in 6614ms
ok 70 upconfig in 2631ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1210ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1212ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 2s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m26s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5751 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5751/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39721/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 20:44:26.538; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 20:44:26.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 20:44:27.466; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 20:44:27.507; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23177ms
ok 61 start solr with client truststore and security manager in 25188ms
not ok 62 start solr with mTLS needed in 59814ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-JRjT9b/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39721.
#
# Started Solr server on port 39721 (pid=196615). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39722.
#
# Started Solr server on port 39722 (pid=197040). Happy searching!
#
# INFO  - 2023-10-27 20:45:51.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 20:45:51.164; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 20:45:51.540; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 20:45:51.543; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 20:45:51.543; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:51.575 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 6B 92 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:27.000 UTC",
#     "not  after"         : "2024-01-25 20:45:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 41 0C 12 FA EC 20 BB   51 63 ED 9C D0 CA 32 CB  .A.... .Qc....2.
#         0010: C0 CF B9 7C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:51.579 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 5D FB 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:19.000 UTC",
#     "not  after"         : "2024-01-25 20:45:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:51.593 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:51.825 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.825 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:51.827 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:51.827 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.833 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.844 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.844 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.844 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:51.847 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FF 8F F2 1E 09 5D FD D4 20 AB 14 CD 1A D1 44 EA DB ED 36 C6 EF E8 6E 0E 8A 26 0E A6 B2 3A 68 95",
#   "session id"          : "B1 BE 3F 8D D3 16 A1 85 9F 90 C7 F3 5A 51 27 BF 10 55 0D 45 5B 23 D6 ED 0B 13 B9 5F E8 1F 6C A1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 97 F1 2A BC 64 66 D2 B5   8C 90 6E 97 1C C7 A5 13  ..*.df....n.....
#             0010: D9 74 16 CD 1C C1 63 D2   47 1A 5C 00 A0 80 AA 6A  .t....c.G.\....j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.948 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AA AB 02 2F 87 25 52 DE 77 3D 5B 78 E4 79 7B 84 AC 04 39 F0 F5 94 6D C4 86 EF 8B BA C3 4A 6F C1",
#   "session id"          : "B1 BE 3F 8D D3 16 A1 85 9F 90 C7 F3 5A 51 27 BF 10 55 0D 45 5B 23 D6 ED 0B 13 B9 5F E8 1F 6C A1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A5 1B 49 E9 D6 47 CD 09   24 31 3B D7 09 71 EE 97  ..I..G..$1;..q..
#           0010: EB 29 74 00 84 47 E8 6D   03 A0 53 8F AA 37 53 4F  .)t..G.m..S..7SO
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.948 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.948 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.951 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.953 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.953 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.953 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:51.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:51.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.962 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.964 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.965 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.968 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:51.969 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:51.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.971 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.971 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.971 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.972 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.972 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.973 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:51.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.976 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D9 77 FC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:23.000 UTC",
#       "not  after"         : "2024-01-25 20:45:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 CD CB 16 19 84 AC   D8 65 D9 E5 CB 3A F0 C1  .........e...:..
#           0010: 13 62 05 D8                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:51.977 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:52.038 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:52.039 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:52.039 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:52.039 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.063 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.067 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 52 85 0B 3F C0 4A 11   DD 2D 8B 2B 03 F3 C7 0B  `R..?.J..-.+....
#     0010: 7C A7 9B A1 03 69 C6 29   F6 BA A5 89 4D A4 ED 6C  .....i.)....M..l
#     0020: 36 9A CE 0D 47 6E 36 4F   91 D6 C1 43 3C 26 2D 69  6...Gn6O...C<&-i
#     0030: 1D 43 0A 21 F0 FF 67 67   50 9A 97 AD 23 95 1C 69  .C.!..ggP...#..i
#     0040: 96 1E 52 14 34 46 FF 35   C2 37 3A 11 A7 E5 9D 1A  ..R.4F.5.7:.....
#     0050: 10 7D A1 99 D1 0A 94 66   72 D3 02 C2 F2 CE 6A F5  .......fr.....j.
#     0060: 72 89 6A 0A 97 5A A9 36   05 23 CB 0F 4E 61 FF 9B  r.j..Z.6.#..Na..
#     0070: 92 08 D3 73 D2 76 71 EE   0B 6B 5C F1 03 01 94 37  ...s.vq..k\....7
#     0080: AA 24 13 E3 CD B6 DB 46   80 47 F1 61 84 45 1A 59  .$.....F.G.a.E.Y
#     0090: 9A E4 83 4D 38 3A 5A 77   4C 74 5A 15 57 7B AB 6C  ...M8:ZwLtZ.W..l
#     00A0: 7A D9 6A E4 36 87 5A C2   9A 3D D0 80 55 55 BC 62  z.j.6.Z..=..UU.b
#     00B0: 5C 4B DB B4 01 BE 26 C9   DD 36 C0 84 64 81 40 07  \K....&..6..d.@.
#     00C0: 8F CD A6 BD B6 F0 83 95   6D 1D 03 F9 01 89 F9 11  ........m.......
#     00D0: 00 2D 5A 1A 9E 64 16 5D   74 FD 6A A4 72 CE 53 F9  .-Z..d.]t.j.r.S.
#     00E0: F3 3F 0C 88 50 07 1E F6   B0 82 EE BE 5D DB D5 CE  .?..P.......]...
#     00F0: 3B 9B 4B 97 DF D7 97 E5   7D 5E 90 4C 91 A3 36 F4  ;.K......^.L..6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.069 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 95 B4 D3 DF C5 C3 EF 6E   D8 9D EA 50 EB 7E 73 F2  .......n...P..s.
#     0010: 91 2E 76 87 B6 14 6C CF   4E CE E9 FC AD E0 5C 48  ..v...l.N.....\H
#     0020: 87 71 15 B2 42 93 27 68   A2 4D D2 4D 3D 27 72 D0  .q..B.'h.M.M='r.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.072 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:52.073 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:52.073 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:52.073 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:52.073 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:52.073 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:52.074 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.074 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.077 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 6B 92 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:27.000 UTC",
#       "not  after"         : "2024-01-25 20:45:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 41 0C 12 FA EC 20 BB   51 63 ED 9C D0 CA 32 CB  .A.... .Qc....2.
#           0010: C0 CF B9 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 2F C0 2F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:20.000 UTC",
#       "not  after"         : "2024-01-25 20:45:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#           0010: B8 E8 C5 5E                                        ...^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.103 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3D 1D 31 19 CF AA AD 9B   5C 3D AD 76 60 21 45 C2  =.1.....\=.v`!E.
#     0010: CC 4C CE 45 0C 9F 65 D6   CB 1F 71 93 75 53 B7 4D  .L.E..e...q.uS.M
#     0020: 4E A7 A0 CD 9E C8 1F 2A   EA 04 E5 AA D6 94 FC A2  N......*........
#     0030: 9E A4 51 9C A1 34 35 51   79 64 70 80 9F 3D F9 5A  ..Q..45Qydp..=.Z
#     0040: 07 77 BA FA B0 4B 9D 1C   DF 97 2E D2 1F F6 3D 72  .w...K........=r
#     0050: 04 35 0B A7 D6 BA A6 D3   D5 CF BA 46 CF C0 86 75  .5.........F...u
#     0060: A0 D6 5F A6 24 17 35 3D   AF 79 FC D0 9F A2 CE 16  .._.$.5=.y......
#     0070: 28 31 E4 89 6B BE E7 43   74 58 F0 DB 42 33 34 01  (1..k..CtX..B34.
#     0080: 6D 50 0F 2C B5 0D 73 8C   88 C9 90 29 60 81 CA FF  mP.,..s....)`...
#     0090: 59 34 94 E3 AD E6 2D CF   9A 43 61 22 1F 60 42 A6  Y4....-..Ca".`B.
#     00A0: 4D 10 69 C2 18 D0 A5 2F   63 93 2D 41 52 A1 15 B6  M.i..../c.-AR...
#     00B0: 00 85 5A CC AA 4F CC 25   B9 19 EB 9F E5 86 38 30  ..Z..O.%......80
#     00C0: 88 6A 11 AA E2 CF C2 26   8A AC 3F 70 C2 D4 FD 2B  .j.....&..?p...+
#     00D0: 55 6A 69 E8 5E 4C 10 64   A1 FC 1C AD 47 2E C2 70  Uji.^L.d....G..p
#     00E0: 8B 23 94 E2 B8 E7 A9 B0   08 01 00 7A BE 40 2C C3  .#.........z.@,.
#     00F0: 7E DF 5F 12 E2 61 19 18   09 ED 7F 3A 2E D6 C8 89  .._..a.....:....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.104 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 07 C7 5F 57 AE 84 ED 03   F9 FC EF DC E6 19 33 B3  .._W..........3.
#     0010: 8E 89 8A A8 67 EB B4 5B   96 E5 B4 1E 67 CF 1C 79  ....g..[....g..y
#     0020: 6D CE EC A8 18 41 D3 43   D6 0B C8 83 8E 09 7C 10  m....A.C........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.105 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:52.162 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "83 31 B9 3E C7 B2 2F BB C5 07 1F 30 F4 8D 4C C8 61 02 69 38 39 E9 D0 14 C1 FD 56 59 55 1D 31 6B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 20:45:52.573 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 20:45:52.574 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 20:45:53.547; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 20:45:53.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 20:45:53.925; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 20:45:53.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 20:45:53.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JRjT9b/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:53.960 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 6B 92 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:27.000 UTC",
#     "not  after"         : "2024-01-25 20:45:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 41 0C 12 FA EC 20 BB   51 63 ED 9C D0 CA 32 CB  .A.... .Qc....2.
#         0010: C0 CF B9 7C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:53.964 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 5D FB 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:19.000 UTC",
#     "not  after"         : "2024-01-25 20:45:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 20:45:53.979 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:54.068 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:54.068 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:54.068 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:45:54.069 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:54.204 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.205 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:54.206 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:45:54.207 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.212 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.224 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:45:54.226 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7F B2 CB 2A 74 7F D9 14 AF AD 48 2C B4 DD 18 D2 AB 33 56 FA 55 4C C4 4F E0 31 E7 09 4F 6D 76 AE",
#   "session id"          : "65 FC 99 8A FB 1E 62 FE B2 61 D2 41 4D 97 7E 05 3E 0F 38 29 C4 12 6E 87 C7 92 0C 02 F8 1A E4 18",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 7D E9 28 EA 62 EA D5   A1 DC E7 6D CC A9 73 E0  ...(.b.....m..s.
#             0010: 40 6D 30 55 AE 04 38 3A   94 6F A6 3E 6D 2D 9B 21  @m0U..8:.o.>m-.!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.333 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EC 87 ED F9 77 98 53 ED 4D B4 B0 FA C4 65 B7 08 98 21 B6 EC F2 1C DF D0 18 A2 DB 3F 79 5C F8 D9",
#   "session id"          : "65 FC 99 8A FB 1E 62 FE B2 61 D2 41 4D 97 7E 05 3E 0F 38 29 C4 12 6E 87 C7 92 0C 02 F8 1A E4 18",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 10 1D 88 98 87 AC ED 4F   8D D3 64 CC DA AF AD DD  .......O..d.....
#           0010: 5E 37 7A 93 6C 36 0B 0F   EE 45 F7 FA E0 67 D7 1A  ^7z.l6...E...g..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.334 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.334 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.336 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.339 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.341 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.341 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.341 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.349 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.350 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.351 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.355 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.358 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.358 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.358 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.359 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.360 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.360 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.360 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.363 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D9 77 FC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:23.000 UTC",
#       "not  after"         : "2024-01-25 20:45:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 CD CB 16 19 84 AC   D8 65 D9 E5 CB 3A F0 C1  .........e...:..
#           0010: 13 62 05 D8                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.364 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 2F C0 2F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 20:45:20.000 UTC",
#     "not  after"         : "2024-01-25 20:45:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#         0010: B8 E8 C5 5E                                        ...^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#         0010: 9F 57 D4 91                                        .W..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.458 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 10 04 C5 8A 41 F4 FE 85   BD D2 D8 22 60 F5 7D 0D  ....A......"`...
#     0010: B2 BD D7 D0 A9 C0 4C E7   CC AE B1 67 A6 6B A0 53  ......L....g.k.S
#     0020: AC 8D C2 18 C2 7C 49 30   72 6D 37 23 13 80 71 0E  ......I0rm7#..q.
#     0030: 31 87 B8 8A 49 C6 F8 25   DA 55 9B B6 E6 8C 84 1E  1...I..%.U......
#     0040: 61 7A BF 89 40 2C 60 64   44 4A A4 FE 6F BA E6 6F  az..@,`dDJ..o..o
#     0050: 00 C2 8A D7 12 33 32 ED   85 B9 51 88 ED 4C F6 C6  .....32...Q..L..
#     0060: 7D F9 6D 9A B1 77 A3 62   6C 9B EE 8B 69 EF C9 55  ..m..w.bl...i..U
#     0070: 0D C0 EA 7A F0 09 0D FF   F2 D2 54 09 8C 94 D2 53  ...z......T....S
#     0080: ED AA 0E 4B 37 78 08 E7   5D 3E 44 E6 D5 A5 E7 E6  ...K7x..]>D.....
#     0090: F5 60 08 3E 42 B9 6B 66   55 A6 DA 1D CC DB 8F 22  .`.>B.kfU......"
#     00A0: 01 14 F2 F8 B6 79 52 07   F8 30 05 70 45 B5 B5 3B  .....yR..0.pE..;
#     00B0: 1C 99 C2 1D D4 56 60 2D   9B E5 B4 90 BA 15 2B B6  .....V`-......+.
#     00C0: 80 FE 69 D9 DE F8 AA A2   8E 13 D8 9F 59 77 4B 4E  ..i.........YwKN
#     00D0: 10 E9 2B B0 86 E1 12 0D   95 DC B9 78 E5 FC 71 36  ..+........x..q6
#     00E0: 22 FA 92 35 75 7E 6C 0D   2D 0F 14 31 74 8F 13 DE  "..5u.l.-..1t...
#     00F0: A3 98 78 A6 06 C7 7A 80   81 9C 75 C0 11 FA 0E BB  ..x...z...u.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.460 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 84 36 6B A0 98 92 EC 37   66 AD B2 52 3A 45 6B BC  .6k....7f..R:Ek.
#     0010: AB 2C E0 B2 66 C9 BC 35   4F ED FC FC FA 0C 07 9F  .,..f..5O.......
#     0020: A7 02 83 55 52 62 11 4F   23 D1 09 DF 70 96 A0 9F  ...URb.O#...p...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:54.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:54.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 20:45:54.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:45:54.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.465 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.468 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 6B 92 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:27.000 UTC",
#       "not  after"         : "2024-01-25 20:45:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 41 0C 12 FA EC 20 BB   51 63 ED 9C D0 CA 32 CB  .A.... .Qc....2.
#           0010: C0 CF B9 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 2F C0 2F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:20.000 UTC",
#       "not  after"         : "2024-01-25 20:45:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#           0010: B8 E8 C5 5E                                        ...^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.494 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 69 07 0E 91 0F 33 95 6F   68 7C CD 2A 98 8F 09 E1  i....3.oh..*....
#     0010: AB D9 DA F5 6D 66 DC 5E   83 20 3F CF 7F 4F AC 18  ....mf.^. ?..O..
#     0020: EB 2A E5 78 2A 65 AF 4F   35 9C AC 25 F6 6F EB 40  .*.x*e.O5..%.o.@
#     0030: BC 81 60 F7 28 69 56 D1   BA 58 FF 49 DE 93 DA 14  ..`.(iV..X.I....
#     0040: 2E 8E 00 DF 24 5A B7 0D   40 3F 71 0C 74 EB F6 40  ....$Z..@?q.t..@
#     0050: 30 11 0D AC AC EC 77 A2   17 1C 44 F9 85 7C 4A 62  0.....w...D...Jb
#     0060: 63 2C 69 3B 8A E8 0A EF   1B B2 00 22 6E 61 1C 81  c,i;......."na..
#     0070: FB AA 1C 4D 58 BA 43 5D   5B 6F 16 E8 B0 FD 0D 96  ...MX.C][o......
#     0080: 82 15 81 B4 07 77 B0 D8   A1 17 89 FA 88 61 10 9B  .....w.......a..
#     0090: FE E6 0B 99 5F 2C E4 A8   5C 51 69 86 C0 28 98 FE  ...._,..\Qi..(..
#     00A0: F9 26 A7 52 58 32 90 AF   59 DC E3 8B 73 8E 5C 7D  .&.RX2..Y...s.\.
#     00B0: BF 48 42 56 8E 4F 23 B1   7A 1D C2 74 8A 0E 2E 74  .HBV.O#.z..t...t
#     00C0: 4B DE AF 7F C2 A8 3F 7D   3E FD 4A 8B F1 DB 6A D3  K.....?.>.J...j.
#     00D0: E8 FD 5D FD 49 08 B5 A8   66 79 AF 60 99 34 68 23  ..].I...fy.`.4h#
#     00E0: 36 57 49 A1 92 8A 16 43   7F 9A C6 95 F7 3D A3 BE  6WI....C.....=..
#     00F0: 05 F4 82 1C 24 F7 B8 7D   D9 0A BA 15 39 3A 5A 31  ....$.......9:Z1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.495 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FD 80 9D 5C 9E 13 73 59   FE F0 78 55 49 5B 3A D5  ...\..sY..xUI[:.
#     0010: CD AF 79 BC 6A B0 28 66   DD 94 35 0C E0 13 CA 6E  ..y.j.(f..5....n
#     0020: 20 36 D0 74 7F D3 0B 29   9D F5 34 4D 3C AD E1 33   6.t...)..4M<..3
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.496 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:45:54.551 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9A 8A EA 9A 14 84 A9 FA E7 29 EF 72 0C 8F 89 49 13 DD 33 6E 3A 76 73 C6 91 47 40 BC 20 45 D9 92",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 20:45:54.836 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 20:45:54.837 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 20:46:06.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 20:46:06.937 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 5D FB 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:19.000 UTC",
#       "not  after"         : "2024-01-25 20:45:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#           0010: B8 E8 C5 5E                                        ...^
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 2F C0 2F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 20:45:20.000 UTC",
#       "not  after"         : "2024-01-25 20:45:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 E8 99 08 DD 7E D0 6C   53 9C 39 2F EE 95 53 B0  3......lS.9/..S.
#           0010: B8 E8 C5 5E                                        ...^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 40 B9 D2 D3 EE 39 59   7B 7D 5F 80 74 8E BA 0E  .@....9Y.._.t...
#           0010: 9F 57 D4 91                                        .W..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 20:46:06.952 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:46:07.049 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:46:07.050 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:46:07.051 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:46:07.051 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:46:07.192 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.193 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:46:07.194 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 20:46:07.195 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.200 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.212 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.212 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.212 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 20:46:07.214 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "38 1E DF 9F 9C A2 1A DA 01 7D E1 F4 27 AD D0 3C 04 B6 BB 60 95 7D 72 28 EF 89 24 B6 3E 53 17 61",
#     "session id"          : "D0 C5 0D CF 31 7D 67 00 53 9B 42 E0 6E E6 81 07 35 CB E7 6C 46 8B 6B B7 FC 6B 1E E2 F9 54 AF 59",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D7 E6 47 7F A9 85 DB 07   59 AF A2 B8 3A 10 12 A5  ..G.....Y...:...
#               0010: 6D 75 E5 55 99 45 9B DE   E6 A1 11 A1 A0 C1 44 0B  mu.U.E........D.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.233 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B4 1F DE 48 7B 6E E8 20 73 44 28 CF 7E 33 89 A8 D9 60 97 09 95 10 19 55 B2 B8 DA 91 B6 FD 01 0E",
#     "session id"          : "D0 C5 0D CF 31 7D 67 00 53 9B 42 E0 6E E6 81 07 35 CB E7 6C 46 8B 6B B7 FC 6B 1E E2 F9 54 AF 59",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A BD 8D C4 8C B2 DF 2E   6C 80 B8 68 F0 E5 53 80  Z.......l..h..S.
#             0010: 4F 60 A5 99 8F 20 01 AE   2C 01 61 4B 26 88 B2 34  O`... ..,.aK&..4
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.234 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.234 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.236 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.236 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.236 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.236 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.238 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.238 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.239 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.247 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.249 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.250 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:46:07.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:46:07.255 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 20:46:07.256 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 20:47:28.919 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:47:28.982 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:47:28.982 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:47:28.982 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 20:47:28.982 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39722/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28143ms
ok 65 stop command for single port in 31494ms
ok 66 status detects locally running solr in 14368ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2208ms
ok 69 copying files around in 6716ms
ok 70 upconfig in 2694ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 37s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m2s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5750 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5750/

1 tests failed.
FAILED:  org.apache.solr.cloud.ReindexCollectionTest.testAbort

Error Message:
java.lang.AssertionError: {responseHeader={status=0, QTime=5}, status={state=running, msg=found [48f4598b-c6f2-4df7-8396-a9741e4ae86e] in running tasks}}

Stack Trace:
java.lang.AssertionError: {responseHeader={status=0, QTime=5}, status={state=running, msg=found [48f4598b-c6f2-4df7-8396-a9741e4ae86e] in running tasks}}
	at __randomizedtesting.SeedInfo.seed([C12DFB3738F962CD:A74E4CA04C23F0B4]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertNotNull(Assert.java:713)
	at org.apache.solr.cloud.ReindexCollectionTest.testAbort(ReindexCollectionTest.java:425)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6270 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46681/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 15:45:53.714; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 15:45:53.719; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 15:45:54.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 15:45:54.739; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22966ms
ok 61 start solr with client truststore and security manager in 26440ms
not ok 62 start solr with mTLS needed in 60467ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-29TBTZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46681.
#
# Started Solr server on port 46681 (pid=197441). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46682.
#
# Started Solr server on port 46682 (pid=197891). Happy searching!
#
# INFO  - 2023-10-27 15:47:20.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 15:47:20.541; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 15:47:20.924; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 15:47:20.927; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 15:47:20.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:20.963 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 68 D3 F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:56.000 UTC",
#     "not  after"         : "2024-01-25 15:46:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 16 A4 19 4F 25 BB 48   7B 38 55 63 D2 14 59 B9  p...O%.H.8Uc..Y.
#         0010: A4 61 55 76                                        .aUv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:20.968 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 67 F6 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:47.000 UTC",
#     "not  after"         : "2024-01-25 15:46:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:20.984 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:21.304 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:21.305 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:21.305 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:21.305 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:21.458 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.458 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:21.460 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:21.460 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.482 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:21.486 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "49 99 12 3B F8 2B 85 16 6C 48 0E DD 99 76 36 FB 48 76 43 28 3F 6F 1C 9F FD 27 7C A7 13 88 F2 BC",
#   "session id"          : "CD 80 F2 80 60 35 27 7E 71 20 D8 FE 9F 4E EA 2A 5E 4A 72 17 BC EF 4C 31 9C 6E 48 01 70 38 4C 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 94 7F 32 53 98 D4 0C 72   9E F3 83 8E 19 03 CD 86  ..2S...r........
#             0010: 40 11 9A 86 45 4A AB 4A   32 D3 A1 E6 4C 1A D4 0E  @...EJ.J2...L...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.625 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "96 25 06 10 43 D4 8E 88 59 C7 19 73 58 A2 86 2E 12 B3 00 36 7F 54 28 FA 25 E9 4F FE 48 21 DE 3E",
#   "session id"          : "CD 80 F2 80 60 35 27 7E 71 20 D8 FE 9F 4E EA 2A 5E 4A 72 17 BC EF 4C 31 9C 6E 48 01 70 38 4C 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 89 18 BC 12 AC 05 B3   CB 2E 83 14 CA 89 BC 20  ...............
#           0010: 8D 5A D6 B3 B6 AE 4D 23   F8 92 2F A3 BC 37 95 74  .Z....M#../..7.t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.626 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.626 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.628 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.628 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.628 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.628 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.629 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.632 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.632 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.632 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.632 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.632 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.633 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.644 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.646 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.647 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.657 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.657 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.657 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.658 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.658 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.658 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.659 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.661 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.661 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.661 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.662 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.663 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.664 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.665 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.669 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 6A 74 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:52.000 UTC",
#       "not  after"         : "2024-01-25 15:46:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 61 27 57 49 3D 28 72   48 BA 9E 21 BC A3 F9 BE  .a'WI=(rH..!....
#           0010: 6B B8 DD E0                                        k...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.669 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.770 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.777 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7B F4 7A AB 7C BA B0 7B   A4 07 34 1D 75 0A 40 3C  ..z.......4.u.@<
#     0010: 4F 02 95 47 78 F3 46 69   3F 67 C2 3F 7A 28 33 5A  O..Gx.Fi?g.?z(3Z
#     0020: A1 A1 CB 5D 55 1D F4 50   79 74 AE 5B 09 31 21 A4  ...]U..Pyt.[.1!.
#     0030: 5D CD 46 F2 29 4D E7 A7   CE 08 C1 F5 C5 81 65 FA  ].F.)M........e.
#     0040: CB 3A DC B2 8B E5 AD 6E   8C 4E 87 77 37 DB 83 66  .:.....n.N.w7..f
#     0050: 05 76 FB 01 AC F7 9E 73   CB 42 6B 83 0C 78 DA 66  .v.....s.Bk..x.f
#     0060: 0E 90 99 61 62 28 14 E7   5B 9D B5 DF E3 38 14 8C  ...ab(..[....8..
#     0070: 75 22 BD 61 07 8F 78 29   08 40 04 AD C3 8C 93 07  u".a..x).@......
#     0080: 90 79 FF F5 68 44 CE 43   E1 E1 D1 BB 63 9E 7C 3E  .y..hD.C....c..>
#     0090: 92 EB AE 11 DE CE 08 5B   6F B1 B1 46 85 95 F7 1B  .......[o..F....
#     00A0: 30 90 B7 76 40 28 88 93   9A C9 99 1D DF B0 70 6C  0..v@(........pl
#     00B0: 79 6F 09 14 22 CB 1A 18   41 0C 48 E1 91 34 C4 7D  yo.."...A.H..4..
#     00C0: 13 A6 A6 70 8C 45 6B 6F   CF E9 41 72 05 AC F9 2A  ...p.Eko..Ar...*
#     00D0: 1C E9 DE E6 B0 6D A4 16   E5 51 D0 E3 43 96 2D 0C  .....m...Q..C.-.
#     00E0: 33 B2 C4 B8 AE B5 34 1F   4A 38 57 AA C2 4E 53 67  3.....4.J8W..NSg
#     00F0: A9 01 04 74 B2 89 E4 6C   29 0E 5A 6B 7B 62 2C 31  ...t...l).Zk.b,1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.779 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 75 5D F3 DA F3 0D 01   26 89 C7 A6 0B F3 9D AA  .u].....&.......
#     0010: E9 EB 66 E5 1F 93 38 6D   9C DE C7 A9 9B 85 80 D6  ..f...8m........
#     0020: 2C 9C BE 81 48 51 29 E8   49 EF 14 66 EB CE 00 47  ,...HQ).I..f...G
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.783 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:21.784 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.784 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:21.785 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.785 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:21.785 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:21.785 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.786 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.789 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 68 D3 F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:56.000 UTC",
#       "not  after"         : "2024-01-25 15:46:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 16 A4 19 4F 25 BB 48   7B 38 55 63 D2 14 59 B9  p...O%.H.8Uc..Y.
#           0010: A4 61 55 76                                        .aUv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 89 41 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:49.000 UTC",
#       "not  after"         : "2024-01-25 15:46:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#           0010: FF 31 AF 31                                        .1.1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.834 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 BA CF 17 EB 06 D3 B1   D3 49 84 67 93 3F 78 B6  f........I.g.?x.
#     0010: BD 2A 4E 4D A6 34 A5 27   89 3B B8 BA AB 7D B4 17  .*NM.4.'.;......
#     0020: 9C 3D 46 8C 7D 5B C6 F6   4A AD B6 76 C0 E4 67 DE  .=F..[..J..v..g.
#     0030: BC D1 74 DB 95 8E 32 B5   4B F3 73 66 45 C2 89 53  ..t...2.K.sfE..S
#     0040: 75 DC 79 B7 18 D9 5A 6F   45 DE 46 15 CC A9 85 C0  u.y...ZoE.F.....
#     0050: 6D CB 34 9E C7 2E EE EC   C8 A6 28 E8 B0 85 A1 94  m.4.......(.....
#     0060: 1F E8 95 32 8F 54 7A C6   D9 C1 2D 2E C5 F1 89 A6  ...2.Tz...-.....
#     0070: AA CF AB D3 61 22 B4 FA   97 64 11 17 B4 3F 1D E4  ....a"...d...?..
#     0080: 9D C0 EC F0 20 A7 47 34   95 B5 3B 69 A0 D4 A6 64  .... .G4..;i...d
#     0090: 66 F8 FA 45 C9 D8 30 0D   5A 9A 96 8C AE A4 7C 4E  f..E..0.Z......N
#     00A0: 48 52 75 F3 D5 1F 51 C1   CD 32 A9 7C 9E C8 C8 80  HRu...Q..2......
#     00B0: 95 13 3B 5D BA 15 AB 30   2A A2 9E 46 48 9D 91 3C  ..;]...0*..FH..<
#     00C0: BB 73 E0 43 BE 0D DD A0   6F 1E 72 57 52 E7 2F 26  .s.C....o.rWR./&
#     00D0: 33 58 72 A5 BF B6 F4 77   E0 3C 4A BD 47 AD 89 66  3Xr....w.<J.G..f
#     00E0: 42 37 83 B1 B8 FA 1E A1   82 44 E3 FE BA 99 BF 22  B7.......D....."
#     00F0: 6E 46 D2 3C 2C 57 2D E4   42 C8 7A FF AA 92 65 A5  nF.<,W-.B.z...e.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.835 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 3B B6 B5 F1 EF 09 13   DE 60 A2 F0 8F 2B 81 53  6;.......`...+.S
#     0010: 23 0D E4 DA 46 EA 2E 11   55 05 B3 77 02 48 80 F8  #...F...U..w.H..
#     0020: 76 A2 A1 F4 C1 3D 61 13   81 07 DF 0A 0A 02 23 FE  v....=a.......#.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.836 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:21.901 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "15 FA B9 AB E1 8A 39 F2 F3 82 FF D6 D4 B2 12 02 84 B0 5D BA 17 C3 43 EC D1 FB 7A 59 A7 E5 BF 1A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 15:47:22.202 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 15:47:22.203 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 15:47:23.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 15:47:23.255; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 15:47:23.671; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 15:47:23.674; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 15:47:23.674; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-29TBTZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:23.708 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 68 D3 F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:56.000 UTC",
#     "not  after"         : "2024-01-25 15:46:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 16 A4 19 4F 25 BB 48   7B 38 55 63 D2 14 59 B9  p...O%.H.8Uc..Y.
#         0010: A4 61 55 76                                        .aUv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:23.713 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 67 F6 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:47.000 UTC",
#     "not  after"         : "2024-01-25 15:46:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:23.729 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:23.814 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:23.816 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:23.824 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:23.824 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:23.970 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:23.972 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:23.972 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.992 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.993 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:23.996 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CE CB 7C 83 EC 84 49 F7 15 92 2C 2C 10 88 CD BE 90 78 28 34 79 A9 5E 77 F7 05 EF F5 73 6D BD AD",
#   "session id"          : "22 34 14 F9 4B 25 7E 50 08 42 A4 93 27 F4 4E 51 1B 50 D9 A3 78 75 F9 14 77 1D 26 61 25 3F 67 CB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 54 58 32 88 21 24 3E 9A   9C 67 13 E2 E4 9A 8F D7  TX2.!$>..g......
#             0010: 64 06 07 5D 92 02 5E 6E   FD 89 7A 6E 24 35 A3 24  d..]..^n..zn$5.$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.117 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "07 53 94 4C 33 5C DD 9D 5A F6 4E FF A3 A6 96 53 DE B9 8C F5 57 A3 36 CB 52 4A 9E 73 D0 FE DF 24",
#   "session id"          : "22 34 14 F9 4B 25 7E 50 08 42 A4 93 27 F4 4E 51 1B 50 D9 A3 78 75 F9 14 77 1D 26 61 25 3F 67 CB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EA 7A FD 25 E2 EC E7 FC   38 78 E0 3C 77 F4 C7 49  .z.%....8x.<w..I
#           0010: 76 2C 94 30 AD FD 6D FC   9F 57 DA 07 E5 2D 9F 17  v,.0..m..W...-..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.118 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.118 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.121 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.123 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.123 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.124 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.133 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.135 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.136 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.146 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.146 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.146 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.147 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.149 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.149 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.150 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.150 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.151 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.152 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.152 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.155 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 6A 74 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:52.000 UTC",
#       "not  after"         : "2024-01-25 15:46:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 61 27 57 49 3D 28 72   48 BA 9E 21 BC A3 F9 BE  .a'WI=(rH..!....
#           0010: 6B B8 DD E0                                        k...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.156 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.253 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 89 41 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 15:46:49.000 UTC",
#     "not  after"         : "2024-01-25 15:46:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#         0010: FF 31 AF 31                                        .1.1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#         0010: DB 17 BB 5F                                        ..._
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.260 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 FD 7F C8 38 AC A1 5F   82 B3 CB 26 89 47 56 29  f...8.._...&.GV)
#     0010: 3A B7 C3 B7 12 B9 1E 16   F7 07 FE A0 5D 75 B9 B0  :...........]u..
#     0020: C8 B7 3D FC 8D 2A 93 98   8C A8 DA 4A EF D2 32 0B  ..=..*.....J..2.
#     0030: 91 AB 40 5A C6 EA BF B8   76 69 7E 27 2D 90 F6 07  ..@Z....vi.'-...
#     0040: C9 C9 1E 96 8D 83 E4 5C   B5 AC 8D 77 D8 7C 87 0F  .......\...w....
#     0050: C0 80 67 89 46 6F 78 64   60 CE 34 68 4C 3A DB 09  ..g.Foxd`.4hL:..
#     0060: 2B 64 B6 91 83 29 C7 7F   CD 54 70 9B 40 8B 14 DA  +d...)...Tp.@...
#     0070: 2F 7D EB C9 AB 2E 4F 15   48 40 2C 95 09 8C E9 BA  /.....O.H@,.....
#     0080: F6 EB 70 4E E2 46 C7 B4   21 70 3F E2 6F CA 7E 5E  ..pN.F..!p?.o..^
#     0090: 7B 34 EC 23 FB 7C C8 85   B6 C7 88 49 A0 0E 3D 20  .4.#.......I..=
#     00A0: AB D7 D1 85 9A E0 95 BB   F7 B5 1D A1 2B 10 DB EC  ............+...
#     00B0: 26 53 36 36 12 F7 74 02   2F 2B 50 23 4A 6D 33 B7  &S66..t./+P#Jm3.
#     00C0: 20 E3 53 9D FA 23 1F CA   05 6B 78 E1 59 84 6F CA   .S..#...kx.Y.o.
#     00D0: B6 4F 1F 16 39 68 9A 55   B1 1E 7A 98 F5 B9 A8 DC  .O..9h.U..z.....
#     00E0: 09 38 F0 34 C1 AA A8 C8   2A E9 E4 51 06 4F F7 F7  .8.4....*..Q.O..
#     00F0: 04 50 8D 9A 30 29 2D 4C   80 FB 8E 80 BA 17 BD 15  .P..0)-L........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.262 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CE 00 2B 63 71 0E 9C C7   36 19 70 F6 AA FE 5C BC  ..+cq...6.p...\.
#     0010: 57 03 1B 39 DA CD D3 C9   96 3C C1 88 02 CB C4 EB  W..9.....<......
#     0020: CF 8D 00 A2 D2 87 FA EA   9D 6B A6 E4 3A 7B 91 F4  .........k..:...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.266 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:24.267 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.267 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:24.267 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.267 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 15:47:24.267 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:47:24.268 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.268 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.271 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 68 D3 F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:56.000 UTC",
#       "not  after"         : "2024-01-25 15:46:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 16 A4 19 4F 25 BB 48   7B 38 55 63 D2 14 59 B9  p...O%.H.8Uc..Y.
#           0010: A4 61 55 76                                        .aUv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 89 41 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:49.000 UTC",
#       "not  after"         : "2024-01-25 15:46:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#           0010: FF 31 AF 31                                        .1.1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.317 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 5E 7E 81 7A D3 B3 4E   7C 49 3B 76 10 2A 44 F5  >^..z..N.I;v.*D.
#     0010: FC 72 9D 93 17 10 01 DF   65 F1 0F 3E 80 D5 FB E1  .r......e..>....
#     0020: 87 DF E5 A5 48 92 E8 D2   52 73 D1 55 09 54 CF 3D  ....H...Rs.U.T.=
#     0030: 77 5A 45 CF 6F 9D 43 7E   8C B1 F5 73 A1 AD 5F 67  wZE.o.C....s.._g
#     0040: 2C F6 A7 AE 6D 42 1C 21   37 2E C0 FA 46 D2 C7 83  ,...mB.!7...F...
#     0050: B6 F2 8D 1D 1A F7 68 F5   2B 25 F1 80 6B 96 FF 9A  ......h.+%..k...
#     0060: 32 4B E0 3E 0C DA 24 F2   49 AA 35 65 34 39 05 1F  2K.>..$.I.5e49..
#     0070: BF 0B 1D E6 ED 8B 4E 8C   5A 46 FA E5 B1 25 BB 41  ......N.ZF...%.A
#     0080: FF 47 DD 20 34 B8 B4 2B   72 BA FD 08 53 1E B2 C2  .G. 4..+r...S...
#     0090: 29 28 D9 8F BF A7 59 4F   23 34 AF E2 EF CC D6 AD  )(....YO#4......
#     00A0: C9 FD 1E 62 41 0C A6 B8   36 26 21 03 FB 47 AD E6  ...bA...6&!..G..
#     00B0: 0D D8 6E A2 3E 28 C3 68   44 E3 0F A3 62 D0 ED 8A  ..n.>(.hD...b...
#     00C0: BB 41 90 5E F0 80 41 F2   46 D4 85 54 81 F0 66 B4  .A.^..A.F..T..f.
#     00D0: BB 16 9A FA FD 44 9F AC   D3 B6 83 49 64 F4 61 35  .....D.....Id.a5
#     00E0: 5A 58 37 8F 85 77 45 81   FB DC CB 15 8C C6 06 06  ZX7..wE.........
#     00F0: BD EB 25 99 4C 82 71 D3   D9 20 A8 4D 2E 13 56 D2  ..%.L.q.. .M..V.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.318 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 DF F3 BA BF E8 68 4B   46 57 C2 00 F1 73 79 C6  ......hKFW...sy.
#     0010: 01 13 D8 98 E6 8E 6A 0C   A9 61 61 03 FC 7C 3C EF  ......j..aa...<.
#     0020: 93 0C 4B 18 3D 72 18 CA   88 E4 D4 05 55 66 78 DB  ..K.=r......Ufx.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.319 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:24.375 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "57 D7 B2 EE 67 FB 4D 2F 23 18 7D 88 1A EB C7 16 19 A3 BF AE 0D 42 2E DF C5 2C 95 DD DA 1B 64 81",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 15:47:24.639 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 15:47:24.641 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 15:47:37.137; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:37.496 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 67 F6 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:47.000 UTC",
#       "not  after"         : "2024-01-25 15:46:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#           0010: FF 31 AF 31                                        .1.1
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 89 41 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 15:46:49.000 UTC",
#       "not  after"         : "2024-01-25 15:46:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 39 61 79 09 4F 11 1D   1C 08 7D EC 10 31 E5 98  ]9ay.O.......1..
#           0010: FF 31 AF 31                                        .1.1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 00 55 C3 56 84 87 99   5C 7F 0D 3F B5 E6 5C EB  e.U.V...\..?..\.
#           0010: DB 17 BB 5F                                        ..._
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 15:47:37.514 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:37.872 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:37.873 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:37.874 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:47:37.874 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:37.970 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:37.972 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 15:47:37.972 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.993 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 15:47:37.997 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 6F 51 E2 7A 4D C3 94 F9 1A B4 40 6F 93 F6 59 72 4D AA 71 3A C7 78 50 1D FA FA 23 B7 13 6E 9C",
#     "session id"          : "65 35 86 0D A2 E7 E9 7E 0A 36 F3 E0 35 6F 10 E8 87 E5 65 E2 21 36 C7 80 88 99 82 28 4F A2 88 B1",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 10 9F 2B 6C B8 B4 4A E3   53 AD 3A 71 AF 2D 22 64  ..+l..J.S.:q.-"d
#               0010: 51 0E CA 60 A3 C6 83 E0   C8 AA 22 BA CD 85 EA 07  Q..`......".....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.024 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "56 43 E1 57 D0 11 E4 F7 E0 8F 32 25 B6 35 84 49 98 8E FA E2 76 0D 39 74 FC 67 81 24 D0 18 37 89",
#     "session id"          : "65 35 86 0D A2 E7 E9 7E 0A 36 F3 E0 35 6F 10 E8 87 E5 65 E2 21 36 C7 80 88 99 82 28 4F A2 88 B1",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 82 AD 55 4F BF B9 82 1B   FC C5 48 BD 12 BD 59 69  ..UO......H...Yi
#             0010: FB 84 60 46 90 C5 D7 8B   B0 FA 97 31 29 76 13 1C  ..`F.......1)v..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.024 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.024 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.025 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.026 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.026 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 15:47:38.026 UTC|SSLExtensions.java:163|Ignore unsupported extensio

[...truncated too long message...]

r.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 15:49:01.339 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:49:01.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:49:01.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:49:01.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 15:49:01.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46682/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28529ms
ok 65 stop command for single port in 30948ms
ok 66 status detects locally running solr in 14485ms
ok 67 status does not expose cli parameters to end user in 224ms
ok 68 listing out files in 2274ms
ok 69 copying files around in 7000ms
ok 70 upconfig in 2800ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.ReindexCollectionTest.testAbort (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.ReindexCollectionTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.ReindexCollectionTest.testAbort" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=C12DFB3738F962CD -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 22m 20s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m48.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5749 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5749/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44597/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 12:27:59.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:27:59.058; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 12:27:59.985; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 12:28:00.026; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22931ms
ok 61 start solr with client truststore and security manager in 26182ms
not ok 62 start solr with mTLS needed in 56612ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PHX7zI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44597.
#
# Started Solr server on port 44597 (pid=201123). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44598.
#
# Started Solr server on port 44598 (pid=201573). Happy searching!
#
# INFO  - 2023-10-27 12:29:24.287; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:29:24.293; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:29:24.662; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:29:24.665; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:29:24.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:24.697 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A E8 35 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:29:00.000 UTC",
#     "not  after"         : "2024-01-25 12:29:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 87 46 1C 0C E1 64 C2   B3 8A BA D9 9D 16 51 F9  ..F...d.......Q.
#         0010: 77 21 57 D4                                        w!W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:24.701 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 3E 63 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:52.000 UTC",
#     "not  after"         : "2024-01-25 12:28:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:24.715 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:24.802 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:24.803 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:24.803 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:24.803 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:24.940 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.940 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:24.942 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:24.942 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.959 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.959 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:24.962 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C8 27 E9 81 19 9F 39 32 E9 2A 4F 2C 00 94 3E 50 94 2D A8 3E E2 FC 62 37 8D F3 62 E9 18 92 83 F6",
#   "session id"          : "09 C9 43 59 4E 39 21 84 77 F2 70 70 99 94 38 14 34 22 35 49 01 D8 07 AE 75 D1 47 DB C0 0B 08 CB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 05 61 32 23 3E D7 FE 2A   7A 33 EF 4B 8B E9 AB D8  .a2#>..*z3.K....
#             0010: F1 2E 66 37 FB 3A 0A D8   AA 99 38 89 36 28 39 3E  ..f7.:....8.6(9>
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.079 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F0 A2 75 1A C3 AC 4D E9 87 B3 59 4E 37 87 A0 A1 09 E7 4D 24 F1 6E 4C D4 52 7A 6B A6 B8 72 9F C3",
#   "session id"          : "09 C9 43 59 4E 39 21 84 77 F2 70 70 99 94 38 14 34 22 35 49 01 D8 07 AE 75 D1 47 DB C0 0B 08 CB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E3 66 76 8D F0 F9 C8 B0   E9 65 F5 96 56 BB 8C 09  .fv......e..V...
#           0010: 91 9A C0 DF 95 14 36 4C   CF D2 18 CA 85 44 A7 7F  ......6L.....D..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.079 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.080 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.082 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.082 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.084 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.094 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.095 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.096 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.100 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.100 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.100 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.100 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.101 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.102 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.103 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.104 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.105 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.108 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 99 0D 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:56.000 UTC",
#       "not  after"         : "2024-01-25 12:28:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 40 78 C3 8E C8 BC 89   50 77 89 63 15 4E 20 AE  .@x.....Pw.c.N .
#           0010: 58 28 63 57                                        X(cW
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.108 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.187 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.191 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 E7 84 71 21 2C C8 47   16 81 7E 44 FB 1A CE 96  ...q!,.G...D....
#     0010: 29 B3 E0 12 CE CE BC E8   35 A3 5C 54 38 8A 80 3F  ).......5.\T8..?
#     0020: A6 F5 16 CB 8D 77 23 63   26 09 14 41 DA 48 5F 86  .....w#c&..A.H_.
#     0030: 8A 39 DA F6 2C F9 33 F8   67 A3 8A E1 BD 3C 52 EB  .9..,.3.g....<R.
#     0040: 1F CF 0F CB 50 15 58 0C   6A D4 A7 8C 6A 44 69 D8  ....P.X.j...jDi.
#     0050: 8F 29 44 BE 98 13 FD D5   07 5B D1 3C 67 1B 65 8E  .)D......[.<g.e.
#     0060: 10 32 28 1D E9 8E B9 DB   7C FA 7B 50 11 BF 3B 7D  .2(........P..;.
#     0070: 3A 0D 5B 2D 6E F2 4F 23   19 AC 3C C9 FB B5 FD 40  :.[-n.O#..<....@
#     0080: 8A 90 EE D1 A2 F1 DA 7E   64 74 AC 15 FD B8 0B C9  ........dt......
#     0090: A9 4A 86 76 CB B2 14 A7   95 2B 49 04 AA B0 82 A8  .J.v.....+I.....
#     00A0: 89 22 A7 EB D0 08 76 D2   C4 F7 45 0A 00 0D EF C2  ."....v...E.....
#     00B0: 7A FE E8 72 EE B1 C8 CE   B0 AB 6A 68 34 1D 3D 00  z..r......jh4.=.
#     00C0: C0 22 CA D6 F3 DB 52 1F   4C 15 D9 34 F6 79 02 86  ."....R.L..4.y..
#     00D0: B0 AF 72 C5 7A F8 14 A8   C3 C8 8E 10 71 9E 5C 6E  ..r.z.......q.\n
#     00E0: CE 56 FF C3 C4 45 F1 F3   8C 3D 3A FA B9 3C E8 B9  .V...E...=:..<..
#     00F0: E3 EE 64 65 3D EC 7F 98   76 E2 8F D3 69 C2 A8 60  ..de=...v...i..`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.193 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 74 94 CD 02 F9 91 88 2F   B8 C5 F7 EE A5 2B 3F 60  t....../.....+?`
#     0010: 0F D8 80 D8 7A F0 54 0D   DA 1C 84 2B F5 95 C4 4F  ....z.T....+...O
#     0020: DB DF D5 AF 81 8C E5 54   DD 1B A5 CC 8E 3A 74 DD  .......T.....:t.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.196 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:25.196 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.197 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:25.197 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.197 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:25.197 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:25.198 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.198 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.200 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A E8 35 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:29:00.000 UTC",
#       "not  after"         : "2024-01-25 12:29:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 87 46 1C 0C E1 64 C2   B3 8A BA D9 9D 16 51 F9  ..F...d.......Q.
#           0010: 77 21 57 D4                                        w!W.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 7A 07 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:54.000 UTC",
#       "not  after"         : "2024-01-25 12:28:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#           0010: D2 E9 DB C0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.224 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C F9 46 3F A4 3D 04 E8   4B E2 8B 4D 88 D5 EC 76  L.F?.=..K..M...v
#     0010: 75 3E 69 D0 E1 3C 05 91   5D 7F 8F 8B 0D 9C C0 24  u>i..<..]......$
#     0020: 00 DB 7B 51 21 84 62 22   19 DD 52 C9 CD 14 6B C5  ...Q!.b"..R...k.
#     0030: BE 71 11 0C 31 79 83 30   90 97 D5 43 01 28 0D E5  .q..1y.0...C.(..
#     0040: 77 07 4E C6 B1 E1 CF 56   A8 23 4F 6A A1 CC 3B 7E  w.N....V.#Oj..;.
#     0050: 57 19 7D C7 FD FF 0E 61   4B C3 4A 46 AD 85 EE 30  W......aK.JF...0
#     0060: 97 1C 00 08 8E 83 A1 50   00 6A 3A F4 74 32 F8 0A  .......P.j:.t2..
#     0070: EA 8C E2 ED 35 5D DB 72   A1 12 C4 2B BD 66 B5 05  ....5].r...+.f..
#     0080: 6D F9 A4 A1 9D ED 41 C6   BC E7 A1 99 0D 18 EA 2B  m.....A........+
#     0090: CA 1A 41 76 A1 D4 EE 81   84 2B 6D 7F 98 72 D0 E9  ..Av.....+m..r..
#     00A0: 49 19 E8 4E 43 A8 27 96   D4 89 FE A8 B1 35 32 63  I..NC.'......52c
#     00B0: 19 53 FD 8F 55 59 7F 2E   A8 B3 CC D0 C9 96 E1 4F  .S..UY.........O
#     00C0: 8A AA 08 22 8E FB 75 C9   DE 80 1F 01 29 05 4E 4F  ..."..u.....).NO
#     00D0: E0 E8 4D 95 5A D9 CD D3   FF 94 09 CA F9 EA 2D AC  ..M.Z.........-.
#     00E0: A4 71 22 00 63 EF 2C EA   77 55 E8 8B C6 05 97 06  .q".c.,.wU......
#     00F0: C5 EF 94 DC 10 78 7B 4E   8A 6F 83 43 33 E9 0D 2B  .....x.N.o.C3..+
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.226 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BF 3F 60 86 7D 31 EB 64   A7 CF 22 27 93 D2 E1 13  .?`..1.d.."'....
#     0010: 93 1B 0C 0E 5B DB 15 23   9D 18 05 9D D0 F3 19 F5  ....[..#........
#     0020: 48 E0 6E E4 2E 2C 72 19   95 D0 B5 42 BE C5 1B 62  H.n..,r....B...b
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.226 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:25.281 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2D 91 87 FB 1A E8 FC 07 78 FE 81 48 B3 E7 EF 34 BE 06 9F E7 48 96 81 5E C4 98 C5 1D 0D 0C 60 6B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:29:25.556 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:29:25.557 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 12:29:26.504; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:29:26.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:29:26.877; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:29:26.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:29:26.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PHX7zI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:26.916 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A E8 35 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:29:00.000 UTC",
#     "not  after"         : "2024-01-25 12:29:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 87 46 1C 0C E1 64 C2   B3 8A BA D9 9D 16 51 F9  ..F...d.......Q.
#         0010: 77 21 57 D4                                        w!W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:26.921 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 3E 63 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:52.000 UTC",
#     "not  after"         : "2024-01-25 12:28:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:26.937 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:27.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:27.261 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:27.262 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:27.262 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:27.433 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.433 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:27.435 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:27.435 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.454 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:27.457 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "88 1F D8 C2 4E 09 1A 7F FE CC 06 0E 93 1C 2E EA 46 CD 4A 97 05 5A 1D 3B DF 33 11 5F E8 DB 2A 45",
#   "session id"          : "7C 73 C1 22 36 ED 01 0C BC DE FE E6 CB 20 53 31 28 97 6E 15 1D 0F 1A AD DC 2B C3 87 80 66 2A 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 51 2A B5 3B 95 5A EF 2C   FD F0 3C 63 09 55 F4 89  Q*.;.Z.,..<c.U..
#             0010: FA 82 02 16 0B 35 F8 FF   10 92 55 A0 62 9C 55 28  .....5....U.b.U(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.555 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "51 23 40 E9 28 8B 63 24 75 01 7B 50 1C 40 D8 24 93 1C EC 61 A2 60 D8 1C 51 4E FC E7 50 41 5C DD",
#   "session id"          : "7C 73 C1 22 36 ED 01 0C BC DE FE E6 CB 20 53 31 28 97 6E 15 1D 0F 1A AD DC 2B C3 87 80 66 2A 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 05 E7 C1 B9 F6 37 A3 02   CC F4 85 8B 73 AD 3D 09  .....7......s.=.
#           0010: 8B 66 62 CB 72 E3 49 E0   4F B4 5D 39 9F 63 20 32  .fb.r.I.O.]9.c 2
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.555 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.555 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.558 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.560 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.570 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.572 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.573 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.577 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.577 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.577 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.578 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.578 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.578 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.578 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.580 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.580 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.580 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.581 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.582 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.583 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.587 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 99 0D 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:56.000 UTC",
#       "not  after"         : "2024-01-25 12:28:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 40 78 C3 8E C8 BC 89   50 77 89 63 15 4E 20 AE  .@x.....Pw.c.N .
#           0010: 58 28 63 57                                        X(cW
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.588 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.675 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 7A 07 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:28:54.000 UTC",
#     "not  after"         : "2024-01-25 12:28:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#         0010: D2 E9 DB C0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#         0010: 52 84 C3 88                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.679 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 96 3A 65 C9 4D EB 6B   BE D1 C9 61 96 AD DC 7A  s.:e.M.k...a...z
#     0010: C2 28 71 FD E5 B5 7A 4A   EF 32 22 21 F1 A5 B1 0C  .(q...zJ.2"!....
#     0020: E0 CC 7D 47 2A B5 02 27   51 1B 7E BB 6A 0E E2 B7  ...G*..'Q...j...
#     0030: FB B8 DA 3F FD EC BC 60   0A 06 63 1C 2C 55 73 70  ...?...`..c.,Usp
#     0040: D1 E4 54 8F 88 E2 93 B3   8D 9A BE 5D 16 16 3C 3C  ..T........]..<<
#     0050: 3D 82 ED DD 94 68 28 83   D3 CA E5 49 75 29 CD BF  =....h(....Iu)..
#     0060: 07 F1 74 FD 04 ED 32 E8   4D 82 EB CB 00 89 CC 2D  ..t...2.M......-
#     0070: 0B 5E 32 18 AD A4 77 88   9A AD 1A F9 4C AA CE 87  .^2...w.....L...
#     0080: 71 05 C6 FA 3D AD 9A 77   C0 60 AE 65 52 6F 62 3B  q...=..w.`.eRob;
#     0090: 27 C3 09 81 E4 6C 47 0D   C4 1A 4D 7C 26 28 15 A2  '....lG...M.&(..
#     00A0: 22 85 4D 91 BA A2 4C CB   61 28 DF C5 9A 78 CF B0  ".M...L.a(...x..
#     00B0: 3E BA F9 F9 8E E3 9F 18   AB 6C 72 1E 9E B6 C7 B0  >........lr.....
#     00C0: 5B 61 9B 7E 4C 57 D7 FA   ED 46 51 EE B3 BA C8 41  [a..LW...FQ....A
#     00D0: 50 79 BF 98 56 1A 13 D3   9E C0 76 B4 C9 CE 22 8F  Py..V.....v...".
#     00E0: A8 2E 50 2E 3D C2 11 5F   81 1E E8 AD C9 83 C6 51  ..P.=.._.......Q
#     00F0: 5E 53 BC A5 AD E1 83 A0   98 FA A2 2B F8 1F AA 1A  ^S.........+....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.681 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 3C D0 D3 FA 7E D9 4A   B5 76 B8 7D 03 C9 B0 A8  R<.....J.v......
#     0010: 10 7C EC 5E 9D 53 3F CE   2F A2 F5 B5 09 E5 73 74  ...^.S?./.....st
#     0020: 7A 76 B3 8C BD 0D 33 E6   A9 3C 54 2B 02 44 39 10  zv....3..<T+.D9.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.684 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:27.684 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:27.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 12:29:27.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:27.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.686 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.689 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A E8 35 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:29:00.000 UTC",
#       "not  after"         : "2024-01-25 12:29:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 87 46 1C 0C E1 64 C2   B3 8A BA D9 9D 16 51 F9  ..F...d.......Q.
#           0010: 77 21 57 D4                                        w!W.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 7A 07 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:54.000 UTC",
#       "not  after"         : "2024-01-25 12:28:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#           0010: D2 E9 DB C0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.713 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2B 07 5F 7F 18 BC ED 01   3A 1B D8 EC 70 D6 C3 88  +._.....:...p...
#     0010: 3D 63 7B A3 DB 9C 2A AA   20 D1 BB A2 0B 11 C7 A7  =c....*. .......
#     0020: BA FD 1D BD B1 49 16 EC   69 6F BC B0 B1 85 E5 82  .....I..io......
#     0030: 15 65 EE 07 10 31 2B A0   98 08 C5 B8 16 03 E9 58  .e...1+........X
#     0040: 34 2A 88 B5 7E AA 32 B9   DD D5 F7 58 E0 31 E4 F5  4*....2....X.1..
#     0050: 2F E6 AC 21 17 A9 5D CB   56 3E 04 67 58 ED D5 D9  /..!..].V>.gX...
#     0060: 8A 23 1F DE 23 4C 39 6F   BE 5C 3C FF FA C0 F4 4F  .#..#L9o.\<....O
#     0070: 3F 23 AC 5B 17 61 51 71   E5 D0 9D 67 D1 01 00 E0  ?#.[.aQq...g....
#     0080: AC B3 75 71 B3 F9 C8 37   FC D8 33 69 B4 54 63 72  ..uq...7..3i.Tcr
#     0090: F1 E7 2F 09 A7 69 A5 24   D0 78 F9 74 18 F3 81 40  ../..i.$.x.t...@
#     00A0: DB AB E9 65 59 65 13 B5   65 1D FF 8E E4 CF 05 80  ...eYe..e.......
#     00B0: B4 64 90 9A 0E B7 50 62   DF C7 2A D3 02 F9 21 F3  .d....Pb..*...!.
#     00C0: CF 2F F5 39 DC 0E B2 78   A0 54 95 E4 AC 55 E9 05  ./.9...x.T...U..
#     00D0: 98 DA 0B 7D D6 42 35 9A   69 DB C4 56 5C AA 5F 76  .....B5.i..V\._v
#     00E0: 84 4C E7 95 81 68 3C 1F   D8 73 FE C8 20 68 AF D3  .L...h<..s.. h..
#     00F0: 8A 6A 36 06 CA DA 78 03   02 46 18 B7 4C 8B 56 CE  .j6...x..F..L.V.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.714 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B 20 03 10 EF 25 DA 41   39 DD BB 1A EA C8 D7 BE  . ...%.A9.......
#     0010: FE 21 BA B4 9F EB 63 2D   03 0F 78 D4 97 08 03 75  .!....c-..x....u
#     0020: C1 61 BB A2 04 AE 51 A8   B6 D9 05 98 BF 5C 1C FE  .a....Q......\..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.715 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:27.776 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "12 65 2A FA 47 14 80 18 BC DF 4C 3D 52 56 0C D8 5E AF CB FD 6C 52 8A D1 35 0C B3 1A E8 E2 94 26",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:29:28.054 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:29:28.056 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 12:29:38.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:39.151 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 7A 07 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:54.000 UTC",
#       "not  after"         : "2024-01-25 12:28:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#           0010: D2 E9 DB C0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 B2 26 5C CC FF 34 7E   00 17 18 00 53 06 FF 60  ..&\..4.....S..`
#           0010: 52 84 C3 88                                        R...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 3E 63 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:28:52.000 UTC",
#       "not  after"         : "2024-01-25 12:28:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 32 33 5C D2 2A A8 D2   7C 92 A6 FB 4A 34 71 FD  .23\.*......J4q.
#           0010: D2 E9 DB C0                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:29:39.168 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:39.510 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:39.511 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:39.511 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:29:39.511 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:39.648 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.648 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:39.650 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 12:29:39.650 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.657 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.669 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 12:29:39.672 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "82 92 C9 B4 12 1B 18 B0 FF F9 51 8F E8 D0 82 69 8E BD E4 7B 2E 1D 5C 25 2E FC D9 54 71 E0 80 88",
#     "session id"          : "F8 13 AE D7 4E 46 EA 84 EA 38 93 DD D2 E0 20 95 BF D5 3E 11 C4 F6 0F 19 DB 69 9B 73 7F B7 35 67",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 80 D8 54 45 67 72 0F D3   69 E4 8E 81 73 C2 10 38  ..TEgr..i...s..8
#               0010: DE D9 ED 22 C3 87 FC 35   3E 76 B5 6B 64 20 A6 1F  ..."...5>v.kd ..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.691 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 9A 7A 66 8A FC 8A 70 48 FB 86 B0 BE 8F 00 29 BD 6D 8D 83 40 92 26 8D 9E BB DE 45 42 AD 4C 5E",
#     "session id"          : "F8 13 AE D7 4E 46 EA 84 EA 38 93 DD D2 E0 20 95 BF D5 3E 11 C4 F6 0F 19 DB 69 9B 73 7F B7 35 67",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E F8 BF E1 86 65 1A 12   3A 6B 0D 92 7C 4D 78 24  ^....e..:k...Mx$
#             0010: E8 C1 CD 13 62 55 C7 9A   06 3A 60 57 9C A6 A4 3F  ....bU...:`W...?
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.692 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.692 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.694 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.697 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.697 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:39.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:39.699 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.708 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.709 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.713 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.713 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.713 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.713 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.714 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:39.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:29:39.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 12:29:39.716 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 12:30:57.955 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:30:57.999 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:30:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:30:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:30:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44598/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28486ms
ok 65 stop command for single port in 31486ms
ok 66 status detects locally running solr in 14378ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6687ms
ok 70 upconfig in 2661ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m40s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5748 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5748/

All tests passed

Build Log:
[...truncated 1311 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43415/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 10:03:57.310; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 10:03:57.315; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 10:03:58.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 10:03:58.573; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23363ms
ok 61 start solr with client truststore and security manager in 25092ms
not ok 62 start solr with mTLS needed in 58702ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rfg7w7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43415.
#
# Started Solr server on port 43415 (pid=199207). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43416.
#
# Started Solr server on port 43416 (pid=199632). Happy searching!
#
# INFO  - 2023-10-27 10:05:22.143; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 10:05:22.148; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 10:05:22.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 10:05:22.516; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 10:05:22.516; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:22.547 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9E F4 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:58.000 UTC",
#     "not  after"         : "2024-01-25 10:04:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 35 96 9B C7 FC 67 31   BD 2B D5 E5 43 3A 00 33  45....g1.+..C:.3
#         0010: 3B A9 F8 0A                                        ;...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:22.552 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 77 DE 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:50.000 UTC",
#     "not  after"         : "2024-01-25 10:04:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:22.566 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:22.789 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.789 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:22.791 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:22.791 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.797 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.808 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:22.811 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "51 D3 E7 B9 BB 6B D4 CE FE A7 FC 93 33 EF 4C 08 55 B1 11 6F 15 04 BC 46 66 F1 10 A7 B2 38 E5 9E",
#   "session id"          : "D2 2C C2 09 63 E5 7F 44 68 D2 51 2C CA 19 71 AF 9F F3 F2 76 6F D7 1D CE 6E 65 C1 F5 F2 53 2A FB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 5A 07 D3 33 B3 5F B8   62 3E E1 8E DD C0 1A 6F  .Z..3._.b>.....o
#             0010: F2 BC 60 1F A3 30 22 A4   BF AD F3 28 34 87 1D 24  ..`..0"....(4..$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.922 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "27 73 17 B0 E4 8B 27 4A 63 F5 E4 FA 44 96 50 AE 02 F0 02 7F F7 05 1C 78 DD B1 11 4B DE F5 4C 77",
#   "session id"          : "D2 2C C2 09 63 E5 7F 44 68 D2 51 2C CA 19 71 AF 9F F3 F2 76 6F D7 1D CE 6E 65 C1 F5 F2 53 2A FB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 49 75 D8 5A 94 AA E4 31   96 52 2E 8E 76 7E 59 4F  Iu.Z...1.R..v.YO
#           0010: 6A B5 EF 40 29 66 43 F5   C5 57 AA 99 A8 14 56 4E  j..@)fC..W....VN
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.923 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.923 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.925 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.928 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.928 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:22.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.937 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.938 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.940 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.943 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.943 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.943 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:22.944 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.946 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.946 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.946 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.947 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.948 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.948 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:22.949 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.951 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 30 88 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:54.000 UTC",
#       "not  after"         : "2024-01-25 10:04:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 02 9C 06 A6 74 31 D2 23   4F 40 0D BC EE 79 53 6F  ....t1.#O@...ySo
#           0010: BD 58 9F 63                                        .X.c
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:22.951 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:23.010 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:23.011 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:23.011 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:23.011 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.031 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.035 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 37 4F 91 3B A6 DA 9E   92 88 1F EC 2D 96 7D DF  @7O.;.......-...
#     0010: FC 7F 1C 49 9D 12 82 7A   DA 37 4B E2 69 81 D7 71  ...I...z.7K.i..q
#     0020: 0C D9 CE 45 01 F8 54 59   A8 1E 75 CE FC 2D BE AE  ...E..TY..u..-..
#     0030: 2D E4 A8 64 37 94 56 D4   30 1C B8 64 2F 49 80 55  -..d7.V.0..d/I.U
#     0040: BA D0 73 CF 73 F7 A2 9E   56 CA 1F E4 7E 42 57 41  ..s.s...V....BWA
#     0050: 2F 04 BA 8E BA 48 BA EB   0C 1B D4 F6 99 D9 96 E3  /....H..........
#     0060: 8B ED 9D DB 44 3C 14 60   1D EC 0D 6E 44 32 74 D5  ....D<.`...nD2t.
#     0070: 0A 96 79 04 FC 1F F9 9E   27 90 20 A5 22 7C 74 F0  ..y.....'. .".t.
#     0080: 53 52 0D 61 BB E2 D1 9F   2F 52 72 3B C8 C4 AC E1  SR.a..../Rr;....
#     0090: 47 31 E4 C6 BB 44 D4 28   FC 67 85 C9 1A 36 62 F4  G1...D.(.g...6b.
#     00A0: DA 82 A6 97 41 59 A6 95   96 F8 D5 7F 8A 87 49 7D  ....AY........I.
#     00B0: D3 CC 31 46 E9 1D 4C 0F   2A BC D4 48 A2 1E 50 F7  ..1F..L.*..H..P.
#     00C0: BD 6D 8E D9 2C E9 5E 7B   C7 04 9E 31 E2 DE D7 73  .m..,.^....1...s
#     00D0: FB 89 F2 B0 41 F3 E3 0E   58 7A 42 6E 28 34 30 31  ....A...XzBn(401
#     00E0: 83 5D 3D 9C A6 61 76 98   73 6A 37 B5 41 C5 B3 40  .]=..av.sj7.A..@
#     00F0: E5 C8 85 6C E4 EC 4D 0B   D0 79 80 9C ED 09 E7 40  ...l..M..y.....@
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.036 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FC CD 83 19 A3 95 9F 6D   B2 08 4D AF EF 81 75 C5  .......m..M...u.
#     0010: A7 C1 F5 2E EB F1 64 7A   D1 48 23 F6 6C 46 AA BC  ......dz.H#.lF..
#     0020: D8 B3 77 E9 4B 13 70 CE   BC F8 14 D3 4C 5D FD 08  ..w.K.p.....L]..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.039 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:23.040 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:23.040 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:23.040 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:23.040 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:23.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:23.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.041 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.044 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 9E F4 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:58.000 UTC",
#       "not  after"         : "2024-01-25 10:04:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 35 96 9B C7 FC 67 31   BD 2B D5 E5 43 3A 00 33  45....g1.+..C:.3
#           0010: 3B A9 F8 0A                                        ;...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 3C 65 FF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:52.000 UTC",
#       "not  after"         : "2024-01-25 10:04:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#           0010: 5D 73 FB 6D                                        ]s.m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.070 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 F3 AC 71 68 DF 1F 9C   B6 9A DB 5A 65 A6 78 39  ...qh......Ze.x9
#     0010: 41 56 CB 2F A0 C5 56 87   54 2C 91 A8 3F B7 05 D5  AV./..V.T,..?...
#     0020: 6B 78 EC C3 26 E7 D9 64   C8 3F DB 4A E5 DD 2B AA  kx..&..d.?.J..+.
#     0030: F9 FF 7F CC FA 77 60 E8   2A ED 15 E5 DB FA 09 88  .....w`.*.......
#     0040: 91 19 DD CD 3A 22 92 8D   59 99 F4 9B DF 32 4A 83  ....:"..Y....2J.
#     0050: 23 07 54 85 4E FA 09 C3   13 B0 4E F7 50 D2 AE E7  #.T.N.....N.P...
#     0060: AC 31 87 B7 95 70 6F 83   E7 7D B0 58 C5 06 E0 3C  .1...po....X...<
#     0070: 86 E0 E8 60 75 B0 98 27   01 A6 66 EC D0 A0 46 D3  ...`u..'..f...F.
#     0080: 53 06 47 C1 6D BA E6 34   B8 86 8C 49 CF 61 ED 51  S.G.m..4...I.a.Q
#     0090: 56 4C 20 09 C2 F0 DC 92   54 21 E4 95 63 D9 AD E2  VL .....T!..c...
#     00A0: CE D4 1F 4B D0 63 DB 8A   11 07 79 E4 06 00 A4 A9  ...K.c....y.....
#     00B0: DF B3 64 DA 0A DF A1 58   0C 6D 85 A4 95 EF E3 11  ..d....X.m......
#     00C0: 96 F1 51 C1 29 D0 39 CD   F0 A4 31 FF BE 19 76 5C  ..Q.).9...1...v\
#     00D0: 5E 16 53 89 53 D8 3F 8F   66 1B 64 BB E6 F8 3E 5E  ^.S.S.?.f.d...>^
#     00E0: E2 FC 9A EC 0E FC 5D AC   11 9A 2F 9B 32 39 68 E3  ......].../.29h.
#     00F0: B7 67 DA A2 26 EB C4 02   AA 07 28 9F 48 59 8E 05  .g..&.....(.HY..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.071 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B B7 18 47 8D 57 04 4B   9E D2 AA 1A A8 88 51 90  ...G.W.K......Q.
#     0010: 4A 4F 48 5A FF E7 49 3E   F1 3C E1 FE 78 2F 8F 2A  JOHZ..I>.<..x/.*
#     0020: C9 6D 8D F5 FD 53 29 68   34 DE 68 5C 68 56 AC 46  .m...S)h4.h\hV.F
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.072 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:23.127 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD E9 D0 FC 5D 34 5D E4 62 8F AA 66 C7 C7 33 DD FD 4F D1 B6 74 7C D9 83 2C E4 9C 24 7E 4D 56 4F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 10:05:23.454 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 10:05:23.455 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 10:05:24.396; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 10:05:24.402; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 10:05:24.766; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 10:05:24.769; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 10:05:24.769; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rfg7w7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:24.801 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9E F4 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:58.000 UTC",
#     "not  after"         : "2024-01-25 10:04:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 35 96 9B C7 FC 67 31   BD 2B D5 E5 43 3A 00 33  45....g1.+..C:.3
#         0010: 3B A9 F8 0A                                        ;...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:24.805 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 77 DE 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:50.000 UTC",
#     "not  after"         : "2024-01-25 10:04:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:24.819 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:25.047 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.048 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:25.049 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:25.050 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.056 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.068 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.068 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.068 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:25.070 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "15 D5 55 96 AF D4 84 42 FC 0F 61 2A CD 6C F7 2F 80 DF 56 6F EA 15 86 F2 37 9B B7 8F DA AF DE C9",
#   "session id"          : "22 0A 93 3C D2 FA 25 07 F7 D4 40 4A 11 F6 1D 55 00 B0 9F C8 DC 2A 50 4D F6 CF A2 11 27 02 D8 B6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 87 AB 32 CA C2 DE 49 2E   FE 67 8B DA 9A 15 52 36  ..2...I..g....R6
#             0010: 04 0F 1D 4F 97 D5 BC 6C   73 30 59 FE C2 07 01 63  ...O...ls0Y....c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.172 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 A3 BD 1B 9E 19 CD D9 BB 8D 86 40 72 B8 A7 94 1E B0 50 A0 1E C3 46 86 FD A6 E7 47 87 FB 79 58",
#   "session id"          : "22 0A 93 3C D2 FA 25 07 F7 D4 40 4A 11 F6 1D 55 00 B0 9F C8 DC 2A 50 4D F6 CF A2 11 27 02 D8 B6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EC C1 B6 D5 86 23 4C 90   08 FD D7 65 BC 21 4D DE  .....#L....e.!M.
#           0010: 4A 4E 03 D1 4D 53 A4 C1   1D 09 D8 B1 CE 3F 7D 42  JN..MS.......?.B
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.172 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.173 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.175 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.177 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.186 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.188 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.189 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.192 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.195 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.195 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.196 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.196 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.197 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.197 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.200 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 30 88 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:54.000 UTC",
#       "not  after"         : "2024-01-25 10:04:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 02 9C 06 A6 74 31 D2 23   4F 40 0D BC EE 79 53 6F  ....t1.#O@...ySo
#           0010: BD 58 9F 63                                        .X.c
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:25.274 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:25.274 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:25.275 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:25.275 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.295 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 3C 65 FF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 10:04:52.000 UTC",
#     "not  after"         : "2024-01-25 10:04:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#         0010: 5D 73 FB 6D                                        ]s.m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#         0010: C8 F2 DF 30                                        ...0
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.299 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 86 35 95 F7 98 76 27   7F BA 5B 62 89 59 AA 65  <.5...v'..[b.Y.e
#     0010: 4A D0 9C 26 CF F5 16 2B   BB 18 6B 8E 70 F7 49 63  J..&...+..k.p.Ic
#     0020: D3 AA DC 20 28 82 09 B4   B6 F8 EA BE 53 B1 25 8F  ... (.......S.%.
#     0030: 36 15 9E 5B 51 E1 58 C3   EA 33 2A 07 1E E6 C2 0C  6..[Q.X..3*.....
#     0040: D8 F0 42 87 64 B2 5E 8F   FE EA 20 82 38 45 12 79  ..B.d.^... .8E.y
#     0050: 9F 30 DB 79 DC 8C 19 28   D0 EA 6E B3 65 0D 8E 1A  .0.y...(..n.e...
#     0060: 89 92 DC 79 60 FB BD F4   57 94 0B CC B3 91 B2 ED  ...y`...W.......
#     0070: 2C DF 59 90 7E 7A 8E 87   71 F0 5C EC 99 89 85 7B  ,.Y..z..q.\.....
#     0080: 17 15 26 11 2A FE 49 F9   51 93 1F 36 42 40 A3 92  ..&.*.I.Q..6B@..
#     0090: 02 14 18 F0 8B AD D5 1E   9A 1D F0 8D 41 DF B6 B3  ............A...
#     00A0: 43 24 37 08 4E 48 3F 19   D5 3F F1 2D F4 35 B0 61  C$7.NH?..?.-.5.a
#     00B0: 70 87 AC E1 6C 31 F0 41   2F B9 3A E1 77 7B 88 02  p...l1.A/.:.w...
#     00C0: E5 2A DF 42 6A 39 AA 97   2B 07 59 D2 50 C5 E5 9B  .*.Bj9..+.Y.P...
#     00D0: 2D 07 2B 27 7C 99 7B 9F   7D C6 64 65 2B 76 32 84  -.+'......de+v2.
#     00E0: 2B E7 A8 70 D6 BF 3E 64   9E 20 A1 4C 18 F3 72 46  +..p..>d. .L..rF
#     00F0: E2 45 11 81 BC 97 AA 63   5C 59 FD CF A4 29 42 DA  .E.....c\Y...)B.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.301 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 06 1A 19 68 EB F1 8D   C0 4E 41 04 64 06 64 E1  R...h....NA.d.d.
#     0010: 3E C8 1C 8A 2E 8A 0E FE   0C FE B3 23 EE F1 C4 87  >..........#....
#     0020: C8 AA D7 4F CE C6 BB F4   BF D9 4F 33 B5 C2 42 F1  ...O......O3..B.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.303 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:25.304 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.304 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:25.305 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.305 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 10:05:25.305 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:25.305 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.306 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.308 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 9E F4 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:58.000 UTC",
#       "not  after"         : "2024-01-25 10:04:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 35 96 9B C7 FC 67 31   BD 2B D5 E5 43 3A 00 33  45....g1.+..C:.3
#           0010: 3B A9 F8 0A                                        ;...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 3C 65 FF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:52.000 UTC",
#       "not  after"         : "2024-01-25 10:04:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#           0010: 5D 73 FB 6D                                        ]s.m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.334 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 3A FB 77 FF E7 DB D8   37 8B 4A 19 C1 0B 0E 75  2:.w....7.J....u
#     0010: E0 FA E2 08 58 B2 8E 12   55 0A 49 E0 49 4A D5 6A  ....X...U.I.IJ.j
#     0020: 1D 0F 63 54 1A 05 F1 0B   D4 36 AB 24 88 91 0E 61  ..cT.....6.$...a
#     0030: 80 80 19 51 08 0E 91 32   EA 8D AD B6 A7 F3 52 FA  ...Q...2......R.
#     0040: CD 62 DB CA 11 A4 67 83   6B 38 2E EF B4 64 5A 7C  .b....g.k8...dZ.
#     0050: B0 17 FB 6E 09 3C FA 38   17 EB 4F 25 8B 5A 59 00  ...n.<.8..O%.ZY.
#     0060: C3 7B EF 09 FB 13 9A EA   0F D4 63 41 B0 D9 37 9B  ..........cA..7.
#     0070: E1 1B BD C0 9F FB 27 E7   AA C4 47 F8 D6 C0 68 53  ......'...G...hS
#     0080: 71 24 51 6B 69 54 75 2E   10 81 40 1F 1C F9 77 62  q$QkiTu...@...wb
#     0090: B1 4C 06 C6 B8 6D AC DA   92 7A 7F 36 FB D7 1D FF  .L...m...z.6....
#     00A0: BA 67 B7 3C 3F 5A 81 8B   39 EF 22 EE 36 50 B3 88  .g.<?Z..9.".6P..
#     00B0: 78 89 ED 5F 68 BB A4 6C   9C BD BB 0A F0 20 F1 D8  x.._h..l..... ..
#     00C0: FD 06 63 FB BE C1 93 D9   52 88 B6 E4 2F 57 A3 75  ..c.....R.../W.u
#     00D0: 18 D4 A8 DB BC 05 3C A4   72 5D E3 10 DC 07 40 71  ......<.r]....@q
#     00E0: 67 F4 E8 89 6D F5 AB 51   92 82 29 05 42 EB 7F 3A  g...m..Q..).B..:
#     00F0: 3C 5F 7A 88 F5 83 BA 34   CE D4 25 A8 C8 C3 1B CC  <_z....4..%.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.335 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4D 77 09 F0 F3 86 E6 0B   FC EE 99 74 44 B8 2A 7D  Mw.........tD.*.
#     0010: 23 EE AD 5D 5B 11 18 2A   5B F7 EA 02 6E 3A 97 3E  #..][..*[...n:.>
#     0020: BC 82 6D DB 67 C3 C9 BC   34 72 3D 7A C4 BE A6 A8  ..m.g...4r=z....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.335 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:25.391 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0E 2D 72 19 AB 7A 44 D0 1E CD 86 80 7E AD C7 97 C0 3B 60 97 6F 9C 4D 36 C6 CD F7 B7 20 F4 3E 29",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 10:05:25.698 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 10:05:25.699 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 10:05:36.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:37.055 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E 77 DE 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:50.000 UTC",
#       "not  after"         : "2024-01-25 10:04:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#           0010: 5D 73 FB 6D                                        ]s.m
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 3C 65 FF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 10:04:52.000 UTC",
#       "not  after"         : "2024-01-25 10:04:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA F1 48 3C 3A AC 4A 1D   9F 22 C0 67 45 33 8A 54  ..H<:.J..".gE3.T
#           0010: 5D 73 FB 6D                                        ]s.m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF E4 6B 8D FE 1B 8E C0   9F 83 14 11 88 13 E6 43  ..k............C
#           0010: C8 F2 DF 30                                        ...0
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 10:05:37.070 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:37.164 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:37.170 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:37.171 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:05:37.171 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:37.305 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.306 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:37.307 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 10:05:37.308 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.313 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.325 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.325 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.325 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 10:05:37.328 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "53 FC A2 0A B5 66 3D C9 0B 14 A8 8A 54 F8 54 0A 2B 47 B5 93 50 6A F7 AC E1 52 9F B7 C0 B6 37 B2",
#     "session id"          : "27 9D 0B 2D D6 C0 43 57 B7 7C D8 2A 1B F0 37 94 0D 66 4C 8C 04 60 DA F9 75 F4 8A 9D CF C8 19 6B",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E3 02 7C A6 15 B1 88 2E   EB B9 B1 38 45 A8 56 B0  ...........8E.V.
#               0010: 47 B9 8F F9 0D 8F 98 99   88 DA 7D 28 14 79 C8 43  G..........(.y.C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.346 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1F 07 C2 97 A9 24 17 3A BB 4C 29 C6 92 45 6B 8F 3E E8 A2 38 B3 8D 4D 22 33 83 38 9C 67 9E 50 D5",
#     "session id"          : "27 9D 0B 2D D6 C0 43 57 B7 7C D8 2A 1B F0 37 94 0D 66 4C 8C 04 60 DA F9 75 F4 8A 9D CF C8 19 6B",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 2B 10 FA A2 C0 45 3D   6C 9A F9 05 8C 4F 25 40  .+....E=l....O%@
#             0010: A4 D4 6D 8B 75 70 C3 D5   A8 42 91 2A DA 17 50 6C  ..m.up...B.*..Pl
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.347 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.347 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.349 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.351 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.352 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.360 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.362 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.363 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.366 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:05:37.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 10:05:37.369 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 10:06:58.732 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:06:58.792 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:06:58.793 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:06:58.793 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 10:06:58.793 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43416/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28136ms
ok 65 stop command for single port in 31092ms
ok 66 status detects locally running solr in 14374ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2165ms
ok 69 copying files around in 6591ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1211ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 20s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m45.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5747 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5747/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithHadoopAuthPlugin.classMethod

Error Message:
org.apache.kerby.kerberos.kerb.KrbException: Failed to start DefaultKrbServer

Stack Trace:
org.apache.kerby.kerberos.kerb.KrbException: Failed to start DefaultKrbServer
	at __randomizedtesting.SeedInfo.seed([1FBED56C63F04A4B]:0)
	at app//org.apache.kerby.kerberos.kerb.server.impl.AbstractInternalKdcServer.start(AbstractInternalKdcServer.java:84)
	at app//org.apache.kerby.kerberos.kerb.server.KdcServer.start(KdcServer.java:268)
	at app//org.apache.kerby.kerberos.kerb.server.SimpleKdcServer.start(SimpleKdcServer.java:163)
	at app//org.apache.hadoop.minikdc.MiniKdc.start(MiniKdc.java:284)
	at app//org.apache.solr.security.hadoop.KerberosTestServices.start(KerberosTestServices.java:75)
	at app//org.apache.solr.security.hadoop.KerberosUtils.setupMiniKdc(KerberosUtils.java:46)
	at app//org.apache.solr.security.hadoop.TestSolrCloudWithHadoopAuthPlugin.setupClass(TestSolrCloudWithHadoopAuthPlugin.java:41)
	at java.base@11.0.16/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base@11.0.16/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base@11.0.16/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base@11.0.16/java.lang.reflect.Method.invoke(Method.java:566)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:886)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
Caused by: java.net.BindException: Address already in use (Bind failed)
	at java.base/java.net.PlainSocketImpl.socketBind(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:452)
	at java.base/java.net.ServerSocket.bind(ServerSocket.java:395)
	at java.base/java.net.ServerSocket.bind(ServerSocket.java:349)
	at org.apache.kerby.kerberos.kerb.transport.KdcNetwork.listen(KdcNetwork.java:64)
	at org.apache.kerby.kerberos.kerb.server.impl.DefaultInternalKdcServerImpl.doStart(DefaultInternalKdcServerImpl.java:67)
	at org.apache.kerby.kerberos.kerb.server.impl.AbstractInternalKdcServer.start(AbstractInternalKdcServer.java:82)
	... 36 more




Build Log:
[...truncated 1246 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestSolrCloudWithHadoopAuthPlugin.classMethod (:solr:modules:hadoop-auth)
    Test output: /tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithHadoopAuthPlugin.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithHadoopAuthPlugin.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=1FBED56C63F04A4B -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hadoop-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 22s
624 actionable tasks: 607 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m56s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5746 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5746/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37663/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 05:25:03.364; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 05:25:03.369; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 05:25:04.606; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 05:25:04.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22803ms
ok 61 start solr with client truststore and security manager in 25185ms
not ok 62 start solr with mTLS needed in 57915ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-coWQBi/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37663.
#
# Started Solr server on port 37663 (pid=197455). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37664.
#
# Started Solr server on port 37664 (pid=197887). Happy searching!
#
# INFO  - 2023-10-27 05:26:27.479; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 05:26:27.484; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 05:26:27.861; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 05:26:27.865; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 05:26:27.865; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:27.900 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 AD 2A 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:26:03.000 UTC",
#     "not  after"         : "2024-01-25 05:26:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 5E B9 32 A6 BB B0 EC   C5 32 34 F9 6D 18 5E 88  r^.2.....24.m.^.
#         0010: 0B 2D 31 65                                        .-1e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:27.905 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 58 45 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:55.000 UTC",
#     "not  after"         : "2024-01-25 05:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:27.920 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:28.021 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:28.022 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:28.022 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:28.022 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:28.168 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.168 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:28.170 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:28.170 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.176 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.189 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.189 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.189 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:28.191 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9E 38 07 4C 87 8F B2 4B 58 46 6F 4E DB 41 7F 68 68 CA 89 45 33 21 2C 07 1B C2 23 A1 35 8F 1F A3",
#   "session id"          : "99 5C 95 CB 8E 48 A6 A0 70 27 9E F5 5F 83 C5 0D 25 71 27 3E F0 59 43 F3 FA 0D 14 30 35 69 98 58",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 B5 2D B8 37 4C F4 51   D7 DA 2F EC 22 42 63 46  ..-.7L.Q../."BcF
#             0010: 99 6A 5A 23 ED 97 91 D3   62 E9 24 DD B4 E5 59 02  .jZ#....b.$...Y.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.302 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C7 D4 98 71 29 D0 9D A6 B0 9B B7 E2 5A 9B D9 3E 0D B4 75 20 3B B5 89 2C 96 25 D2 DD 33 26 E6 C0",
#   "session id"          : "99 5C 95 CB 8E 48 A6 A0 70 27 9E F5 5F 83 C5 0D 25 71 27 3E F0 59 43 F3 FA 0D 14 30 35 69 98 58",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 54 99 96 5D 47 02 1F 57   2F 72 C3 DD 59 28 D8 24  T..]G..W/r..Y(.$
#           0010: 8C E0 F0 53 5B 3F 1B 47   6C 7B C8 6C AE F3 24 00  ...S[?.Gl..l..$.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.303 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.303 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.304 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.304 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.305 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.306 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.308 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.308 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.309 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.309 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.309 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.310 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.310 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.310 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.310 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.310 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.311 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.311 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.311 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.311 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.319 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.321 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.322 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.326 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.326 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.327 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.327 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.327 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.327 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.327 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.329 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.330 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.330 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.330 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.333 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.333 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.337 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 DA B7 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:59.000 UTC",
#       "not  after"         : "2024-01-25 05:25:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 58 61 AA C7 81 DB AA   9A 13 50 40 1B 19 92 99  .Xa.......P@....
#           0010: F1 E7 E1 49                                        ...I
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.337 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.420 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.424 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 07 A2 F9 7D FB 6D A9   87 76 6C 54 93 10 A1 59  y.....m..vlT...Y
#     0010: AB E5 2C 5D AD DF BF 43   E6 BB 33 79 DD D6 91 0C  ..,]...C..3y....
#     0020: FE 4D 18 0A 9C B6 BD C5   42 A0 62 97 B8 86 1F 85  .M......B.b.....
#     0030: 83 E7 DF 5B 53 49 7C 07   21 9F 83 27 12 21 DC A4  ...[SI..!..'.!..
#     0040: F1 8D D0 A6 BD 8A 44 E0   7A 60 1F C5 99 6F AF 62  ......D.z`...o.b
#     0050: E1 E3 59 C5 E8 D2 17 36   C3 5C 97 96 12 78 72 39  ..Y....6.\...xr9
#     0060: A7 58 BC 58 52 E5 38 01   33 CF 75 50 CB FA 92 9A  .X.XR.8.3.uP....
#     0070: 97 FA 10 34 AB A8 92 4F   93 94 F9 AE BD 3A 53 5D  ...4...O.....:S]
#     0080: 8D 94 FE 42 3A 1E 63 EF   98 72 3E C4 46 F4 26 44  ...B:.c..r>.F.&D
#     0090: 86 99 2D 73 F9 38 B5 7F   EE 23 B9 A9 8E A3 BA 5F  ..-s.8...#....._
#     00A0: D3 DF AA EF 5C 7C FD D7   53 56 42 0C CC 8E A6 BA  ....\...SVB.....
#     00B0: BB D0 F2 EE F4 A7 3D C1   EE 5D E5 86 56 36 FF C2  ......=..]..V6..
#     00C0: D9 0D C9 93 62 DE FE D0   C6 90 7E F2 30 15 12 24  ....b.......0..$
#     00D0: 69 D3 DE CE 43 B2 74 DD   AE 64 D9 9B 04 54 46 6B  i...C.t..d...TFk
#     00E0: E5 60 FF A8 A8 B2 0D 12   76 EB 7B C0 80 24 8F ED  .`......v....$..
#     00F0: D2 6D A6 47 3B 14 E4 13   E4 0D 12 E4 35 DB 67 5A  .m.G;.......5.gZ
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.425 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1A 24 0A B1 43 8D EC BF   10 29 A2 CA 45 05 E9 F4  .$..C....)..E...
#     0010: 68 50 1A FB C3 B9 B9 4B   A6 C7 01 C8 54 D3 B3 91  hP.....K....T...
#     0020: EE 72 EE 9C 87 C8 81 68   4A D4 82 EA CC 76 27 08  .r.....hJ....v'.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.428 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:28.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:28.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:28.430 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:28.430 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.430 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.433 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 AD 2A 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:26:03.000 UTC",
#       "not  after"         : "2024-01-25 05:26:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 5E B9 32 A6 BB B0 EC   C5 32 34 F9 6D 18 5E 88  r^.2.....24.m.^.
#           0010: 0B 2D 31 65                                        .-1e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 C1 36 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:57.000 UTC",
#       "not  after"         : "2024-01-25 05:25:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#           0010: A2 2F 88 F3                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.460 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BA 0B 5C EC F7 A8 0E 0F   57 EC BD B7 85 A9 F2 8A  ..\.....W.......
#     0010: 64 5A 05 9B B8 15 E4 D9   CE EE BF 98 06 BD D6 5B  dZ.............[
#     0020: FE 87 B1 50 74 D5 14 0D   D2 BA 35 B7 0A CA 00 AB  ...Pt.....5.....
#     0030: 56 02 35 67 DF 80 87 51   C2 31 AE 1B 74 73 1C 2F  V.5g...Q.1..ts./
#     0040: 2A 36 EC 3A 85 9B C7 B1   3B 15 5B 4E C0 EE 07 16  *6.:....;.[N....
#     0050: 25 86 2F CE DA E8 09 38   07 4F A8 F2 CF 39 1D EB  %./....8.O...9..
#     0060: E3 40 FC B6 F6 46 1E A0   69 8C EF 57 F4 3A D2 9D  .@...F..i..W.:..
#     0070: 2F 26 2A C6 69 AF 3E B5   D7 5A FF 04 EC D1 CF E4  /&*.i.>..Z......
#     0080: 6E E5 9B 61 B5 AC 82 2F   20 C1 A6 E1 F6 C8 13 27  n..a.../ ......'
#     0090: 1B 07 F5 47 9C B2 BF 9A   DE 86 7C 69 89 57 8F 84  ...G.......i.W..
#     00A0: 91 8E 24 E3 B6 6A 67 37   45 03 BD 35 B5 A4 2F B4  ..$..jg7E..5../.
#     00B0: D5 4B 7A C0 F8 DB E3 2A   7E 24 E4 41 4B 9D F4 6C  .Kz....*.$.AK..l
#     00C0: 2A CC 29 F9 2C A6 BE 90   5D 06 96 E1 44 CE E1 A1  *.).,...]...D...
#     00D0: BE FB 06 74 5E 33 79 FF   6F 30 52 A0 58 C9 AD 43  ...t^3y.o0R.X..C
#     00E0: 79 F9 89 7D 25 8B 97 6F   18 F2 17 08 A2 02 B2 BD  y...%..o........
#     00F0: 2D 14 B6 A6 57 F2 87 83   54 F7 CE 5E E8 E2 D6 1E  -...W...T..^....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.461 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 51 D7 A5 43 5A 01 94 78   18 15 63 C3 55 18 ED 1A  Q..CZ..x..c.U...
#     0010: D6 FD 9C 68 5A 3B F2 88   E5 45 8B 01 40 53 2F B2  ...hZ;...E..@S/.
#     0020: 6D DD E2 E6 70 1C B2 67   EC E9 74 A5 84 94 DD 00  m...p..g..t.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.462 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:28.528 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "71 1E 56 BC CE 23 DB CF CE 67 C1 4F CE A9 2D 0E EE E3 39 BB 07 70 44 4F 3F 28 BF 35 D5 71 12 A6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 05:26:28.813 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 05:26:28.814 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 05:26:29.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 05:26:29.752; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 05:26:30.110; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 05:26:30.112; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 05:26:30.113; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-coWQBi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:30.144 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 AD 2A 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:26:03.000 UTC",
#     "not  after"         : "2024-01-25 05:26:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 5E B9 32 A6 BB B0 EC   C5 32 34 F9 6D 18 5E 88  r^.2.....24.m.^.
#         0010: 0B 2D 31 65                                        .-1e
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:30.148 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 58 45 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:55.000 UTC",
#     "not  after"         : "2024-01-25 05:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:30.162 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:30.252 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:30.252 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:30.252 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:26:30.253 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:30.392 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.392 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:30.393 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:30.394 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.411 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:30.413 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6E 69 4D 44 AF C8 BE 7A ED 91 BD 3C B8 2E 25 81 64 00 22 7C CF 3C 5A EF 92 DA 9F 4E 2D CD 88 CC",
#   "session id"          : "77 FD C7 F4 71 B6 77 37 A0 DB 8F 48 B0 C4 7E DA 00 B1 2C 27 F6 C5 B8 4A 8B D9 5B 45 1B E5 4E C9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 9F 08 35 BA 3D 7D 1C   AF 06 31 D7 01 AA E0 2F  5..5.=....1..../
#             0010: 5D E5 37 AF 76 F0 65 21   BB 54 01 78 AB 64 79 18  ].7.v.e!.T.x.dy.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.513 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 DF 10 92 BF 66 DB 6B 33 0F D4 E6 E1 2E 91 27 1F 3C 77 EA B3 AF 45 D8 C3 8B 8C 8E 98 E4 E3 B6",
#   "session id"          : "77 FD C7 F4 71 B6 77 37 A0 DB 8F 48 B0 C4 7E DA 00 B1 2C 27 F6 C5 B8 4A 8B D9 5B 45 1B E5 4E C9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B6 A5 2D FC ED DD AE FE   AC BB 1E 78 A8 C6 08 2F  ..-........x.../
#           0010: FB 31 DB 58 FB E7 6B A0   9A 1A B5 CB BF 53 1E 74  .1.X..k......S.t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.514 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.514 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.519 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.519 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.520 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.521 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.521 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.528 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.530 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.534 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.534 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.534 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.534 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.534 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.535 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.535 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.536 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.537 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.537 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.537 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.538 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.539 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.539 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.542 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 DA B7 E9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:59.000 UTC",
#       "not  after"         : "2024-01-25 05:25:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 58 61 AA C7 81 DB AA   9A 13 50 40 1B 19 92 99  .Xa.......P@....
#           0010: F1 E7 E1 49                                        ...I
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.542 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.622 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 C1 36 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 05:25:57.000 UTC",
#     "not  after"         : "2024-01-25 05:25:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#         0010: A2 2F 88 F3                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#         0010: 73 1F D1 97                                        s...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.626 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0C 44 D6 96 B4 82 A0 59   B2 CD 7B B7 28 A9 77 15  .D.....Y....(.w.
#     0010: D6 5A 48 60 08 ED 95 9A   A1 A4 6E 2A 57 DF D6 36  .ZH`......n*W..6
#     0020: FE C0 90 7E 81 69 E6 38   CF 09 BC F8 42 B9 10 12  .....i.8....B...
#     0030: CD 7D 79 4E FD 60 B7 0E   66 4E BF 10 95 CE 91 7B  ..yN.`..fN......
#     0040: 6A C9 D5 49 A2 C3 40 70   39 B0 CB 4E 51 3E B9 4A  j..I..@p9..NQ>.J
#     0050: F0 A9 D3 37 8E 01 5B 09   E2 D7 7E B1 49 F1 29 87  ...7..[.....I.).
#     0060: 1A E3 A0 9D D4 11 E3 90   BA 03 0F 24 93 1A AD DB  ...........$....
#     0070: EB 33 16 C3 5C C7 64 30   E0 95 28 9D 86 6C F7 A7  .3..\.d0..(..l..
#     0080: EE 37 A0 0A CA 62 83 D9   3C 44 FC 7C 02 54 AB 54  .7...b..<D...T.T
#     0090: 26 17 0A A0 71 CA A9 5C   A1 4A EF 5A A6 A1 EB DF  &...q..\.J.Z....
#     00A0: 4A DD 78 43 19 EC F5 9B   70 0D 37 2D B5 48 42 9B  J.xC....p.7-.HB.
#     00B0: FE 5C 1F B6 CF 19 01 99   2F C3 38 C6 42 F0 30 0B  .\....../.8.B.0.
#     00C0: 62 2B E5 6D 4F 39 E4 C2   36 8B 8A F9 78 F2 9B 4F  b+.mO9..6...x..O
#     00D0: 87 32 03 C3 27 92 CB 34   FA 3D 3D D6 0A 90 D0 83  .2..'..4.==.....
#     00E0: 98 F1 94 48 57 40 DD F6   42 96 AD C5 AC 64 80 EA  ...HW@..B....d..
#     00F0: 70 26 D4 CB D2 76 E6 73   91 C4 CD D3 C6 CB 55 31  p&...v.s......U1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.628 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FA FF C7 2B 00 C3 BF B5   87 FC 9E 49 A8 57 7C 32  ...+.......I.W.2
#     0010: 60 8D 98 E7 F7 CD 18 90   D4 AE 27 B1 C7 9E 70 F4  `.........'...p.
#     0020: D8 EC 22 DF 17 1D ED D7   E1 7B 84 F6 94 F6 F1 08  ..".............
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.631 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:30.632 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.632 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:30.632 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.632 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 05:26:30.632 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:30.633 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.633 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.636 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 AD 2A 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:26:03.000 UTC",
#       "not  after"         : "2024-01-25 05:26:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 5E B9 32 A6 BB B0 EC   C5 32 34 F9 6D 18 5E 88  r^.2.....24.m.^.
#           0010: 0B 2D 31 65                                        .-1e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 C1 36 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:57.000 UTC",
#       "not  after"         : "2024-01-25 05:25:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#           0010: A2 2F 88 F3                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.662 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E 19 A7 4A 8E F3 8F C5   18 26 30 A5 24 AB D4 AB  N..J.....&0.$...
#     0010: D8 27 FF 40 B1 20 A1 20   4D 54 4B E3 6B 7E BA 1C  .'.@. . MTK.k...
#     0020: 87 47 A9 70 F8 64 83 89   E6 9A FB 3A 63 D4 37 FB  .G.p.d.....:c.7.
#     0030: 46 BB AE 25 D5 6D E6 E6   87 A7 DB 87 6A 39 84 BB  F..%.m......j9..
#     0040: 5C E2 31 F4 E0 C5 1E A1   A4 4A CD D4 76 36 8F 9B  \.1......J..v6..
#     0050: 78 5B FB 0B 98 A3 BA 33   8A 18 6E 1D B3 AA DD 16  x[.....3..n.....
#     0060: F1 7C 73 CB AF 4E A0 49   05 5C 79 CA 5D E0 8C 61  ..s..N.I.\y.]..a
#     0070: 89 FA 5B 6E 88 E2 14 F7   D3 8D FA FF 42 A8 DA B9  ..[n........B...
#     0080: 3B 1D C2 C7 03 D8 A4 FE   3E 3A 71 A8 DE 39 65 8A  ;.......>:q..9e.
#     0090: 37 C6 C1 F4 65 C6 2A F3   72 18 DC CD 26 1A AC 6E  7...e.*.r...&..n
#     00A0: F3 CC 28 BA 3C 7D C1 BA   AE DA 0F 96 A2 19 D8 78  ..(.<..........x
#     00B0: F8 2C 74 F6 F8 46 E2 9E   63 EF 72 DA 79 F7 DD 13  .,t..F..c.r.y...
#     00C0: 97 9D EE 0D AE 5C 92 E1   8B 6D A4 C7 B4 5F EE 9B  .....\...m..._..
#     00D0: B0 06 31 E8 CB EE 18 5A   02 D6 7C F0 FE BA AC A3  ..1....Z........
#     00E0: 2F E6 38 A8 06 F2 DB 7E   6D CC FE A5 D0 BB 10 25  /.8.....m......%
#     00F0: 96 7C 13 14 77 78 33 0E   CD 97 08 F9 DF 27 BB 66  ....wx3......'.f
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.663 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 4E 9D 9E 7D 10 08 77   73 C0 D8 FB 0E A0 EF 17  .N.....ws.......
#     0010: 4C 37 61 56 20 C0 26 4A   12 C7 34 67 CB 1A F3 56  L7aV .&J..4g...V
#     0020: A1 91 E9 5F A4 4D EB 94   05 21 BB 55 51 12 27 E5  ..._.M...!.UQ.'.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.664 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:30.718 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DF 01 7D D1 80 5C AB CE 28 A0 F0 B5 EB 2E FD 65 BB 7F A8 6D 77 FD E6 EE B3 C3 DF 5A 39 F0 C3 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 05:26:30.992 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 05:26:30.993 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 05:26:41.610; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:41.937 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 58 45 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:55.000 UTC",
#       "not  after"         : "2024-01-25 05:25:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#           0010: A2 2F 88 F3                                        ./..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 C1 36 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 05:25:57.000 UTC",
#       "not  after"         : "2024-01-25 05:25:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 35 E3 45 63 22 19 AE   69 E3 E0 C3 A5 1D 59 AA  _5.Ec"..i.....Y.
#           0010: A2 2F 88 F3                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 90 84 7A 89 A1 B1 AA   75 B2 42 17 40 21 4D 63  ...z....u.B.@!Mc
#           0010: 73 1F D1 97                                        s...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 05:26:41.952 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:42.205 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.206 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:42.208 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 05:26:42.208 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.214 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.226 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 05:26:42.229 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "25 FA 65 99 DF 3B 76 EC 0A F4 6A B3 8F C9 72 16 F0 C7 10 FF CF 79 A0 28 43 8D 7D 2C D6 4E 45 DD",
#     "session id"          : "E0 9C D6 5C 42 5A 2A F4 A8 33 92 F2 D2 2B 6E 2C CC 4B FE EE 06 82 23 66 4E F9 09 52 DF 8A DB 3A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6F 3B D2 5E 52 81 4C B9   7A 0F 37 F5 D8 A8 3C 25  o;.^R.L.z.7...<%
#               0010: A5 8E 7A A3 2D 2F 02 03   6D BD F8 5C 02 13 D8 45  ..z.-/..m..\...E
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.249 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "6B A1 4E 57 02 B9 F7 91 2C ED 03 0A 4A E1 4C CA 24 D4 F9 3D 8F 49 03 D4 CB 82 2A 6D 6B 45 B9 44",
#     "session id"          : "E0 9C D6 5C 42 5A 2A F4 A8 33 92 F2 D2 2B 6E 2C CC 4B FE EE 06 82 23 66 4E F9 09 52 DF 8A DB 3A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C C6 1D C3 87 78 6A 10   63 14 3A 62 3E 2F 8C AE  .....xj.c.:b>/..
#             0010: 0F E3 E8 94 D8 D7 33 14   29 2A 8D 04 11 F9 D9 39  ......3.)*.....9
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.250 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.250 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.252 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.254 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.254 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:42.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:42.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.263 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.265 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.266 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.270 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.270 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.271 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:42.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:26:42.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 05:26:42.272 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 05:28:03.554 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:28:03.616 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:28:03.617 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:28:03.618 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 05:28:03.618 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37664/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28352ms
ok 65 stop command for single port in 31301ms
ok 66 status detects locally running solr in 14625ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2210ms
ok 69 copying files around in 6577ms
ok 70 upconfig in 2607ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 10s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m35s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5745 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5745/

1 tests failed.
FAILED:  org.apache.solr.cloud.ReindexCollectionTest.testAbort

Error Message:
java.lang.AssertionError: {responseHeader={status=0, QTime=15}, status={state=running, msg=found [2386baf6-786b-4c0d-8976-16aa34b2ba29] in running tasks}}

Stack Trace:
java.lang.AssertionError: {responseHeader={status=0, QTime=15}, status={state=running, msg=found [2386baf6-786b-4c0d-8976-16aa34b2ba29] in running tasks}}
	at __randomizedtesting.SeedInfo.seed([7540C42CF9AC94E1:132373BB8D760698]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertNotNull(Assert.java:713)
	at org.apache.solr.cloud.ReindexCollectionTest.testAbort(ReindexCollectionTest.java:425)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6268 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42145/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-27 01:32:13.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:32:13.434; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-27 01:32:14.363; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 01:32:14.401; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22882ms
ok 61 start solr with client truststore and security manager in 26045ms
not ok 62 start solr with mTLS needed in 56915ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wsRUml/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42145.
#
# Started Solr server on port 42145 (pid=200106). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42146.
#
# Started Solr server on port 42146 (pid=200559). Happy searching!
#
# INFO  - 2023-10-27 01:33:38.455; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:33:38.461; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 01:33:38.828; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:33:38.831; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:33:38.831; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:38.865 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 13 4C 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:14.000 UTC",
#     "not  after"         : "2024-01-25 01:33:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5B 3B C4 05 4E 5C BE 1A   5E 2C CC AE DA A9 F5 D5  [;..N\..^,......
#         0010: FE 0A 82 B4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:38.869 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 71 65 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:06.000 UTC",
#     "not  after"         : "2024-01-25 01:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:38.884 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:39.248 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:39.248 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:39.249 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:39.249 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:39.398 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.398 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:39.400 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:39.400 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.407 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.419 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:39.422 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AE 7A 1C EA AE B1 00 64 C7 74 3F B3 19 EA FF 01 9E 1D 32 4E D8 47 F5 76 3E DE CD EE 78 2E D7 DA",
#   "session id"          : "4A 42 B7 C2 41 1E 5D 31 60 B4 D1 57 8F 84 E6 2E 81 B6 DA 1D 8C 7C E8 B2 AB 3D D3 69 A9 9C C5 82",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 08 03 DF 30 CB 83 09 31   C9 05 F4 42 08 CD 15 D8  ...0...1...B....
#             0010: EE 41 4A DA 21 58 C0 17   71 BC 95 06 6F 48 DB 7B  .AJ.!X..q...oH..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.533 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "78 12 83 3C A4 AE 3B 49 BD 85 73 5D 3A 4E 56 13 AF AF 34 1B AC DA D5 6B 2D 31 05 08 76 C1 90 A2",
#   "session id"          : "4A 42 B7 C2 41 1E 5D 31 60 B4 D1 57 8F 84 E6 2E 81 B6 DA 1D 8C 7C E8 B2 AB 3D D3 69 A9 9C C5 82",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 A8 69 58 27 42 BD DE   8D 87 75 AF 2B FB F7 65  ..iX'B....u.+..e
#           0010: 43 D9 09 64 01 53 24 B2   BF 53 3A DD D4 06 72 42  C..d.S$..S:...rB
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.533 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.533 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.536 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.538 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.538 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.539 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.548 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.550 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.551 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.554 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.558 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.560 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.565 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 62 ED D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:10.000 UTC",
#       "not  after"         : "2024-01-25 01:33:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 43 6D 60 43 50 B3 4E   4C FD 93 2B 19 F7 7B CF  .Cm`CP.NL..+....
#           0010: DC 20 3B 02                                        . ;.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.655 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.659 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A3 25 C5 79 50 28 63 4D   3D D1 F1 DD 32 A4 DE E9  .%.yP(cM=...2...
#     0010: DB 1A 40 E7 45 24 7F AA   1E FF 40 16 0E 27 FF 2F  ..@.E$....@..'./
#     0020: 56 8F 63 55 72 55 23 34   7B 2A 50 AF A0 DE B3 6A  V.cUrU#4.*P....j
#     0030: 70 AD 1E 5E E0 B8 DD ED   C0 D5 3F 25 26 F9 A6 15  p..^......?%&...
#     0040: C9 45 BE E3 CD 6F 25 81   7D 23 1F 99 B5 08 50 38  .E...o%..#....P8
#     0050: E0 50 C4 01 16 DA 7B FE   AB 49 79 0B 90 01 75 EB  .P.......Iy...u.
#     0060: E1 49 6E 90 A8 85 54 E7   B8 03 BE 8D 74 0D D7 56  .In...T.....t..V
#     0070: 96 1A 36 04 47 67 45 64   DD 17 9E 1B 1E 2E EE 6C  ..6.GgEd.......l
#     0080: EA C5 D1 91 0C F1 F3 7C   05 73 BA 5E C0 C2 AB 52  .........s.^...R
#     0090: 4E 6D 60 A0 3B 23 DE AC   DD 4E B4 A0 7B FA 8D 57  Nm`.;#...N.....W
#     00A0: 70 90 C5 E1 CE 1D D8 B3   68 64 92 F6 4D B3 07 78  p.......hd..M..x
#     00B0: C0 6C B8 C6 75 9B 7B 9C   4B 29 91 86 4D 97 47 82  .l..u...K)..M.G.
#     00C0: B5 BF 33 87 75 71 86 79   C5 BD 14 00 35 EB 50 21  ..3.uq.y....5.P!
#     00D0: F7 C0 22 F6 EA 77 12 FA   97 39 BF 1D CD 14 DB 7A  .."..w...9.....z
#     00E0: 8A 55 E0 02 C9 D4 38 B6   E4 5E C0 7E AD 5F EF 73  .U....8..^..._.s
#     00F0: 0A A8 CD D2 94 74 52 59   62 63 61 67 34 EE AB DE  .....tRYbcag4...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.661 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 B5 8B 87 4B 83 07 44   C4 E7 69 91 F2 F1 D1 65  a...K..D..i....e
#     0010: 96 40 C4 FB 80 88 FF F8   84 38 FD 0E B5 85 F1 30  .@.......8.....0
#     0020: 0A B2 40 04 F0 4A 0A F2   2C AB 68 1C F5 B1 A0 83  ..@..J..,.h.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.663 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:39.664 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.664 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:39.664 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.664 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:39.665 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:39.665 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.665 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.668 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 13 4C 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:14.000 UTC",
#       "not  after"         : "2024-01-25 01:33:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5B 3B C4 05 4E 5C BE 1A   5E 2C CC AE DA A9 F5 D5  [;..N\..^,......
#           0010: FE 0A 82 B4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 AB 1F 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:08.000 UTC",
#       "not  after"         : "2024-01-25 01:33:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#           0010: B8 64 A5 A8                                        .d..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.695 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 14 FF EB 86 77 8E 6C BA   F7 B7 36 91 79 37 30 65  ....w.l...6.y70e
#     0010: 67 F2 8A BB 97 55 14 16   BD 25 D7 81 1F 7C 6F 7C  g....U...%....o.
#     0020: DC C1 BB 75 68 B8 12 5B   24 69 02 47 E1 14 6F 99  ...uh..[$i.G..o.
#     0030: 72 E5 33 BA 52 ED EB 33   2D 24 39 46 B7 4F D1 64  r.3.R..3-$9F.O.d
#     0040: 8F 72 76 3A 47 D4 60 74   09 A7 1F 5E F9 96 B2 05  .rv:G.`t...^....
#     0050: 6F DE 28 AB 87 64 68 0C   4C CE 9C EE A4 E0 72 5A  o.(..dh.L.....rZ
#     0060: 3B 46 CC 85 40 88 13 AF   39 D3 51 C8 6B AC F3 8D  ;F..@...9.Q.k...
#     0070: EE E2 F7 DA 1F 64 B0 8D   32 EC A6 B6 09 60 ED 7E  .....d..2....`..
#     0080: B3 2B BB 6F C8 78 13 D3   4E 40 E6 7F B2 1D FE B4  .+.o.x..N@......
#     0090: 4D E6 11 D2 DF 7F CF B3   E4 E7 05 8D B0 9A 7E F8  M...............
#     00A0: C7 2B B1 1E 62 3D C9 FD   80 41 DB 5C 55 76 86 8D  .+..b=...A.\Uv..
#     00B0: D4 F5 23 5C AA A9 39 AD   68 B6 A9 93 4C C4 E6 D1  ..#\..9.h...L...
#     00C0: C1 B7 68 E3 78 70 7F A1   3F 21 04 1C B0 63 38 F1  ..h.xp..?!...c8.
#     00D0: E6 AD 9F A8 EE 9E 86 E0   69 F4 85 B7 FF 30 B8 69  ........i....0.i
#     00E0: 12 9A 6F 05 3C 05 8E 63   BC 3A CB 41 EC C9 9F 72  ..o.<..c.:.A...r
#     00F0: 5A 28 F7 FF E0 1E 31 61   A2 7B 46 B0 54 20 5B 1C  Z(....1a..F.T [.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.696 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EB 90 60 67 D1 AE 7C 58   0D 86 80 04 37 CC 15 C3  ..`g...X....7...
#     0010: B2 FE 5F C4 EF 0E CB 25   FB 8A 16 D9 1F 2D C6 DC  .._....%.....-..
#     0020: 89 20 9C E2 B4 D8 28 DC   DE 52 9D 24 57 1B 53 D0  . ....(..R.$W.S.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.697 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:39.763 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BB 9C B0 D1 7E 25 0A 57 87 BB 19 9A 7F C4 27 86 82 15 FD AF B0 48 8F CE 55 70 15 1A 22 35 D7 3B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 01:33:40.047 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 01:33:40.048 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 01:33:41.004; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 01:33:41.009; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 01:33:41.381; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:33:41.384; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 01:33:41.384; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wsRUml/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:41.417 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 13 4C 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:14.000 UTC",
#     "not  after"         : "2024-01-25 01:33:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5B 3B C4 05 4E 5C BE 1A   5E 2C CC AE DA A9 F5 D5  [;..N\..^,......
#         0010: FE 0A 82 B4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:41.421 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 71 65 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:06.000 UTC",
#     "not  after"         : "2024-01-25 01:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:41.435 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:41.664 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.664 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:41.666 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:41.666 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.672 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.683 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.683 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.684 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:41.686 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C4 D2 C5 96 7F 94 4F 31 A0 4F 22 C9 8D 49 A3 32 B4 C3 42 EE 9D 50 A2 D6 84 77 14 E6 6C 0E AF 7A",
#   "session id"          : "62 C0 8D D8 AE 83 15 EA 5E E5 61 06 74 55 32 EC 7C 94 DE C2 D5 CE 98 32 1F 96 EC AC A3 42 44 5D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 2C 55 67 09 6B B4 D1   C6 5A 9D 8A 0F E6 4B F7  .,Ug.k...Z....K.
#             0010: C7 DE 02 F7 11 97 25 E3   9D 94 68 34 7F 48 26 7B  ......%...h4.H&.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.778 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "55 7A 7C 66 AA 3D D0 F6 C4 9A 83 42 4E EB E8 A7 51 B0 08 FC A1 F0 64 F2 C6 D0 67 3C 95 46 0C 7F",
#   "session id"          : "62 C0 8D D8 AE 83 15 EA 5E E5 61 06 74 55 32 EC 7C 94 DE C2 D5 CE 98 32 1F 96 EC AC A3 42 44 5D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2D D1 91 1E AE 6D CE 0B   27 52 A9 B3 63 31 37 CD  -....m..'R..c17.
#           0010: 97 0F D2 97 88 FD 97 B4   18 07 30 7C 62 95 AF 13  ..........0.b...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.778 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.779 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.781 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.781 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.783 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.784 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.793 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.794 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.795 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.799 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.799 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.799 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.802 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.802 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.802 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.803 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.803 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.804 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.804 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.807 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 62 ED D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:10.000 UTC",
#       "not  after"         : "2024-01-25 01:33:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 43 6D 60 43 50 B3 4E   4C FD 93 2B 19 F7 7B CF  .Cm`CP.NL..+....
#           0010: DC 20 3B 02                                        . ;.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.807 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:41.855 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:41.855 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:41.856 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:33:41.856 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.887 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 AB 1F 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 01:33:08.000 UTC",
#     "not  after"         : "2024-01-25 01:33:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#         0010: B8 64 A5 A8                                        .d..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#         0010: A7 1F 98 A9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.890 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 E7 3C 55 FC EC 4B 44   08 EA A6 9F 4C 4F 14 30  ..<U..KD....LO.0
#     0010: 36 B2 FD EC 2F 2E 44 46   1D 97 A2 E5 E4 4B 24 82  6.../.DF.....K$.
#     0020: 92 9E A3 48 5C A2 C2 79   71 8D D6 F5 A2 0F DA 4B  ...H\..yq......K
#     0030: 61 BC 97 EA C9 BE 61 2C   5D C7 AA C3 4E BD D5 6C  a.....a,]...N..l
#     0040: 1D D4 8C 54 89 57 BA A9   14 E6 20 C1 E6 53 6A 83  ...T.W.... ..Sj.
#     0050: 3D 5F E1 0E C1 27 C9 BA   B5 7E B9 43 88 A1 F7 AB  =_...'.....C....
#     0060: 5A A1 19 50 19 D8 63 E9   62 E1 16 9D B2 30 4A 17  Z..P..c.b....0J.
#     0070: 31 9D 76 38 69 2B 84 47   76 DC 74 8C 34 F6 45 76  1.v8i+.Gv.t.4.Ev
#     0080: A3 3B CA A0 47 58 77 42   1A C9 AD 47 53 5B C1 AF  .;..GXwB...GS[..
#     0090: F5 7D C4 4A 16 17 F6 07   DC 9D 1D B2 8B 93 98 70  ...J...........p
#     00A0: DE 67 DD E7 5D 6B 16 69   B9 9C 39 2D 36 4A C4 DC  .g..]k.i..9-6J..
#     00B0: E9 1E 46 80 98 45 0E CF   D8 6A FD BC 9E 9C 75 92  ..F..E...j....u.
#     00C0: 52 C3 2C 81 B4 2C 64 99   2E E3 D6 5E 3C F1 AF ED  R.,..,d....^<...
#     00D0: 83 28 D8 B8 41 A7 F3 68   BF A2 C7 1A 74 60 55 BA  .(..A..h....t`U.
#     00E0: 3E A9 62 8E 79 D1 4C 80   22 42 05 75 5D CF 41 73  >.b.y.L."B.u].As
#     00F0: E7 18 21 7E 77 94 9C D6   43 09 10 6E 9E DE 7F C2  ..!.w...C..n....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.892 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5E 29 D8 A5 82 17 5E 3F   F8 49 0B 9F DE 1F 7C A0  ^)....^?.I......
#     0010: 48 FD 20 D1 92 1C 38 2E   52 D3 7D 17 37 DB 5D B4  H. ...8.R...7.].
#     0020: 76 E9 50 B5 39 67 2C 11   33 A4 30 8E BB 0E D6 BB  v.P.9g,.3.0.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.894 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:41.895 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.896 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:41.896 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.896 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-27 01:33:41.896 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:33:41.896 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.897 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.899 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 13 4C 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:14.000 UTC",
#       "not  after"         : "2024-01-25 01:33:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5B 3B C4 05 4E 5C BE 1A   5E 2C CC AE DA A9 F5 D5  [;..N\..^,......
#           0010: FE 0A 82 B4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 AB 1F 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:08.000 UTC",
#       "not  after"         : "2024-01-25 01:33:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#           0010: B8 64 A5 A8                                        .d..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.925 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 A1 CF 54 CC 22 5B B7   89 EB 3A 63 66 B7 30 7C  S..T."[...:cf.0.
#     0010: E6 B6 95 5C C0 30 B8 09   A9 66 74 76 53 45 1F 33  ...\.0...ftvSE.3
#     0020: 9B 0E D6 A8 E4 5B 75 73   36 71 1A 62 36 24 97 7D  .....[us6q.b6$..
#     0030: B3 33 5B 4C 73 07 A5 6F   8A B0 87 DD C3 BB 65 60  .3[Ls..o......e`
#     0040: 58 5E DA CD E6 3D 9E CF   EC 6A 98 C5 8C 2B 85 64  X^...=...j...+.d
#     0050: 13 99 EC 17 FF 2F 36 04   64 1A 63 EB FB CA 45 55  ...../6.d.c...EU
#     0060: 12 D7 49 36 CB 8E 90 75   B6 45 02 D0 81 EC 1A 55  ..I6...u.E.....U
#     0070: E7 A6 CF 84 E2 2D C3 97   A7 05 AE 30 02 3F 91 9F  .....-.....0.?..
#     0080: 59 0D 63 82 BA 1A 50 74   C3 BD 21 46 2A 80 0E 7E  Y.c...Pt..!F*...
#     0090: 23 40 70 B8 EC 9E 77 5A   F7 E4 25 B5 41 C2 42 87  #@p...wZ..%.A.B.
#     00A0: 7D 94 2D 26 FD 9F DA 9D   78 75 B8 B3 6B 72 EC F4  ..-&....xu..kr..
#     00B0: 91 FE 73 C6 CD 9B FB 08   87 69 23 F5 57 12 62 0E  ..s......i#.W.b.
#     00C0: 63 46 D9 9C C7 C4 2A 6D   4E 56 FD 87 97 11 CA 37  cF....*mNV.....7
#     00D0: A8 15 4A 2A 1D E8 D0 76   37 AA CB 20 12 67 04 CB  ..J*...v7.. .g..
#     00E0: 07 C2 2E 57 1C 2B 2B 80   A1 3C 58 45 BF 52 B6 37  ...W.++..<XE.R.7
#     00F0: 89 57 9C C5 7E D7 58 5B   72 BE 53 45 7F C3 F0 89  .W....X[r.SE....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.926 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 97 DB 09 0D 09 8A 7E FA   82 C1 33 E7 88 6A 92 43  ..........3..j.C
#     0010: 3F 18 33 D3 74 2E DD E4   68 CF 94 12 40 3A B6 F3  ?.3.t...h...@:..
#     0020: DF 24 18 9A 74 8E 19 EE   32 72 A8 CB 1F 25 C3 FA  .$..t...2r...%..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.926 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:41.982 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 31 D3 0D 32 C2 E2 A9 5B 5A EE D0 B1 53 EE 49 E1 E5 A9 66 87 7A 82 F8 9A 1B 6C FE B3 DC E3 EA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 01:33:42.272 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 01:33:42.273 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-27 01:33:53.692; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:53.999 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 AB 1F 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:08.000 UTC",
#       "not  after"         : "2024-01-25 01:33:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#           0010: B8 64 A5 A8                                        .d..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA D8 68 AF 76 D6 11 AF   CF 3D 7E CA 98 1C 5C 06  ..h.v....=....\.
#           0010: A7 1F 98 A9                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 71 65 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 01:33:06.000 UTC",
#       "not  after"         : "2024-01-25 01:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 80 11 0E D1 66 50 CF   F3 15 B7 D9 B0 BE 22 9A  O....fP.......".
#           0010: B8 64 A5 A8                                        .d..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 01:33:54.015 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:54.244 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:54.246 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-27 01:33:54.246 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.251 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.263 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-27 01:33:54.265 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F4 6B E0 20 3F 4C 00 83 BB 49 7B 04 5C 6E AC 5B B6 12 30 38 27 E9 F1 C1 88 AA 57 63 2F F2 62 6A",
#     "session id"          : "35 F4 DF 9D 45 10 00 58 D8 98 9A DA 57 86 76 D6 52 1B 40 B0 40 5B 5C 87 97 EF 3A 28 02 13 1D AE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B7 F0 E0 E0 5D D3 9A 07   C3 57 18 5D F1 BE AA F8  ....]....W.]....
#               0010: 99 D3 AD 3D BA 1C 84 50   3F C7 FE 50 C2 63 48 06  ...=...P?..P.cH.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.285 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B8 38 14 DB DD 4C 7F 78 F5 6B B2 9F D5 7E 76 D1 6E CE 6B 3A 73 C8 97 62 D2 E8 BB CB E9 32 B0 C0",
#     "session id"          : "35 F4 DF 9D 45 10 00 58 D8 98 9A DA 57 86 76 D6 52 1B 40 B0 40 5B 5C 87 97 EF 3A 28 02 13 1D AE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BE 70 4E 1C 9B 60 EC C9   45 80 1E 6B 0A 3E 66 F5  .pN..`..E..k.>f.
#             0010: AC 14 75 76 DC 59 57 40   C2 E3 B4 3B 97 0B F2 25  ..uv.YW@...;...%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.285 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.286 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-27 01:33:54.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret


[...truncated too long message...]

der.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-27 01:35:13.160 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:35:13.231 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:35:13.231 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:35:13.231 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 01:35:13.231 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42146/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28717ms
ok 65 stop command for single port in 31312ms
ok 66 status detects locally running solr in 14430ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6568ms
ok 70 upconfig in 2616ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.ReindexCollectionTest.testAbort (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.ReindexCollectionTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.ReindexCollectionTest.testAbort" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7540C42CF9AC94E1 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 21m 16s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m40s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5744 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5744/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([E2EDAED94352A44:3BDA31B67FE91C1A]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5973 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=E2EDAED94352A44 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 7m 10s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m35s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5743 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5743/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45163/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 21:03:40.413; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 21:03:40.419; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 21:03:41.690; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 21:03:41.730; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22578ms
ok 61 start solr with client truststore and security manager in 26302ms
not ok 62 start solr with mTLS needed in 58955ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5Kdc3S/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45163.
#
# Started Solr server on port 45163 (pid=199132). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45164.
#
# Started Solr server on port 45164 (pid=199582). Happy searching!
#
# INFO  - 2023-10-26 21:05:05.830; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 21:05:05.836; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 21:05:06.198; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 21:05:06.201; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 21:05:06.201; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:06.233 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A FE 87 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:41.000 UTC",
#     "not  after"         : "2024-01-24 21:04:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4E B3 92 2B 60 C8 CC   E6 B3 3C 44 41 9F 00 1C  =N..+`....<DA...
#         0010: A1 B1 36 A0                                        ..6.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:06.237 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 92 74 60",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:33.000 UTC",
#     "not  after"         : "2024-01-24 21:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:06.251 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:06.474 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:06.476 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:06.477 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.493 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.493 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:06.496 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 4A F5 6B 09 A4 4C 83 1A 6E F9 6D 78 DA AD F1 FF 0C 56 EE 01 BC FC 7C 06 28 22 F1 3A 58 33 E2",
#   "session id"          : "2E E4 A4 F3 4F 53 5F 80 2E 5C 29 40 1C EC 0B 28 AE FF BF 59 18 3C 30 2C DE B9 32 AA 1C 82 09 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C9 C2 AF D4 BB BF 16 01   B7 91 54 5B 44 B3 7E 1E  ..........T[D...
#             0010: DF 6E 45 60 21 AA CA 35   3F 8D 23 07 A8 71 18 6A  .nE`!..5?.#..q.j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.607 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B9 EC 6A 18 88 1E D6 F9 12 23 F2 9C 28 AE 52 4C 5D 42 64 F5 C1 F3 EB 95 4D 65 42 81 38 FC 17 EF",
#   "session id"          : "2E E4 A4 F3 4F 53 5F 80 2E 5C 29 40 1C EC 0B 28 AE FF BF 59 18 3C 30 2C DE B9 32 AA 1C 82 09 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 16 67 D7 25 B1 22 B9 48   4F AA 54 B1 67 42 A4 94  .g.%.".HO.T.gB..
#           0010: 18 45 38 D4 A1 CD D5 C7   97 DB 29 62 9B 39 96 0B  .E8.......)b.9..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.607 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.607 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.608 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.608 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.609 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.612 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.612 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.612 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.621 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.623 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.624 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.627 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.627 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.630 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.630 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.630 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.631 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.631 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.632 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.632 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.635 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 09 56 61",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:38.000 UTC",
#       "not  after"         : "2024-01-24 21:04:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB F2 4B 46 85 86 BA AC   22 2B 13 8B 94 1A 91 65  ..KF...."+.....e
#           0010: EB 52 A0 CE                                        .R..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.635 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:06.683 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:06.684 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:06.684 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:06.684 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.713 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.717 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0D 66 5E C6 3B DA 88 B8   F7 BC 0C FA 1F 0E 81 FB  .f^.;...........
#     0010: 19 BF 39 AD F6 73 9D DB   DE 95 DD E1 D6 BD E0 5C  ..9..s.........\
#     0020: E6 D3 F6 26 E3 5C 19 08   26 7E 6A BB E7 26 A8 A4  ...&.\..&.j..&..
#     0030: 1B DE 43 05 A2 9E 39 0D   B2 18 6B B6 3B 69 C6 91  ..C...9...k.;i..
#     0040: 34 6F E3 18 78 D1 22 83   CB 9E 2D EB 16 55 41 67  4o..x."...-..UAg
#     0050: 53 FC 08 F6 8A FF 26 61   99 29 40 F2 37 5D 75 AA  S.....&a.)@.7]u.
#     0060: 3C A9 C2 5A EA 0A F3 85   81 C3 4B 3A 6D 5B A2 E6  <..Z......K:m[..
#     0070: E9 57 66 CD EC EA 01 1D   44 8E 03 BC AC 24 38 C1  .Wf.....D....$8.
#     0080: 77 45 F3 84 66 91 1A 56   AB 98 65 5F 90 BB 4D 5A  wE..f..V..e_..MZ
#     0090: D3 E2 B9 61 E4 ED 84 0E   E4 0F 0E C8 CA F3 89 95  ...a............
#     00A0: 7C 0B 96 76 44 69 2C 31   CA 25 DB F7 9B 81 8A B0  ...vDi,1.%......
#     00B0: 51 81 09 10 62 65 3D 98   3D 93 A6 DB B0 17 99 AC  Q...be=.=.......
#     00C0: 0A 81 4A BE 44 C6 A1 F7   C5 D1 10 80 31 78 85 7E  ..J.D.......1x..
#     00D0: A0 4B AE 16 76 07 81 AB   A1 16 70 B8 D8 12 66 84  .K..v.....p...f.
#     00E0: 2B CC 6D 5C 71 B6 3A 8B   F0 CB 30 4F 2E D9 14 AF  +.m\q.:...0O....
#     00F0: 65 7F 4E FE F5 7A 10 D2   FB 57 D1 72 1C 5A EF 02  e.N..z...W.r.Z..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.719 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F DC 24 CE 46 10 BE A3   3D BD 1A 2F E5 DA 9A AE  ..$.F...=../....
#     0010: 4F 10 7B 6B 0F D4 73 31   9A 41 77 E6 AB ED 9B 32  O..k..s1.Aw....2
#     0020: 99 0D BA AD 8A A8 79 BF   53 EA C1 FE 14 FE B9 3D  ......y.S......=
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.721 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:06.722 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.722 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:06.722 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.722 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:06.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:06.723 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.724 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.726 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A FE 87 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:41.000 UTC",
#       "not  after"         : "2024-01-24 21:04:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4E B3 92 2B 60 C8 CC   E6 B3 3C 44 41 9F 00 1C  =N..+`....<DA...
#           0010: A1 B1 36 A0                                        ..6.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 59 71 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:35.000 UTC",
#       "not  after"         : "2024-01-24 21:04:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#           0010: 85 99 F3 11                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.751 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 88 1D C3 12 96 41 E6   39 38 39 20 C1 64 33 06  v.....A.989 .d3.
#     0010: 7A 35 B0 6A A4 4A 43 7A   D0 67 8B E1 F9 A4 C8 39  z5.j.JCz.g.....9
#     0020: 5A 8F 41 F6 E9 E9 7D 59   41 C8 68 C2 F8 1D E4 78  Z.A....YA.h....x
#     0030: 09 2C 03 45 A0 CC 3E 30   30 70 FB 04 6A AA 6A 14  .,.E..>00p..j.j.
#     0040: 50 2D A5 81 4A 7D E2 78   20 1E E2 3B 89 31 07 40  P-..J..x ..;.1.@
#     0050: 82 91 B4 0F 66 3C 4B E1   21 9C 59 21 97 F5 9D F8  ....f<K.!.Y!....
#     0060: D7 26 00 32 B2 73 11 EE   C0 F1 8C 6C CB 32 A7 10  .&.2.s.....l.2..
#     0070: 5E C8 51 65 4E 9A A2 A0   36 8E C5 38 42 63 39 0E  ^.QeN...6..8Bc9.
#     0080: 52 67 41 4E E6 27 47 71   0C 36 9F F9 6C 7C 2C 94  RgAN.'Gq.6..l.,.
#     0090: DF 31 79 5B 1E 04 88 C8   34 F1 AE CC 1C 00 8F B2  .1y[....4.......
#     00A0: A2 FF 34 86 76 B4 E1 DC   21 92 F2 98 6D 59 58 32  ..4.v...!...mYX2
#     00B0: B9 D8 08 0E 70 29 2C C7   18 64 03 EA E9 2B 8D F7  ....p),..d...+..
#     00C0: 06 13 03 69 5E 4F 94 BB   4C 77 1D 5B F2 D7 8D 5E  ...i^O..Lw.[...^
#     00D0: 0F 16 97 BC 2D 73 26 F7   E4 C4 E2 4F 91 85 CF C3  ....-s&....O....
#     00E0: EF C2 1A BF D5 28 25 27   19 EB C6 19 1E 17 32 1A  .....(%'......2.
#     00F0: 94 5F 93 16 52 57 93 80   D4 E9 9A 36 0E 29 10 11  ._..RW.....6.)..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.753 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D7 89 B3 98 8B 94 DD B2   85 AA 8E A7 88 79 4B F7  .............yK.
#     0010: 2E D0 45 6B ED 50 4E B5   E2 C6 54 37 64 7F E1 49  ..Ek.PN...T7d..I
#     0020: D7 8F 3A 1D A0 41 ED 01   F1 DD 2A C9 D0 0D 34 D1  ..:..A....*...4.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.754 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:06.811 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "20 7B 08 BC 6F E0 4F B3 B4 89 C2 18 47 3A 50 25 88 8D 3B FD 35 60 13 39 A4 79 C8 68 91 0B 4C 3D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 21:05:07.095 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 21:05:07.097 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 21:05:08.048; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 21:05:08.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 21:05:08.446; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 21:05:08.450; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 21:05:08.450; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5Kdc3S/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:08.484 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A FE 87 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:41.000 UTC",
#     "not  after"         : "2024-01-24 21:04:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4E B3 92 2B 60 C8 CC   E6 B3 3C 44 41 9F 00 1C  =N..+`....<DA...
#         0010: A1 B1 36 A0                                        ..6.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:08.489 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 92 74 60",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:33.000 UTC",
#     "not  after"         : "2024-01-24 21:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:08.504 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:08.839 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:08.839 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:08.840 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:08.840 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:08.995 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:08.996 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:08.998 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:08.998 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:09.004 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:09.016 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:09.017 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:09.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:09.020 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD C4 FB 09 50 6F 99 BB 08 DF 92 F3 EB 5D 89 C9 CB 80 A6 8F D4 48 47 5B 3A B4 CB B2 C0 C5 A1 A3",
#   "session id"          : "E2 FE AB 13 FD 2C 7B 5E 05 3E 12 DE 69 95 06 25 7D EF E5 2F 80 50 87 50 C4 F1 6E 8D 59 A8 9E 80",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 87 1A C7 AC B9 C8 50 18   6C 3A 97 9E 0A D9 13 7F  ......P.l:......
#             0010: B0 08 B8 B1 A3 F0 CA 73   AC A6 98 24 4B DB 61 63  .......s...$K.ac
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.125 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1D 1B BD 9E EF 1D 05 83 F0 F2 61 31 52 99 9E 0A 1B 86 F0 DD 6B B5 51 9B 4E 67 7F 60 88 80 DA 33",
#   "session id"          : "E2 FE AB 13 FD 2C 7B 5E 05 3E 12 DE 69 95 06 25 7D EF E5 2F 80 50 87 50 C4 F1 6E 8D 59 A8 9E 80",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 88 31 C5 38 9B FF C3 DA   C9 39 D2 EA 4E F1 81 DF  .1.8.....9..N...
#           0010: A0 16 EE DD B0 47 6B 88   CC 5A FC E6 8F B3 8D 58  .....Gk..Z.....X
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.125 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.126 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.128 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.131 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.131 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.131 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.141 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.142 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.143 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.147 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.148 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.148 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.151 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.151 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.151 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.152 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.153 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.154 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.158 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 09 56 61",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:38.000 UTC",
#       "not  after"         : "2024-01-24 21:04:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB F2 4B 46 85 86 BA AC   22 2B 13 8B 94 1A 91 65  ..KF...."+.....e
#           0010: EB 52 A0 CE                                        .R..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.239 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 59 71 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 21:04:35.000 UTC",
#     "not  after"         : "2024-01-24 21:04:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#         0010: 85 99 F3 11                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#         0010: 67 DB 49 6C                                        g.Il
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.242 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 1F 78 B4 E0 81 3F 92   D0 84 5D 2A 0C D3 EE 68  u.x...?...]*...h
#     0010: D2 67 B6 F4 B2 6F 13 0C   50 36 7E BE CB A5 FC 90  .g...o..P6......
#     0020: 90 5E 1E 15 14 E5 B6 BB   EA 38 4B 67 DF 11 69 7D  .^.......8Kg..i.
#     0030: B8 D8 1B FA D5 5A C5 1E   4F 9E 1F 73 C1 6C 99 8F  .....Z..O..s.l..
#     0040: 01 04 98 FD 61 16 18 0A   FF 66 B5 7E E4 6E 4F CB  ....a....f...nO.
#     0050: A4 30 87 46 B9 39 F6 67   78 9A FD 36 77 11 03 7D  .0.F.9.gx..6w...
#     0060: 3C 78 6C 56 6A 16 B0 6A   74 58 37 A3 91 36 EB 17  <xlVj..jtX7..6..
#     0070: 10 E6 60 E3 B8 22 A2 1F   8C B7 A4 A4 B9 F4 94 28  ..`..".........(
#     0080: C5 64 DB 68 A2 A4 E7 07   C7 AC EE 45 C5 63 06 C9  .d.h.......E.c..
#     0090: 19 98 C9 38 62 FC 87 52   3B 53 52 5F 06 20 3D 06  ...8b..R;SR_. =.
#     00A0: CF 93 24 EC 60 29 1A 66   42 92 D7 EE 05 72 87 0E  ..$.`).fB....r..
#     00B0: 50 99 72 E2 DA E3 60 7A   EE 64 F2 0F C2 05 3B E1  P.r...`z.d....;.
#     00C0: 82 41 B3 D6 D3 23 94 E3   CF B4 AF 5F 9F 40 16 01  .A...#....._.@..
#     00D0: 3F 5E 9D 34 E8 A3 8A CB   2E 34 1F 1A 34 10 F1 7C  ?^.4.....4..4...
#     00E0: 75 D5 CB DA AE 48 72 38   C9 9A 51 B4 92 C1 97 DD  u....Hr8..Q.....
#     00F0: A2 FA 55 82 89 5F CD C4   04 4E 1C 74 B9 81 4C C0  ..U.._...N.t..L.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.244 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE 5E AD 9E 30 D7 91 C1   E7 47 D3 47 19 1C 93 5B  .^..0....G.G...[
#     0010: 46 D5 69 EF AC E5 3E D0   0E 70 DA 7C C3 C6 96 8A  F.i...>..p......
#     0020: BA CB E9 AB 21 2D 74 BF   32 FD 7E 5F 0A FE DF A8  ....!-t.2.._....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:09.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.248 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:09.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.248 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 21:05:09.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:09.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.249 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.252 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A FE 87 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:41.000 UTC",
#       "not  after"         : "2024-01-24 21:04:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4E B3 92 2B 60 C8 CC   E6 B3 3C 44 41 9F 00 1C  =N..+`....<DA...
#           0010: A1 B1 36 A0                                        ..6.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 59 71 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:35.000 UTC",
#       "not  after"         : "2024-01-24 21:04:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#           0010: 85 99 F3 11                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.278 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 7F DA 53 3B E3 F3 B5   D3 95 A8 26 A6 73 0F 90  d..S;......&.s..
#     0010: BA 51 70 00 E4 CC AC D8   6E 39 68 88 FB 57 C9 20  .Qp.....n9h..W.
#     0020: 86 B6 96 41 0F 1D C7 E1   A4 E1 86 CE FD 4B C7 E8  ...A.........K..
#     0030: D3 F9 AD 14 22 47 47 B4   82 0F 47 6B 82 A1 74 E8  ...."GG...Gk..t.
#     0040: AB D7 41 C2 82 51 6D 9F   89 AA 1E C7 2F 25 0B EA  ..A..Qm...../%..
#     0050: 6A ED 0A 03 00 4E 57 5F   CF 24 47 A2 F0 A7 B8 77  j....NW_.$G....w
#     0060: E9 CF 72 5B 30 DD 66 12   6F B7 C0 7E 67 62 00 42  ..r[0.f.o...gb.B
#     0070: A9 8F 24 FC 52 F8 A5 97   72 E3 07 D8 18 9B 6C 00  ..$.R...r.....l.
#     0080: 14 91 0A 7B F5 DD 6D 16   B8 14 67 50 31 73 DD BE  ......m...gP1s..
#     0090: C0 72 19 DB DE 81 F0 70   79 9D 7F 61 B4 93 9B C4  .r.....py..a....
#     00A0: 55 7E 23 C4 57 91 2B 0E   CC D5 86 34 AA 93 F9 03  U.#.W.+....4....
#     00B0: 5D 82 CC CF D6 10 47 02   EE 8F F1 37 1F DA CA 87  ].....G....7....
#     00C0: 19 97 B3 99 23 4A 19 AF   FC 52 DD E4 B0 50 27 30  ....#J...R...P'0
#     00D0: AC 79 3F CC 37 AD F6 7F   BA 92 8A 14 95 7E 03 E5  .y?.7...........
#     00E0: 45 84 DA 9D 58 68 16 0F   F4 BC D4 9E 42 9A F5 D3  E...Xh......B...
#     00F0: 7C 31 F0 2E A5 1F D2 5C   03 4D 0C 15 70 21 1E 4F  .1.....\.M..p!.O
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.279 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A B1 92 43 09 B9 E0 20   2B 37 12 88 9A AB C7 53  ...C... +7.....S
#     0010: 45 98 F6 63 FA D1 4C A3   93 1B 08 C3 22 53 55 5F  E..c..L....."SU_
#     0020: FB 63 75 2F A3 F8 F8 7C   5A F4 4E F8 48 23 BD 27  .cu/....Z.N.H#.'
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.280 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:09.346 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F D3 30 D5 84 73 39 8D E1 48 EB 2C D4 6D 86 E6 C5 BF 16 C9 6D 93 18 6A 78 53 90 20 A3 47 C7 B1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 21:05:09.618 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 21:05:09.619 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 21:05:20.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:21.177 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 92 74 60",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:33.000 UTC",
#       "not  after"         : "2024-01-24 21:04:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#           0010: 85 99 F3 11                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 59 71 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 21:04:35.000 UTC",
#       "not  after"         : "2024-01-24 21:04:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 63 80 47 53 C4 3F E7   1C 10 E7 07 E7 B3 67 CC  .c.GS.?.......g.
#           0010: 85 99 F3 11                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 1D 3E C9 6D 06 E7 5D   78 F4 1B AB 00 11 0C 77  M.>.m..]x......w
#           0010: 67 DB 49 6C                                        g.Il
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 21:05:21.192 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:21.306 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:21.306 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:21.306 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:05:21.307 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:21.432 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.433 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:21.434 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 21:05:21.435 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.440 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.452 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.452 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.452 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 21:05:21.454 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2A E2 C1 09 80 DD 32 F5 10 2F 47 4F 5A D0 82 62 9B 41 1C 60 F1 A9 65 15 13 5E FB 42 5C 7F C4 FE",
#     "session id"          : "96 39 50 0A B3 F5 D9 41 AC 28 C8 54 FF 17 C2 2F 03 6E 2F 11 47 C6 A4 6D E8 C6 A4 20 6A 04 99 2D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AE D0 D9 ED DD 38 D4 62   06 EB 0F 7F DE 6F 8E D3  .....8.b.....o..
#               0010: AC 60 CC 93 99 8A DE A8   76 80 24 E1 67 0A 8E 79  .`......v.$.g..y
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.473 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "56 DC 7F 5F 3A FD C0 9E A2 38 EC F0 37 B2 0D 65 73 8A B9 8A 86 FC D3 44 B6 9C B9 08 70 76 E0 19",
#     "session id"          : "96 39 50 0A B3 F5 D9 41 AC 28 C8 54 FF 17 C2 2F 03 6E 2F 11 47 C6 A4 6D E8 C6 A4 20 6A 04 99 2D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BD 1B 02 24 5D C3 7F FB   06 BC 36 0C 75 78 8E 3E  ...$].....6.ux.>
#             0010: FA 06 0F 92 C2 3C 6B BB   37 17 F4 26 1F 05 15 7E  .....<k.7..&....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.474 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.474 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.476 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.480 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.486 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.488 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.489 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.492 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.492 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:05:21.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 21:05:21.495 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 21:06:42.165 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:06:42.210 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:06:42.212 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:06:42.212 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 21:06:42.212 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45164/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28112ms
ok 65 stop command for single port in 31028ms
ok 66 status detects locally running solr in 14369ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2241ms
ok 69 copying files around in 6658ms
ok 70 upconfig in 2627ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 41s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m4s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5742 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5742/

All tests passed

Build Log:
[...truncated 1307 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44241/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 16:36:18.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 16:36:18.171; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 16:36:19.059; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 16:36:19.097; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22333ms
ok 61 start solr with client truststore and security manager in 24754ms
not ok 62 start solr with mTLS needed in 60507ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7xsIq4/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44241.
#
# Started Solr server on port 44241 (pid=199580). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44242.
#
# Started Solr server on port 44242 (pid=200029). Happy searching!
#
# INFO  - 2023-10-26 16:37:41.092; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 16:37:41.097; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 16:37:41.481; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 16:37:41.485; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 16:37:41.485; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:41.518 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 35 85 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:17.000 UTC",
#     "not  after"         : "2024-01-24 16:37:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 5B 9C D5 5E 0E 23 A4   58 42 5E F9 6D 05 92 12  0[..^.#.XB^.m...
#         0010: 32 05 A7 F9                                        2...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:41.523 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8A 08 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:09.000 UTC",
#     "not  after"         : "2024-01-24 16:37:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:41.537 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:41.844 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:41.844 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:41.844 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:41.844 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:42.005 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.005 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:42.007 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:42.007 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.026 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:42.029 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "99 92 22 0B 21 1D C2 5D 47 7A 50 93 C0 BA DB 52 07 B4 00 96 BD C0 8A 8A 41 5A 28 E4 B2 42 16 6D",
#   "session id"          : "9A BA 1A C8 66 EB 82 68 FD A8 6A AC 60 EC C6 E7 AE B9 C6 53 B7 D1 2E 26 CF F2 BA A7 B1 B0 B7 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BD 0E CB 60 C1 8E 3B 5D   CC FD 19 4D BC C4 F8 8D  ...`..;]...M....
#             0010: 10 3B EC 0B 94 DA 4C 29   11 90 D9 DE D5 C8 07 5A  .;....L).......Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.134 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F9 2B 54 E2 4F 4D C7 81 AE 19 25 B2 2C 94 20 3E D0 F2 89 E0 F1 71 58 A1 C2 09 5F 4D 25 68 78 91",
#   "session id"          : "9A BA 1A C8 66 EB 82 68 FD A8 6A AC 60 EC C6 E7 AE B9 C6 53 B7 D1 2E 26 CF F2 BA A7 B1 B0 B7 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B4 FC 12 D7 19 AB 06 39   55 FD 84 66 17 43 91 A2  .......9U..f.C..
#           0010: B7 7A 17 49 1A 27 B9 DB   63 31 C3 95 2C 53 22 27  .z.I.'..c1..,S"'
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.135 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.135 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.137 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.140 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.140 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.150 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.151 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.152 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.156 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.156 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.156 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.157 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.159 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.159 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.159 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.160 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.161 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.162 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.162 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.166 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 FF EF 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:13.000 UTC",
#       "not  after"         : "2024-01-24 16:37:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 B6 BD 60 FA AE 54 CF   D8 C1 B9 E7 3F C4 F9 86  h..`..T.....?...
#           0010: B2 0A CE 58                                        ...X
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.166 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.251 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.255 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 45 4F B9 10 62 74 7B   F6 FA EE 96 AE 6E 89 93  /EO..bt......n..
#     0010: 1E 81 F6 78 F6 61 1E 28   04 03 1F 26 37 EB 54 C5  ...x.a.(...&7.T.
#     0020: 93 F9 5E 14 12 40 D7 3F   DA B5 5F A0 DB 49 DE BE  ..^..@.?.._..I..
#     0030: 9A 49 B1 C8 26 DC C3 6C   5E 5C 46 F1 6E 11 E1 93  .I..&..l^\F.n...
#     0040: 90 B5 2B DA 30 DA 6B 64   ED F5 9E B2 C1 3C E3 4E  ..+.0.kd.....<.N
#     0050: F5 51 32 E6 F4 86 34 CD   5F 84 AF 7D 48 2E 6A 77  .Q2...4._...H.jw
#     0060: 5D ED 5A E5 55 AF BA 6F   9D 71 45 BA 1F 72 46 4A  ].Z.U..o.qE..rFJ
#     0070: CA 78 B8 F4 45 97 3C 3D   E8 9A 9F D4 24 C8 7D B9  .x..E.<=....$...
#     0080: FD 88 61 06 B4 D1 76 53   D8 56 4D 9C 5D 56 E6 80  ..a...vS.VM.]V..
#     0090: 91 51 1C A5 C9 EC 75 78   30 D7 4D 4A 81 B9 B9 19  .Q....ux0.MJ....
#     00A0: 5E 6C 12 E3 DF 7C 95 CA   3E 63 84 FE 1F 44 5E FC  ^l......>c...D^.
#     00B0: 1F 79 1E D2 5E EE 05 B3   9A 61 E5 7C DA 13 77 83  .y..^....a....w.
#     00C0: 2C 82 B1 62 2F 6A 15 31   4A 03 AC E5 08 89 33 7A  ,..b/j.1J.....3z
#     00D0: C8 98 5A 86 B6 37 AC A9   09 A1 86 54 9B F0 13 7E  ..Z..7.....T....
#     00E0: 25 3C 12 16 47 87 01 DB   41 A6 DD AA 1F 19 46 B7  %<..G...A.....F.
#     00F0: 1B 2C 7D EE 9B 73 E1 B3   CB AA 38 68 FB B7 69 8F  .,...s....8h..i.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.257 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 95 3D C8 07 A7 08 6A E7   64 98 C1 CD CC F2 9D 22  .=....j.d......"
#     0010: 45 EF 79 45 04 80 55 06   17 44 9B DE F0 1C DC 5E  E.yE..U..D.....^
#     0020: A5 82 0F 2A CA EB 5C 7A   A8 ED 34 83 B6 6B 40 D9  ...*..\z..4..k@.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.259 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:42.260 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.260 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:42.260 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.261 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:42.261 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:42.261 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.262 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.264 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 35 85 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:17.000 UTC",
#       "not  after"         : "2024-01-24 16:37:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 5B 9C D5 5E 0E 23 A4   58 42 5E F9 6D 05 92 12  0[..^.#.XB^.m...
#           0010: 32 05 A7 F9                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 75 D2 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:11.000 UTC",
#       "not  after"         : "2024-01-24 16:37:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#           0010: 45 72 B4 BD                                        Er..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.291 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 4D 7C B0 01 87 19 5B   88 9C 50 6B C6 6E 1F 02  TM.....[..Pk.n..
#     0010: 7E 05 C6 C4 0A DB 8D C8   42 DB B2 C0 04 43 D5 BB  ........B....C..
#     0020: 47 C8 E6 E5 67 77 7A 09   69 3B CF EB 1E AD BF 7F  G...gwz.i;......
#     0030: C0 FD F6 F4 EA 56 AD E8   DF 71 35 61 D1 29 6F 96  .....V...q5a.)o.
#     0040: F6 B5 59 39 0F 33 37 54   2F 2C 95 CB 03 5F 07 3E  ..Y9.37T/,..._.>
#     0050: 8F 71 48 2F F4 2B 8F 57   4E 09 12 A1 0A E3 9E 54  .qH/.+.WN......T
#     0060: E7 F3 D9 37 6B 04 98 FD   94 D4 55 16 B7 2C 54 15  ...7k.....U..,T.
#     0070: E3 A2 DB B0 C0 43 EB 9B   8B 19 4C E9 C4 D3 12 2A  .....C....L....*
#     0080: 27 CC C5 37 09 46 AB 0B   D9 AA 2B A2 7A 77 DC BB  '..7.F....+.zw..
#     0090: 02 6A AB 42 D6 29 85 51   08 BA DE A7 74 BF 14 16  .j.B.).Q....t...
#     00A0: 62 3A 42 5B 11 46 C9 53   CA FD D2 93 02 90 7A 01  b:B[.F.S......z.
#     00B0: 6C 7A 8E 85 9F F0 60 B5   81 13 8F B4 64 C2 E0 F0  lz....`.....d...
#     00C0: 3E D4 31 55 61 DE CF 77   25 D1 DE 59 08 A8 0B BB  >.1Ua..w%..Y....
#     00D0: B0 D8 37 81 EC 3F 46 5D   DE BA C8 43 9E C1 84 0F  ..7..?F]...C....
#     00E0: C7 81 9C 09 FE 87 4F B6   42 78 F4 CF 71 3B 2C 27  ......O.Bx..q;,'
#     00F0: 3D A9 49 E6 43 CE 42 AE   C1 22 F6 36 F6 F8 A5 C1  =.I.C.B..".6....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.293 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 66 58 0F 0C 5B FE D2 CA   0B 31 A5 7C C2 ED E2 C0  fX..[....1......
#     0010: 9E 5A 3B C0 05 EB 18 C6   AE 5A AE EF 31 E0 CB D6  .Z;......Z..1...
#     0020: 59 89 CC 75 E2 48 BF 3E   44 A7 E8 83 99 1F 21 C8  Y..u.H.>D.....!.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.293 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:42.358 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7C 8C E1 14 AF 4A 4A 03 0C 89 EB 9B D3 AB D2 19 D3 82 8A E3 97 DB FC F2 1A 14 0C 7F EE 2C 99 6D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 16:37:42.682 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 16:37:42.683 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 16:37:43.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 16:37:43.624; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 16:37:43.982; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 16:37:43.984; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 16:37:43.985; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xsIq4/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:44.018 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 35 85 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:17.000 UTC",
#     "not  after"         : "2024-01-24 16:37:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 5B 9C D5 5E 0E 23 A4   58 42 5E F9 6D 05 92 12  0[..^.#.XB^.m...
#         0010: 32 05 A7 F9                                        2...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:44.022 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8A 08 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:09.000 UTC",
#     "not  after"         : "2024-01-24 16:37:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:44.038 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:44.155 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:44.156 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:44.156 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:44.157 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:44.295 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.296 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:44.298 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:44.298 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.304 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.316 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:44.319 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "66 94 9B 1A 3A E6 5E 17 ED 1E A9 2C C7 C6 F5 79 65 E3 94 44 AA A4 F4 7E A4 18 03 7A 7F 57 FB AA",
#   "session id"          : "39 5E E0 21 4A E9 4B A3 2B BB 58 C9 63 42 DF 68 FF 22 03 0E 90 F4 A0 9F B1 43 73 85 2D 73 B1 3A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C ED DC 81 0B A8 66 00   7E AB 8C 38 14 32 C4 87  \.....f....8.2..
#             0010: DA F1 E2 61 E1 CF 37 ED   A7 84 F3 97 42 F5 C2 53  ...a..7.....B..S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.412 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "24 89 6F 3E 89 30 85 0E 29 FC FC 36 F5 A2 9B EF 68 3E FF C6 D0 48 11 32 F7 C6 6B 7A B7 13 F9 2A",
#   "session id"          : "39 5E E0 21 4A E9 4B A3 2B BB 58 C9 63 42 DF 68 FF 22 03 0E 90 F4 A0 9F B1 43 73 85 2D 73 B1 3A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6C D3 10 8E 2E 52 40 E5   B1 D3 83 17 19 2C 28 23  l....R@......,(#
#           0010: 55 B0 DB 1B E4 9D E7 79   EA 32 17 AD 25 C1 20 7F  U......y.2..%. .
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.413 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.413 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.414 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.415 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.415 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.415 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.417 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.417 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.426 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.428 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.429 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.435 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.436 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.436 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.436 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.437 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.437 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.440 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 FF EF 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:13.000 UTC",
#       "not  after"         : "2024-01-24 16:37:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 B6 BD 60 FA AE 54 CF   D8 C1 B9 E7 3F C4 F9 86  h..`..T.....?...
#           0010: B2 0A CE 58                                        ...X
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.441 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.530 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 75 D2 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 16:37:11.000 UTC",
#     "not  after"         : "2024-01-24 16:37:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#         0010: 45 72 B4 BD                                        Er..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#         0010: CE 6B BA E9                                        .k..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.536 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B C4 23 15 A0 87 E1 BB   0A 50 F2 0A 3B 2B 3E 1C  ;.#......P..;+>.
#     0010: 4D 4E A5 A3 B8 00 3C 69   7E 45 86 95 8A 89 B8 BA  MN....<i.E......
#     0020: FB 3C C1 31 5C BF 28 63   88 D1 8F E4 BF 2C 44 1F  .<.1\.(c.....,D.
#     0030: C3 98 3E 10 F5 B1 22 E5   FF 8D 43 24 9F 6F 55 08  ..>..."...C$.oU.
#     0040: 6B C3 FD 16 CE 1F A1 AC   E9 26 92 77 15 85 AF 5A  k........&.w...Z
#     0050: 92 8B F4 A0 21 CE 47 DB   6C AF E3 D5 93 2A 49 42  ....!.G.l....*IB
#     0060: 6C E4 43 CF 3A BF 1A DA   22 82 6B 06 57 CB 44 59  l.C.:...".k.W.DY
#     0070: 9B B4 91 8A 75 40 25 2B   88 19 C7 E2 E3 79 E2 34  ....u@%+.....y.4
#     0080: EA 65 90 7D 9C 15 A0 95   25 47 0E 77 BF 73 93 C7  .e......%G.w.s..
#     0090: C7 BC A2 94 3D 55 A5 1C   5B 2A 67 4D 3A 58 B0 E6  ....=U..[*gM:X..
#     00A0: C7 FF 9E A7 85 38 25 21   7C 8B CC 4C 8D 10 F1 2F  .....8%!...L.../
#     00B0: B8 7D 7C A2 50 F2 DF 45   A6 C9 1B 38 78 C4 9C 6A  ....P..E...8x..j
#     00C0: C6 5D 1B AF 21 96 C2 46   8E EE 06 7E 6E 68 AE C9  .]..!..F....nh..
#     00D0: 08 D6 36 90 36 44 80 5A   FE 40 01 CA 60 8E 67 DF  ..6.6D.Z.@..`.g.
#     00E0: 97 A9 93 6B 6A 55 1D 7F   9E 0A 13 CB D6 11 00 A4  ...kjU..........
#     00F0: 8A 7F B0 DE C8 DC 9B AC   44 84 2D 3F 22 75 05 2A  ........D.-?"u.*
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.539 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 55 1B 80 14 4D 06 A1 82   BF F3 B0 70 D1 2D 7E 90  U...M......p.-..
#     0010: CB 3A C0 77 77 2F 37 D2   D3 8A 31 38 D6 4C 0C 82  .:.ww/7...18.L..
#     0020: 04 4D 24 E8 98 F0 EF 58   E2 B9 03 54 20 5E 4D D1  .M$....X...T ^M.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.542 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:44.543 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.543 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:44.543 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.543 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 16:37:44.544 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:44.544 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.544 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.547 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 35 85 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:17.000 UTC",
#       "not  after"         : "2024-01-24 16:37:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 5B 9C D5 5E 0E 23 A4   58 42 5E F9 6D 05 92 12  0[..^.#.XB^.m...
#           0010: 32 05 A7 F9                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 75 D2 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:11.000 UTC",
#       "not  after"         : "2024-01-24 16:37:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#           0010: 45 72 B4 BD                                        Er..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.586 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 89 8C A7 38 C7 3A FF   50 14 0B 58 93 C0 ED DC  ....8.:.P..X....
#     0010: 42 E1 74 D6 EA 1E ED A2   AF F8 6F 2A 1E 36 44 8E  B.t.......o*.6D.
#     0020: F3 12 32 03 91 C3 B0 39   49 A8 2D 8C 07 03 D4 AF  ..2....9I.-.....
#     0030: 9C 60 B7 D6 26 B8 84 89   61 D5 40 DD 8B 7C FB 13  .`..&...a.@.....
#     0040: E4 CA ED 30 CB D0 F9 D6   D1 24 8E 85 B5 D3 F6 41  ...0.....$.....A
#     0050: A5 DF 0F EF 94 33 8F 09   46 D0 DE 33 F6 D4 BB 59  .....3..F..3...Y
#     0060: DE 78 72 1C F5 F1 9F EE   C9 3E C0 A3 DA DD 56 99  .xr......>....V.
#     0070: E8 1C 43 1B 0F 71 B7 16   82 57 9E B0 A5 AE 78 E3  ..C..q...W....x.
#     0080: F8 40 69 45 2E E2 21 D5   3F 0A BD 7D 6F E3 08 72  .@iE..!.?...o..r
#     0090: 61 5B 7D 43 01 BB 70 F5   5C E9 12 F4 C8 76 B9 ED  a[.C..p.\....v..
#     00A0: A1 B8 42 18 8E 9E 19 2E   6C 62 79 36 4A 23 52 A1  ..B.....lby6J#R.
#     00B0: BD 46 7A 93 6A C9 6B FC   CE 20 34 77 C9 6D FF 9F  .Fz.j.k.. 4w.m..
#     00C0: 4A 2D 94 CF D2 48 B2 E0   F7 A0 B7 DF 0F C5 87 70  J-...H.........p
#     00D0: 23 F2 B0 45 3C 7C 63 6E   01 C0 18 18 63 5E D8 77  #..E<.cn....c^.w
#     00E0: A0 E5 FE DF 13 7A B7 4B   62 FE 91 A1 69 2C 73 57  .....z.Kb...i,sW
#     00F0: 79 42 22 18 0F 3A 16 64   F2 CF 86 2E 0C 18 3B 34  yB"..:.d......;4
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.587 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF A9 2D 19 E1 E6 7A CE   CF 6C 9F 23 C7 4B 0B 0D  ..-...z..l.#.K..
#     0010: D0 DB DE 24 90 B6 FA 3C   B8 63 B6 3E 39 64 90 A4  ...$...<.c.>9d..
#     0020: A4 A7 50 8C F1 F7 5D A5   34 A2 99 4C E8 21 08 2E  ..P...].4..L.!..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.588 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:44.651 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0C 68 12 87 7C 6F 90 A9 51 1F C3 8D D8 02 F8 28 88 E2 4F A3 CF 3E 77 99 23 BC 9C EC 1A 1A FD C1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 16:37:44.950 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 16:37:44.951 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 16:37:55.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:56.332 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 8A 08 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:09.000 UTC",
#       "not  after"         : "2024-01-24 16:37:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#           0010: 45 72 B4 BD                                        Er..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 75 D2 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 16:37:11.000 UTC",
#       "not  after"         : "2024-01-24 16:37:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB EA 5E 4D 91 2A 86 94   9F 56 B2 32 47 0F B0 42  ..^M.*...V.2G..B
#           0010: 45 72 B4 BD                                        Er..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 0B C2 39 3C 4F 9B 19   0A 68 D9 8A F2 C5 62 37  ...9<O...h....b7
#           0010: CE 6B BA E9                                        .k..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 16:37:56.346 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:56.427 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:56.436 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:56.436 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:37:56.437 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:56.574 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.574 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:56.575 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 16:37:56.576 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.581 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.592 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.592 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.592 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 16:37:56.594 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "91 BA E0 DF DB A8 6B 5E 6C 1B 6D 66 CF 55 8A 8B A3 48 57 4F 77 B9 38 58 DE C9 4F E7 70 81 3E B3",
#     "session id"          : "7C D4 FD B2 31 32 1B 12 33 20 E6 FA F8 27 80 CD 11 CB 0D 4D 8B 1F 30 E4 63 46 A9 01 E9 E1 A5 E9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C2 0A D1 4C 8E DC 20 87   4C 17 CB FF AF 5A 5E F5  ...L.. .L....Z^.
#               0010: B1 4E 05 F4 54 92 AE 35   ED 61 F9 C9 39 BE CE 29  .N..T..5.a..9..)
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.613 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "32 E9 6C DB 47 96 B9 C3 A9 C1 9B 07 00 30 60 A6 4A C1 BA 78 9D 34 27 5A C4 68 3F 73 8A 10 C6 27",
#     "session id"          : "7C D4 FD B2 31 32 1B 12 33 20 E6 FA F8 27 80 CD 11 CB 0D 4D 8B 1F 30 E4 63 46 A9 01 E9 E1 A5 E9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 4F A1 C0 DC 1A D2 24   5B 6A 6E 92 9A 87 F1 BC  DO.....$[jn.....
#             0010: C3 7C B8 38 75 4E 51 B4   A9 48 83 A2 DC 97 B3 2D  ...8uNQ..H.....-
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.614 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.614 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.616 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.618 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.627 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.628 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.629 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.633 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.633 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.634 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:56.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:37:56.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 16:37:56.635 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 16:39:19.597 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:39:19.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:39:19.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:39:19.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 16:39:19.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44242/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28141ms
ok 65 stop command for single port in 31446ms
ok 66 status detects locally running solr in 14710ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2199ms
ok 69 copying files around in 6533ms
ok 70 upconfig in 2643ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 38s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m1.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5741 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5741/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([37935374B02CC6DE:267B82F5BF0F080]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5957 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=37935374B02CC6DE -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 51s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m15s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5740 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5740/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37435/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 11:53:29.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 11:53:29.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 11:53:30.080; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 11:53:30.120; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22621ms
ok 61 start solr with client truststore and security manager in 25534ms
not ok 62 start solr with mTLS needed in 59304ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-AeeLyB/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37435.
#
# Started Solr server on port 37435 (pid=198681). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37436.
#
# Started Solr server on port 37436 (pid=199135). Happy searching!
#
# INFO  - 2023-10-26 11:54:53.527; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 11:54:53.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 11:54:53.907; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 11:54:53.910; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 11:54:53.911; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:53.943 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 81 6C ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:29.000 UTC",
#     "not  after"         : "2024-01-24 11:54:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 B5 A8 45 91 44 7C 5B   71 66 7F 19 42 89 52 A0  ...E.D.[qf..B.R.
#         0010: 80 1B B2 F5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:53.948 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 8C 9A 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:21.000 UTC",
#     "not  after"         : "2024-01-24 11:54:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:53.963 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:54.210 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.210 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:54.212 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:54.213 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.218 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.229 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.229 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.230 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:54.232 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "66 12 58 E2 74 E3 B8 00 3A 20 43 B6 8B 31 6C B2 95 12 D4 1D 57 88 1F D5 6D 12 24 D6 7D E2 C9 48",
#   "session id"          : "00 66 FF F8 E3 00 2D 0E 51 E8 59 8A DF 41 CC 0B D4 00 92 B5 4A 87 8E 82 A0 CC 8B A8 3D C8 AC 12",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3A 1B 57 85 FD A7 60 08   39 F7 DA AB 87 E9 92 74  :.W...`.9......t
#             0010: 09 64 33 5D 5B 74 FC 4D   56 DB 11 A1 A8 C5 2D 5F  .d3][t.MV.....-_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.339 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B6 AF 64 73 3B 9F CC 06 C6 3B 67 99 CD 14 C0 A8 E9 37 1E 2F E5 ED AE 2D 4E 49 C5 E1 7C C2 BC 7E",
#   "session id"          : "00 66 FF F8 E3 00 2D 0E 51 E8 59 8A DF 41 CC 0B D4 00 92 B5 4A 87 8E 82 A0 CC 8B A8 3D C8 AC 12",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 2B 6B 8B 2B 56 66 79   F6 04 72 09 48 7F 9B 79  p+k.+Vfy..r.H..y
#           0010: CC 78 31 5B 07 37 45 F8   F6 C4 B4 DC 74 76 5E 35  .x1[.7E.....tv^5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.339 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.339 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.340 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.342 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.344 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.344 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.353 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.355 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.356 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.360 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.360 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.360 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.360 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.361 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.361 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.361 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.362 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.363 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.363 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.364 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.364 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.365 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.365 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.368 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 35 C6 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:25.000 UTC",
#       "not  after"         : "2024-01-24 11:54:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 7D 43 80 EF AC 5F 81   62 B9 64 46 36 AF 84 9D  B.C..._.b.dF6...
#           0010: 9E B2 D5 2C                                        ...,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.368 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:54.402 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:54.403 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:54.403 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:54.403 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.451 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.455 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 8E 84 E7 97 86 F9 BC   66 E0 A7 AA BC E0 95 B2  l.......f.......
#     0010: D5 19 CF C2 0A B8 20 04   44 55 BF D9 03 B6 E2 C2  ...... .DU......
#     0020: 48 5C 43 B9 ED 71 F8 F3   78 D6 5C 08 89 09 62 74  H\C..q..x.\...bt
#     0030: 10 AD 04 B0 80 3B AD 13   D6 E2 E1 0A 38 BA 86 FF  .....;......8...
#     0040: EA 0F 26 D7 24 29 38 77   E3 8C 33 D2 8F CE 52 33  ..&.$)8w..3...R3
#     0050: 3A C9 AE 2A FF 12 78 0B   7A 8A 69 60 86 04 D5 66  :..*..x.z.i`...f
#     0060: FC 07 C7 B5 BC 89 D0 2D   D5 9E 6F 71 D3 75 3C 1E  .......-..oq.u<.
#     0070: 48 6C 3B 95 AB 53 99 52   23 F3 2A 45 3A 5B B9 20  Hl;..S.R#.*E:[.
#     0080: 47 15 9E 31 D7 A6 31 3A   72 B5 31 D2 AF EE 6F 5F  G..1..1:r.1...o_
#     0090: 24 DF 44 7B 5C D7 4B 09   27 85 A9 B8 6C 4A AC 6A  $.D.\.K.'...lJ.j
#     00A0: 54 FB 6A 79 6B 7D C5 FE   BC A9 13 A2 50 21 BE 31  T.jyk.......P!.1
#     00B0: AE 35 22 23 B7 97 6B 6B   C6 84 05 8F D1 93 1A 20  .5"#..kk.......
#     00C0: 6E CA 44 A5 EE E9 08 F0   1A 6D 14 D0 3E F6 80 04  n.D......m..>...
#     00D0: EC 44 D9 1C 10 77 3D AD   94 7C 80 48 A9 09 8F 07  .D...w=....H....
#     00E0: 77 FC 09 AA 3C C6 EA EC   C7 73 56 F2 3E FA 7C CA  w...<....sV.>...
#     00F0: 8B 6D 49 F0 40 B0 D1 91   48 BC EC AE F3 B2 4B 93  .mI.@...H.....K.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.456 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 93 16 51 1C 3A 05 C6   24 ED AA 27 AE 1E B7 87  ...Q.:..$..'....
#     0010: EE 1F B9 37 EE 20 04 DE   A8 DA BB 1D DD 1A 41 C0  ...7. ........A.
#     0020: EE CA B5 97 CE E4 86 01   FB A8 2F B8 25 ED 50 EF  ........../.%.P.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.459 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:54.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.460 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:54.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.460 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:54.461 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:54.461 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.461 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.464 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 81 6C ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:29.000 UTC",
#       "not  after"         : "2024-01-24 11:54:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 B5 A8 45 91 44 7C 5B   71 66 7F 19 42 89 52 A0  ...E.D.[qf..B.R.
#           0010: 80 1B B2 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 C4 14 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:23.000 UTC",
#       "not  after"         : "2024-01-24 11:54:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#           0010: 56 D7 8E A6                                        V...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.490 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8E 80 86 B3 EE 83 71 F5   C8 0D A5 BB 67 0B 12 05  ......q.....g...
#     0010: 9D A4 05 97 18 29 54 4A   08 06 80 12 EA A7 BA CA  .....)TJ........
#     0020: 39 65 B2 7B B2 C1 58 D2   9B 13 8B D5 8C D6 FE 73  9e....X........s
#     0030: 1F 81 66 03 0C E4 DC 0F   EA 54 1D 23 FB 69 15 B6  ..f......T.#.i..
#     0040: 29 C1 E1 4D 1B 8A 36 78   EF 5D 07 C4 28 51 6F B1  )..M..6x.]..(Qo.
#     0050: CC FA 70 52 D4 D5 96 3F   D1 88 62 1F 82 0F 1A 73  ..pR...?..b....s
#     0060: 53 9E 91 D4 C2 DE AF 69   64 A9 76 3F 0D DB 89 58  S......id.v?...X
#     0070: 18 3B 29 F5 C0 1E EC 50   D1 23 E5 44 DA 57 3D C8  .;)....P.#.D.W=.
#     0080: 9E 94 ED 3F D5 84 6F CA   2B 96 EB 3A 89 0C C8 01  ...?..o.+..:....
#     0090: 42 1A 3C 06 E1 FC FB 9E   C6 EA DC 7D 3D 78 7A CA  B.<.........=xz.
#     00A0: B9 F0 E8 84 AF 4D F8 CD   63 85 86 C1 D3 35 3D 75  .....M..c....5=u
#     00B0: 07 3D E0 F0 53 FB F8 4A   BB C2 64 DA B2 99 44 AF  .=..S..J..d...D.
#     00C0: 2C 41 76 F4 77 05 70 64   F8 50 54 58 7C 3A 71 82  ,Av.w.pd.PTX.:q.
#     00D0: C6 00 D7 8A 6F CA DB 80   7E B3 3A D2 48 84 78 79  ....o.....:.H.xy
#     00E0: 0A 75 A9 7F 1E 7D 8B B8   AE AD 9B CA 20 C1 19 DB  .u.......... ...
#     00F0: 07 98 77 13 D6 37 B7 2F   9B 46 CA B5 A8 01 4D 44  ..w..7./.F....MD
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.492 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 3F DB EA 1A 76 30 A3   34 07 5C 78 14 09 DE 24  *?...v0.4.\x...$
#     0010: 1E C2 37 BA F2 E4 30 89   F4 5B 8F 1D F4 62 AE 75  ..7...0..[...b.u
#     0020: E3 4C 45 46 6D FB 4A 49   BD F6 2B 6D 25 04 71 D7  .LEFm.JI..+m%.q.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.493 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:54.550 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2B 69 5C D2 C1 E0 38 87 DA 53 C3 5F 5A 5D D2 5D 57 3F 3A 89 98 6B 14 5D 05 5C A6 20 F2 DE 67 3A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 11:54:54.831 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 11:54:54.832 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 11:54:55.780; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 11:54:55.785; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 11:54:56.145; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 11:54:56.148; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 11:54:56.148; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AeeLyB/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:56.179 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 81 6C ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:29.000 UTC",
#     "not  after"         : "2024-01-24 11:54:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 B5 A8 45 91 44 7C 5B   71 66 7F 19 42 89 52 A0  ...E.D.[qf..B.R.
#         0010: 80 1B B2 F5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:56.184 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 8C 9A 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:21.000 UTC",
#     "not  after"         : "2024-01-24 11:54:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 11:54:56.198 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:56.290 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:56.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:56.291 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:54:56.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:56.424 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:56.426 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:54:56.426 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.432 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.443 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.444 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:54:56.446 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "11 D4 03 A6 1A 19 D7 03 25 59 D1 F1 DD 46 67 48 54 9D 6E 87 A6 6D 7D AC 6F D9 3F A9 8A 07 0A C0",
#   "session id"          : "6F 66 F9 D0 BA EC 04 DE 5F 98 5E 28 63 1F 04 49 01 E3 40 24 38 E1 CF 46 E2 62 9E 8B D1 AD AD EC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 56 64 CC 54 73 6F 8A E1   F9 C8 49 31 38 5D F1 44  Vd.Tso....I18].D
#             0010: 50 16 8B C8 AC 40 11 F8   89 79 24 54 5C 13 1B 10  P....@...y$T\...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.537 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "55 BD C6 34 28 A6 DB 94 4F 0E 97 76 B9 20 43 C2 99 24 63 5C 20 07 27 B9 D9 A1 54 BB 69 73 9A 54",
#   "session id"          : "6F 66 F9 D0 BA EC 04 DE 5F 98 5E 28 63 1F 04 49 01 E3 40 24 38 E1 CF 46 E2 62 9E 8B D1 AD AD EC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 57 37 7F 66 F4 32 5C 69   C8 38 88 14 70 89 7A 3C  W7.f.2\i.8..p.z<
#           0010: B7 5C 0A 43 8C 8D 8E 2F   8E 37 23 3C 35 D9 D1 47  .\.C.../.7#<5..G
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.537 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.537 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.538 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.540 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.540 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.542 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.543 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.543 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.543 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.552 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.553 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.554 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.558 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.558 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.559 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.560 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.561 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.561 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.561 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.562 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.563 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.563 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.565 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 35 C6 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:25.000 UTC",
#       "not  after"         : "2024-01-24 11:54:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 7D 43 80 EF AC 5F 81   62 B9 64 46 36 AF 84 9D  B.C..._.b.dF6...
#           0010: 9E B2 D5 2C                                        ...,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.566 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.642 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 C4 14 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 11:54:23.000 UTC",
#     "not  after"         : "2024-01-24 11:54:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#         0010: 56 D7 8E A6                                        V...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#         0010: 03 82 44 52                                        ..DR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.646 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 B8 0B AF 3C B8 37 06   86 D2 C9 34 57 BD FF 19  b...<.7....4W...
#     0010: 4B BA 86 63 35 DD 6A 48   B3 A3 EF 6B E8 3C F3 10  K..c5.jH...k.<..
#     0020: D3 23 B5 77 BC 87 D3 F5   39 63 4A C2 DB 7A C6 16  .#.w....9cJ..z..
#     0030: D3 2A A0 60 68 41 51 26   50 F2 C2 0F 44 C3 C4 D2  .*.`hAQ&P...D...
#     0040: 9E 70 43 11 FC 3F 4C 49   01 E0 BE D0 90 5D D1 DC  .pC..?LI.....]..
#     0050: AE 5A 7B 76 04 14 29 05   F2 62 BD C4 C4 AC FB D7  .Z.v..)..b......
#     0060: F1 67 30 ED E0 DC 34 60   18 B9 01 34 43 1C F5 B1  .g0...4`...4C...
#     0070: FB 81 64 1E 04 D0 3A 4E   CF DD 8B 62 82 7D 9E 0B  ..d...:N...b....
#     0080: F1 1B A6 DD 2C FD DE 67   C4 B0 57 1A 8A C5 84 54  ....,..g..W....T
#     0090: 8C 4C D7 06 26 80 F2 69   F6 C6 EA A5 1E 40 40 ED  .L..&..i.....@@.
#     00A0: 73 0C 08 44 06 60 C4 4E   48 AF FC 36 E6 24 48 83  s..D.`.NH..6.$H.
#     00B0: 37 C8 D5 72 B5 79 B8 E8   71 42 F0 C8 51 99 B5 6B  7..r.y..qB..Q..k
#     00C0: D9 DD 62 38 51 71 A4 8C   3C 53 D6 C0 66 47 78 00  ..b8Qq..<S..fGx.
#     00D0: A7 74 6A 84 EB 0B B1 5C   47 4C 26 DD 25 69 A5 89  .tj....\GL&.%i..
#     00E0: 37 70 29 4A 3A FC 39 AB   FB F3 79 61 42 A2 09 75  7p)J:.9...yaB..u
#     00F0: 5C 0A F9 A7 27 5B D9 41   44 DA 44 B3 67 80 C1 F7  \...'[.AD.D.g...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.648 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 9A 27 76 DE 6C 83 8E   5F 47 CC 19 A8 40 40 B2  ..'v.l.._G...@@.
#     0010: A1 42 07 17 47 AC CC C5   35 A7 65 89 AE BA 35 D9  .B..G...5.e...5.
#     0020: C2 78 98 2E B1 01 F3 D1   F5 07 93 30 6D F9 42 98  .x.........0m.B.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.650 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:56.651 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.651 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:56.651 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.651 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 11:54:56.652 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:54:56.652 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.652 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.655 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 81 6C ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:29.000 UTC",
#       "not  after"         : "2024-01-24 11:54:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 B5 A8 45 91 44 7C 5B   71 66 7F 19 42 89 52 A0  ...E.D.[qf..B.R.
#           0010: 80 1B B2 F5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 C4 14 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:23.000 UTC",
#       "not  after"         : "2024-01-24 11:54:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#           0010: 56 D7 8E A6                                        V...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.680 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 AA 52 C9 69 2B 38 82   93 83 90 29 9B D1 45 26  ..R.i+8....)..E&
#     0010: 8A 88 B1 5E 2F 01 FF 7C   62 1D 39 0F B6 FF 6E 58  ...^/...b.9...nX
#     0020: 0B DC BC D0 20 AF 2C 79   34 FD 13 7C CB 57 52 BB  .... .,y4....WR.
#     0030: B6 62 15 0E 4A BA 14 C0   54 27 4A 3C FE 71 72 19  .b..J...T'J<.qr.
#     0040: A0 49 64 16 CC 2C E1 7A   C3 89 F1 10 DF E4 AA 98  .Id..,.z........
#     0050: 85 07 5C 2B DC 3F D3 EC   85 23 7F D0 32 D8 61 49  ..\+.?...#..2.aI
#     0060: 8F 6C D4 51 E1 8C CC 8E   B0 28 A1 A3 D5 9B 6F 44  .l.Q.....(....oD
#     0070: 07 C0 CD 9F 0B E5 DF 95   F4 40 1E F2 6A 2B AE 09  .........@..j+..
#     0080: 82 B4 DC 4D AB 76 0A DB   F0 4E 48 82 5B 9B B2 75  ...M.v...NH.[..u
#     0090: 08 A9 13 7F 9B 32 60 7A   F8 98 91 36 F6 ED AE C5  .....2`z...6....
#     00A0: 68 A9 C0 14 79 A9 DD 84   4F 2F 63 BB B0 44 F2 D7  h...y...O/c..D..
#     00B0: 4F FA 1D B0 A9 EB 4E AC   78 68 2C 94 D3 69 29 43  O.....N.xh,..i)C
#     00C0: BF B0 A6 93 8C F1 78 03   DC 5D 7C 9F E5 5F E0 C3  ......x..]..._..
#     00D0: BF FC 26 C3 0F A5 BB 08   D6 CE 39 3F 21 52 20 DD  ..&.......9?!R .
#     00E0: 21 9D D0 D6 01 70 B6 31   29 84 0A 9D 63 0F 4D C1  !....p.1)...c.M.
#     00F0: FD E1 E1 93 46 0E 57 12   8E 06 E3 37 4E 18 4A 0B  ....F.W....7N.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.681 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 29 86 B5 69 BE DC 5F 1A   57 74 55 5A D3 E7 D1 26  )..i.._.WtUZ...&
#     0010: D0 FF F1 EE 1B B4 98 11   E5 66 06 CA 2E AC 0D 27  .........f.....'
#     0020: BE 96 60 9D 06 24 DF 3F   FA 8F 1C 13 71 74 43 D1  ..`..$.?....qtC.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.682 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:54:56.737 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 25 34 0A 97 8E D1 FF 14 CB FB 4F 2D 68 CE 92 EB EA 58 5B 5E 74 4F EF B8 5F 7D 2E 12 94 3D 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 11:54:57.015 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 11:54:57.016 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 11:55:08.528; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 11:55:08.858 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 8C 9A 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:21.000 UTC",
#       "not  after"         : "2024-01-24 11:54:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#           0010: 56 D7 8E A6                                        V...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 C4 14 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 11:54:23.000 UTC",
#       "not  after"         : "2024-01-24 11:54:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E E1 7A 59 1B 5D 1F 01   4E CD AE 6F C2 BF FF C9  ..zY.]..N..o....
#           0010: 56 D7 8E A6                                        V...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 FF 90 7A 73 8D 78 5F   59 7B AA DD FB 5A 07 82  ...zs.x_Y....Z..
#           0010: 03 82 44 52                                        ..DR
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 11:55:08.873 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:55:08.994 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:55:08.994 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:55:08.994 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:55:08.995 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:55:09.118 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.118 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:55:09.120 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 11:55:09.120 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.137 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.138 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.138 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 11:55:09.140 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "9A 45 0C E0 40 8F BC 34 18 DF AF 0A 03 11 82 AD 9D B8 7D C1 EA E3 34 63 3C 10 AA E5 CE B4 C5 3F",
#     "session id"          : "A1 03 8A 0F 4D 83 BD FC 63 41 4F DD 1A BD D9 52 28 7D C9 B4 E5 74 9A 6D 8E 07 87 3F 9A 62 8A 47",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 47 00 AA 6B 48 CF 2E E8   90 24 B5 3C 03 70 85 8C  G..kH....$.<.p..
#               0010: 71 01 27 26 58 E8 5A BD   FF 8D 3B 0D 31 50 C7 19  q.'&X.Z...;.1P..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.164 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "23 D7 07 77 93 67 8A 85 2D B7 0F 1B 06 53 76 D5 03 A6 DB D0 1C 03 D1 A3 1B 0D D9 1E 3A 12 36 25",
#     "session id"          : "A1 03 8A 0F 4D 83 BD FC 63 41 4F DD 1A BD D9 52 28 7D C9 B4 E5 74 9A 6D 8E 07 87 3F 9A 62 8A 47",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 8E 9A 3E 30 2D 42 70   63 D3 CC 8F EA 5C 53 F4  ...>0-Bpc....\S.
#             0010: 93 68 67 8F 86 4B A1 EA   13 02 D8 35 02 FB 6B 26  .hg..K.....5..k&
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.164 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.164 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.166 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.169 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.169 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.169 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.169 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:55:09.170 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.180 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.182 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.183 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.187 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.187 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.188 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:55:09.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:55:09.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 11:55:09.189 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 11:56:31.040 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:56:31.106 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:56:31.107 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:56:31.107 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 11:56:31.107 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37436/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28489ms
ok 65 stop command for single port in 31373ms
ok 66 status detects locally running solr in 14354ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2166ms
ok 69 copying files around in 6581ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 10s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m35s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5739 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5739/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44371/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 09:49:19.667; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 09:49:19.672; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 09:49:20.901; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 09:49:20.944; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22822ms
ok 61 start solr with client truststore and security manager in 25171ms
not ok 62 start solr with mTLS needed in 61605ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-u8Ui5c/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44371.
#
# Started Solr server on port 44371 (pid=199721). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44372.
#
# Started Solr server on port 44372 (pid=200173). Happy searching!
#
# INFO  - 2023-10-26 09:50:44.120; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 09:50:44.126; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 09:50:44.510; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 09:50:44.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 09:50:44.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:44.547 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D DA 82 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:20.000 UTC",
#     "not  after"         : "2024-01-24 09:50:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 18 85 59 3C C2 B8 C3   18 D2 67 BF 92 9F B2 14  c..Y<.....g.....
#         0010: 45 3D 71 57                                        E=qW
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:44.552 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 85 05 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:12.000 UTC",
#     "not  after"         : "2024-01-24 09:50:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:44.567 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:44.836 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:44.838 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:44.838 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.845 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.857 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.858 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.858 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:44.861 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "28 04 B8 DC 3D 3D 55 0A E6 A1 5F 5A 55 0E B6 F2 68 23 19 35 F5 C9 4B 54 2C AB D6 65 2E 12 F3 BC",
#   "session id"          : "3B 27 EE 89 82 9F B3 9F 7B 80 0E A8 36 26 C8 A3 2B 60 6F 2D 26 F1 C8 6E A1 9C 84 92 0A EC 93 99",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 86 11 50 56 32 81 79   AA A3 E7 45 2F 35 BD 28  ^..PV2.y...E/5.(
#             0010: 38 55 A3 41 A5 5A 58 D6   4B AB 9F 13 77 53 74 50  8U.A.ZX.K...wStP
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.970 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DF CA EB 84 C1 74 84 6B C6 DD BC D8 9E CB 2A FB C9 69 0A E3 2A 2D C3 2B 59 4D 7C E5 2F 75 C3 62",
#   "session id"          : "3B 27 EE 89 82 9F B3 9F 7B 80 0E A8 36 26 C8 A3 2B 60 6F 2D 26 F1 C8 6E A1 9C 84 92 0A EC 93 99",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E3 53 8C C5 23 CE 34 1D   BC 77 38 15 F8 EF 0A 92  .S..#.4..w8.....
#           0010: F3 18 24 9B A8 FC E0 54   D1 37 91 BE 02 F9 63 5A  ..$....T.7....cZ
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.971 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.971 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.973 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.976 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.976 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.977 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:44.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.979 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.979 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.986 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.988 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.989 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.993 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.994 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:44.994 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:44.994 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.995 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.997 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.998 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:44.999 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:44.999 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.003 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 83 9E 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:16.000 UTC",
#       "not  after"         : "2024-01-24 09:50:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 8D 2A B2 57 26 15 DC   74 8C B5 82 0B 01 F0 3C  ..*.W&..t......<
#           0010: 65 E5 A9 45                                        e..E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.003 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:45.108 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:45.109 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:45.109 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:45.109 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.134 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.138 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 87 74 25 EB 29 1A 37   03 43 A0 F2 82 45 A2 F8  ,.t%.).7.C...E..
#     0010: 39 9F 5A 0B 83 8B 08 9E   4A 73 EA F9 3C 73 9F 06  9.Z.....Js..<s..
#     0020: DD 62 17 2A 64 26 22 F3   56 42 5B 84 8D 79 FA 8A  .b.*d&".VB[..y..
#     0030: 88 15 CF 71 51 EF 1B 7F   E3 FE 40 2C C8 46 F2 28  ...qQ.....@,.F.(
#     0040: 41 61 98 3D 78 73 C6 E1   0F CD 89 CE CB B2 66 47  Aa.=xs........fG
#     0050: 9B 3F 82 58 1C 52 86 54   EF AF 39 F2 77 49 57 AA  .?.X.R.T..9.wIW.
#     0060: 75 0C 18 8F 77 BB 99 89   62 5E 69 BC 9C 8E FB AD  u...w...b^i.....
#     0070: 41 CC 75 9B F1 CB 59 5B   3B A2 23 B1 1A BD ED BA  A.u...Y[;.#.....
#     0080: 47 6F D5 BA 3F 0F A6 E2   3F 71 65 53 DF 1F 3E AA  Go..?...?qeS..>.
#     0090: E7 42 65 AC A0 C7 BD B5   16 A1 B0 B7 FD 80 C7 D1  .Be.............
#     00A0: C0 90 E6 8D 40 CB 8B 0E   2A 5C D6 8D 1A 30 60 73  ....@...*\...0`s
#     00B0: 9A FA 91 60 08 2D 42 5F   4A 54 6E 33 91 72 CC 6C  ...`.-B_JTn3.r.l
#     00C0: 8A 94 79 75 DC D8 90 3D   DD 70 3A 08 AE 62 8E 86  ..yu...=.p:..b..
#     00D0: 45 C8 13 6B 91 18 03 2C   C2 5F 18 1E 31 8C EE 0D  E..k...,._..1...
#     00E0: 73 18 6A AE A6 1E 33 11   23 6A FB 2F 9C BC D5 95  s.j...3.#j./....
#     00F0: 4A 3B 75 97 90 CD BF A5   4E F9 D1 6B 85 30 F3 D0  J;u.....N..k.0..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.139 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 10 13 ED 40 CF 75 AC   24 D2 F4 49 14 0E 2B 03  ....@.u.$..I..+.
#     0010: 25 FB 90 C2 6D D7 8E 6D   E7 89 35 72 EF EA 9B 64  %...m..m..5r...d
#     0020: F3 F9 A9 EF 4B E8 6E 27   FD D4 E1 0C 2D D4 91 7E  ....K.n'....-...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.142 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:45.143 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:45.143 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:45.143 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:45.143 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:45.143 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:45.144 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.144 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.147 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D DA 82 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:20.000 UTC",
#       "not  after"         : "2024-01-24 09:50:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 18 85 59 3C C2 B8 C3   18 D2 67 BF 92 9F B2 14  c..Y<.....g.....
#           0010: 45 3D 71 57                                        E=qW
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 1F FB 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:13.000 UTC",
#       "not  after"         : "2024-01-24 09:50:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#           0010: 01 4E 01 7F                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.174 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 25 2F 9B 4D F1 DA E2   C4 26 28 52 DA 00 24 16  E%/.M....&(R..$.
#     0010: 15 A2 72 F6 3F CC 10 7F   16 FB A0 E3 DF 1B E6 25  ..r.?..........%
#     0020: 2E 85 02 16 8F E0 0A B9   C2 DF 67 7E BF E2 D5 A7  ..........g.....
#     0030: 81 08 F2 17 7C 70 48 0C   CE AB 73 FE 84 10 9C 09  .....pH...s.....
#     0040: 9F 27 02 1E AE 45 F9 10   22 2A 7F 3E A8 1D F6 08  .'...E.."*.>....
#     0050: 53 AA B3 02 A1 35 B5 8B   0C C3 67 69 C8 C6 9A F0  S....5....gi....
#     0060: 9D 9C 93 0B E0 D9 41 A8   EC 9C 01 CF EC D3 B3 0D  ......A.........
#     0070: 42 2E 5F C7 D8 71 8E D4   5D 22 B1 40 82 0F AD ED  B._..q..]".@....
#     0080: 59 D2 22 C0 3B 86 34 6D   9C D8 EC 47 AB 41 5F 1A  Y.".;.4m...G.A_.
#     0090: D7 12 0E 59 31 8E 3F A4   7D 61 18 5F DC AB 78 0D  ...Y1.?..a._..x.
#     00A0: 16 88 62 39 D6 95 D5 F6   12 DB C1 A5 75 D5 0D DC  ..b9........u...
#     00B0: 3A 77 A7 A3 91 3F A6 D1   1C C6 A8 A9 2F 2E 9E 26  :w...?....../..&
#     00C0: E4 7C 9D 21 07 E1 43 E6   1C 77 58 51 5A 54 80 9D  ...!..C..wXQZT..
#     00D0: 1C CD 03 1A F2 5B 56 F7   97 91 3D 59 E8 57 06 BC  .....[V...=Y.W..
#     00E0: A6 34 E9 2E E5 6A A6 6A   5E 02 1B 43 B1 A6 6B 26  .4...j.j^..C..k&
#     00F0: 04 E8 B9 E2 B5 B1 B6 39   D1 DA 05 17 AF 4C 0F 25  .......9.....L.%
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.175 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 06 B2 7C 44 0B 97 35 E1   F3 C2 F1 FE 9B 68 00 52  ...D..5......h.R
#     0010: B8 BB EA 10 3B DD 01 10   59 94 31 3D FC 21 EB B7  ....;...Y.1=.!..
#     0020: C5 C9 F8 13 F5 3D 5A BB   1B C6 56 1D 29 F2 25 D5  .....=Z...V.).%.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.175 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:45.235 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9E 16 A4 67 5E E4 6A CE A2 FD BB 1D 2C 44 4B 7E F6 95 E2 75 3B 39 A3 A7 BA C6 AC 9B 20 BD 80 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 09:50:45.560 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 09:50:45.562 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 09:50:46.521; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 09:50:46.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 09:50:46.891; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 09:50:46.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 09:50:46.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u8Ui5c/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:46.928 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D DA 82 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:20.000 UTC",
#     "not  after"         : "2024-01-24 09:50:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 18 85 59 3C C2 B8 C3   18 D2 67 BF 92 9F B2 14  c..Y<.....g.....
#         0010: 45 3D 71 57                                        E=qW
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:46.932 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 85 05 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:12.000 UTC",
#     "not  after"         : "2024-01-24 09:50:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:46.948 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:47.282 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:47.282 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:47.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:47.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:47.435 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.435 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:47.437 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:50:47.437 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.443 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.454 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:50:47.457 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 D5 DD A2 59 93 A2 DF F1 A6 9A C8 2F 5A CD A1 C8 80 47 44 67 97 02 F3 45 36 D5 14 0F 76 2C 2C",
#   "session id"          : "1F 43 54 DB 3C FD 0B 2F 02 D0 73 89 6F BD 02 58 91 E5 E0 70 9B E0 A2 B6 3A BF 54 74 B3 87 81 9F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 43 44 CA 6F 49 39 E5   B6 0D 40 1E 0E 57 CB 98  .CD.oI9...@..W..
#             0010: 8F 24 0E 61 65 4B 60 83   A9 C9 27 F5 8F E3 FF 07  .$.aeK`...'.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.559 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 34 40 C0 E9 A3 53 4A BC 8B AF E1 7B BB 17 9C 2F C7 AD FB 04 B3 9B D0 BE C2 4A F0 67 52 C8 1E",
#   "session id"          : "1F 43 54 DB 3C FD 0B 2F 02 D0 73 89 6F BD 02 58 91 E5 E0 70 9B E0 A2 B6 3A BF 54 74 B3 87 81 9F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D9 4A 3E 51 1C 25 54 67   DB 39 3C CB 98 7D D4 CB  .J>Q.%Tg.9<.....
#           0010: 1F E8 71 BD D9 A5 CE CD   C2 7B 1B DB 56 B3 DF 48  ..q.........V..H
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.560 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.560 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.562 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.565 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.565 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.574 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.575 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.576 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.580 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.580 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.580 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.583 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.583 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.584 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.585 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.585 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.588 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 83 9E 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:16.000 UTC",
#       "not  after"         : "2024-01-24 09:50:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 8D 2A B2 57 26 15 DC   74 8C B5 82 0B 01 F0 3C  ..*.W&..t......<
#           0010: 65 E5 A9 45                                        e..E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.588 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.684 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 1F FB 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 09:50:13.000 UTC",
#     "not  after"         : "2024-01-24 09:50:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#         0010: 01 4E 01 7F                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#         0010: 41 B4 E1 DF                                        A...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.687 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AB 16 D0 13 02 F4 3D 87   DD 8D 90 4C 2E E1 41 BA  ......=....L..A.
#     0010: 7B FE F9 C6 A6 42 D4 0E   60 36 ED 2A CF 04 0A DE  .....B..`6.*....
#     0020: 8C 93 95 E9 C6 5F 03 40   42 0F E8 23 CC E8 C5 90  ....._.@B..#....
#     0030: 18 A9 25 13 F0 4F E4 05   6C 48 D2 AE 59 E3 ED 1A  ..%..O..lH..Y...
#     0040: B2 68 BA FC 25 EC 9A 40   E6 74 20 72 C0 EA C4 28  .h..%..@.t r...(
#     0050: AC 82 1A AB 04 45 17 F9   96 9D 03 63 B8 00 14 FC  .....E.....c....
#     0060: A2 F7 B4 6E 68 94 A4 73   76 02 F1 0D E1 AE 58 7C  ...nh..sv.....X.
#     0070: 93 73 0B 34 E4 DB B5 0E   74 84 0E E1 32 AA C0 29  .s.4....t...2..)
#     0080: DF 19 08 44 59 43 C8 07   A6 12 10 F9 11 8D 0C A3  ...DYC..........
#     0090: 7B 44 5C A4 39 AB 9E 3B   7F B5 CD 8D 44 BF D2 E6  .D\.9..;....D...
#     00A0: F2 20 34 39 9C D6 CB 9F   A0 81 0E F2 AA F7 DC E6  . 49............
#     00B0: 40 7C 61 C3 6D BD 99 92   92 09 6B 19 CF 5A 22 FB  @.a.m.....k..Z".
#     00C0: 02 CF 3C E0 F0 45 AC A6   F3 D6 6D BD A7 0A AE EE  ..<..E....m.....
#     00D0: 9C 3C 15 12 3A 2C B8 BA   8B EA 00 67 6A D2 6A E2  .<..:,.....gj.j.
#     00E0: EF B5 8E CA 9E 24 17 12   A9 F8 21 D2 06 0A 1F C0  .....$....!.....
#     00F0: D9 8D DE E9 3F 0A 76 13   78 25 32 C0 FD DB C9 14  ....?.v.x%2.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.690 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 49 31 11 3C 72 AD 33 86   E2 70 7D E5 B7 21 E8 97  I1.<r.3..p...!..
#     0010: 03 0E FC 78 74 DD F8 EE   20 AA 8F B8 0E D5 85 94  ...xt... .......
#     0020: FD 6A D4 1F E1 10 8B 3A   27 B1 C7 B0 30 B6 54 F4  .j.....:'...0.T.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.692 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:47.693 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.693 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:47.693 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.693 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 09:50:47.694 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:50:47.694 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.694 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.697 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D DA 82 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:20.000 UTC",
#       "not  after"         : "2024-01-24 09:50:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 18 85 59 3C C2 B8 C3   18 D2 67 BF 92 9F B2 14  c..Y<.....g.....
#           0010: 45 3D 71 57                                        E=qW
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 1F FB 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:13.000 UTC",
#       "not  after"         : "2024-01-24 09:50:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#           0010: 01 4E 01 7F                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.723 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 03 53 EC 90 0F C9 B9   EC AC 1F 97 F8 23 15 E7  G.S..........#..
#     0010: F8 84 DC CD 88 B5 22 70   5D 00 47 3E 56 B3 07 60  ......"p].G>V..`
#     0020: C5 F5 8E 39 E4 A0 9D 61   EE 72 50 C8 FF CF E8 A8  ...9...a.rP.....
#     0030: F6 C4 4D CD D0 54 2F B0   14 65 7E 35 47 14 FB FB  ..M..T/..e.5G...
#     0040: A5 95 D3 68 B7 8E 29 6E   2B 1B 19 D4 E7 7D 85 76  ...h..)n+......v
#     0050: 01 D7 AD 16 A9 6A B7 7F   6A 8D 6B 82 F7 B9 9A B6  .....j..j.k.....
#     0060: A5 E4 D5 55 58 81 96 FC   AD 69 62 B7 6F 28 7A 34  ...UX....ib.o(z4
#     0070: E7 AA 6B 01 A9 8A A9 2A   3A 34 03 35 A0 94 EC 51  ..k....*:4.5...Q
#     0080: BE 1B F1 5D F3 9B 0E 7D   E1 F5 3C 74 42 57 A9 65  ...]......<tBW.e
#     0090: A8 A0 AC 81 89 CC B5 6F   E4 A3 E6 40 54 66 FB 72  .......o...@Tf.r
#     00A0: FD 18 06 ED 22 12 4E 0C   DC A8 45 3A 36 AA BF 96  ....".N...E:6...
#     00B0: 65 70 ED E6 74 C5 86 ED   FF 88 31 3A 6C EA 90 9E  ep..t.....1:l...
#     00C0: 3E B0 6E 05 F2 53 56 48   7D F1 3F 38 19 9E F6 5D  >.n..SVH..?8...]
#     00D0: 46 AF 42 D7 77 35 F7 C4   6B 0A 89 16 5B 27 A2 A4  F.B.w5..k...['..
#     00E0: 45 3C DF EB 47 F0 45 98   A8 14 5B D1 79 2E A3 79  E<..G.E...[.y..y
#     00F0: 6E 52 9E 75 8A CF E8 4E   D4 BE D4 AE C6 9C EA 01  nR.u...N........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.724 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: ED C9 C0 87 2A 71 10 08   4F 53 14 9A 82 B9 41 C5  ....*q..OS....A.
#     0010: F4 2C 49 2C 3A 8B 0E EC   F2 02 DB 60 52 6E 39 96  .,I,:......`Rn9.
#     0020: 7F D9 CF 2F 1B 28 6F 06   61 25 D2 79 3B C0 B6 80  .../.(o.a%.y;...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.725 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:50:47.786 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "22 0D 3E 58 FE EE 4F E4 22 72 21 EC 51 20 B7 75 55 09 96 32 1B DD 82 23 55 EE 34 AA 08 E0 97 8C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 09:50:48.090 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 09:50:48.091 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 09:50:59.508; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:59.836 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 1F FB 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:13.000 UTC",
#       "not  after"         : "2024-01-24 09:50:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#           0010: 01 4E 01 7F                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 3A 10 62 84 5D 3B 21   A5 A9 C8 39 08 A1 BD D9  .:.b.];!...9....
#           0010: 41 B4 E1 DF                                        A...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 85 05 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 09:50:12.000 UTC",
#       "not  after"         : "2024-01-24 09:50:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 7D 0B FD 3B 39 31 78   73 54 EB DC D5 FD 46 82  I...;91xsT....F.
#           0010: 01 4E 01 7F                                        .N..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 09:50:59.852 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:59.974 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:59.974 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:59.974 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:50:59.975 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:51:00.095 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.095 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:51:00.097 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 09:51:00.097 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.102 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.114 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.114 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.114 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 09:51:00.116 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "13 0B E9 27 96 63 17 8E E0 1F 4F 11 18 C2 2F BA 8C 8D A5 58 69 FC C3 CF A2 9C CD 32 0A 31 6B 19",
#     "session id"          : "3D 80 AC 6C E8 FF 3C F9 1B 4C 98 99 39 46 2B 24 BA 70 EA AC 8F C6 E6 60 95 5F 67 DF 0E 66 CF D8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6C 53 AA 31 15 9B 5E F1   87 0C 3D 5A 71 E9 E0 65  lS.1..^...=Zq..e
#               0010: DE 73 33 C5 AA 8A BF 99   FE 3A 9C 26 4D 2A 72 15  .s3......:.&M*r.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.138 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C3 F2 7F 34 47 03 9E 51 4F D2 4A 05 FB CD C9 BF C4 A9 9A 34 09 D1 7C 82 16 9F F9 9B 27 39 61 9D",
#     "session id"          : "3D 80 AC 6C E8 FF 3C F9 1B 4C 98 99 39 46 2B 24 BA 70 EA AC 8F C6 E6 60 95 5F 67 DF 0E 66 CF D8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 11 D2 87 B0 DE 9F 56   7B AD 2C EA 6B 6E AC 2F  .......V..,.kn./
#             0010: 8E E9 F7 58 FC 54 E7 72   30 08 9D 4A AD 69 90 1D  ...X.T.r0..J.i..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.139 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.139 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.141 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.143 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.143 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:51:00.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:51:00.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.154 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.158 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.158 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.159 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:51:00.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:51:00.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 09:51:00.160 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 09:52:23.691 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:52:23.741 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:52:23.742 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:52:23.743 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 09:52:23.743 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44372/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28156ms
ok 65 stop command for single port in 31112ms
ok 66 status detects locally running solr in 14661ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2184ms
ok 69 copying files around in 6603ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 45s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m9s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5738 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5738/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34053/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 07:25:41.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 07:25:41.239; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 07:25:42.429; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 07:25:42.469; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22702ms
ok 61 start solr with client truststore and security manager in 24397ms
not ok 62 start solr with mTLS needed in 58913ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-G4Ff8P/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34053.
#
# Started Solr server on port 34053 (pid=200739). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34054.
#
# Started Solr server on port 34054 (pid=201186). Happy searching!
#
# INFO  - 2023-10-26 07:27:04.893; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 07:27:04.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 07:27:05.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 07:27:05.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 07:27:05.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:05.298 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 43 92 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:40.000 UTC",
#     "not  after"         : "2024-01-24 07:26:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 55 85 8E A7 8F C1 40   60 F5 AF 54 84 7D 0A 35  .U.....@`..T...5
#         0010: D1 CE 3C 91                                        ..<.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:05.302 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 DB 3C DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:32.000 UTC",
#     "not  after"         : "2024-01-24 07:26:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:05.317 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:05.642 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:05.644 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:05.644 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:05.644 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:05.797 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.798 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:05.799 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:05.800 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.805 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.817 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:05.820 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2E 8E 6E FD A3 E2 39 2F 59 41 EE C0 67 21 D4 F3 F8 C0 49 49 B0 0D 80 C4 8E ED 70 3D 5C 1B DD B5",
#   "session id"          : "AE 78 9C 0A EF 32 F3 7A F3 83 8D 85 90 C3 83 70 E3 46 6A 23 CF 1F F3 97 9F 6E C8 F6 09 4B 68 8B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 03 64 17 C3 B3 B3 FB F0   D7 57 BE 15 60 67 21 E9  .d.......W..`g!.
#             0010: 30 06 5C DB 05 0A A8 5B   E7 DE 69 C8 BF 27 D7 39  0.\....[..i..'.9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.922 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F5 48 7D 1F 18 2D 49 A2 28 3F 37 46 27 21 E5 4F 54 83 AF 66 33 58 74 1D 13 B4 09 D9 25 5E EE C0",
#   "session id"          : "AE 78 9C 0A EF 32 F3 7A F3 83 8D 85 90 C3 83 70 E3 46 6A 23 CF 1F F3 97 9F 6E C8 F6 09 4B 68 8B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7E 6B E7 D2 7E BA 06 CC   08 0C C8 08 4E E8 05 CC  .k..........N...
#           0010: 5A E7 88 03 3A 71 DD 07   7A DA 8A B6 95 C7 07 0F  Z...:q..z.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.922 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.922 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.925 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.927 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.937 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.939 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.940 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.943 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.944 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.944 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.944 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.944 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:05.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:05.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.947 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.947 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.947 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.948 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.949 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.950 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:05.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.954 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 AD 71 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:37.000 UTC",
#       "not  after"         : "2024-01-24 07:26:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 86 DA F6 28 72 B3 C5   A7 9B A9 AF 15 7C 6C 72  ....(r........lr
#           0010: 17 7D A7 25                                        ...%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:05.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.034 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.038 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 09 6D 5D 1A EE 39 5B   09 5B 70 41 D3 82 8B 36  f.m]..9[.[pA...6
#     0010: 7F 0A E6 4A 3B FA 07 8E   58 6E 32 38 79 F9 65 87  ...J;...Xn28y.e.
#     0020: 65 16 AE A4 80 36 9D A8   A3 BB 87 BF F7 A2 5D CB  e....6........].
#     0030: 19 B4 DA B4 82 CD 25 57   14 8B F3 23 CF 3D 4B 53  ......%W...#.=KS
#     0040: 0F 77 23 6D BA BE 32 B9   5C 3B 06 27 DF 33 B6 06  .w#m..2.\;.'.3..
#     0050: 0F 79 B0 0A 2B E0 A6 A3   18 78 2D E0 AB FD 31 0B  .y..+....x-...1.
#     0060: 13 55 66 D2 AD 45 A6 20   C4 B6 01 E9 73 C1 52 28  .Uf..E. ....s.R(
#     0070: B1 29 78 94 3C 21 1E 43   83 9B D4 6E 04 C2 89 7F  .)x.<!.C...n....
#     0080: A3 0E CD 1F FC C9 B2 8D   5D 6B CA 87 E2 73 B1 AF  ........]k...s..
#     0090: B7 CC 97 18 93 33 89 52   29 42 4D 31 4F 0A F4 85  .....3.R)BM1O...
#     00A0: EF C7 D0 C6 8D 02 CC EA   54 42 73 3F 90 49 21 23  ........TBs?.I!#
#     00B0: D4 AC A1 62 43 EF 2A 13   53 14 0C DE 81 74 80 3F  ...bC.*.S....t.?
#     00C0: 4D A4 F1 B2 46 F9 FD 69   12 22 EF 50 2B 20 1D E5  M...F..i.".P+ ..
#     00D0: 2C 19 71 E5 DC 2C C9 17   60 AE A7 5B C0 E7 75 5B  ,.q..,..`..[..u[
#     00E0: 34 7F B8 09 2E 66 1A 15   A9 F6 28 D0 69 B6 10 64  4....f....(.i..d
#     00F0: 8D DF C7 1D 56 21 6B 32   18 F0 CB DF 6F C2 31 5C  ....V!k2....o.1\
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.040 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A8 95 A0 28 9E 44 33 0F   EE A3 E2 21 CA 4A 86 73  ...(.D3....!.J.s
#     0010: 13 1E E5 E0 AE 46 B4 CF   CA BD 0F A5 99 ED D2 93  .....F..........
#     0020: 14 71 F6 25 E3 A8 0D DB   DB CE 3A 86 F1 00 0E 0B  .q.%......:.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.042 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:06.043 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:06.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:06.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:06.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:06.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:06.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.045 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.047 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 43 92 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:40.000 UTC",
#       "not  after"         : "2024-01-24 07:26:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 55 85 8E A7 8F C1 40   60 F5 AF 54 84 7D 0A 35  .U.....@`..T...5
#           0010: D1 CE 3C 91                                        ..<.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 3F 1E BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:34.000 UTC",
#       "not  after"         : "2024-01-24 07:26:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#           0010: E1 60 24 2A                                        .`$*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.073 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F B6 05 3C DF B4 21 C8   41 45 5E B4 B2 24 84 6D  ...<..!.AE^..$.m
#     0010: 51 72 B7 8F B8 12 F8 37   76 3C 3A 24 C7 2E 6F F1  Qr.....7v<:$..o.
#     0020: BE AB D3 10 18 B2 98 90   FD 67 E9 CA D9 FC CD 35  .........g.....5
#     0030: 15 B9 64 1C DE E6 5C CF   47 15 B1 29 08 36 44 94  ..d...\.G..).6D.
#     0040: DB 2C A6 85 AA 94 98 5E   D7 3C 2E 3F A6 0B CC 3A  .,.....^.<.?...:
#     0050: 1E 38 B7 DE D7 09 5B BA   BA 57 3E 91 34 D1 B2 5F  .8....[..W>.4.._
#     0060: 81 DF 28 1B B4 23 DF 2F   1E FC C4 67 B7 AE 71 26  ..(..#./...g..q&
#     0070: A6 59 3D 9D 4B 98 44 34   07 4B B3 CB 04 7B 54 93  .Y=.K.D4.K....T.
#     0080: 21 33 4F FC D3 6B 22 A3   2D 96 8E 32 48 49 7A BC  !3O..k".-..2HIz.
#     0090: 71 7D F4 D3 1B A2 02 FA   61 7B 0B 86 2D E2 DF 8C  q.......a...-...
#     00A0: 9F 93 C6 5F 73 2A 5E 5C   49 74 01 A3 E5 9A 03 00  ..._s*^\It......
#     00B0: 68 3E 33 6D 3B 05 EF 2A   E7 9E 5F C9 13 D3 18 F1  h>3m;..*.._.....
#     00C0: 4C 02 7E 65 AC 18 93 F2   CB 1A AD 45 FC C4 E4 1D  L..e.......E....
#     00D0: EE D4 8A 0C 9B 1A C0 83   55 5F 68 E1 3B 9E 28 9F  ........U_h.;.(.
#     00E0: F3 62 DC 97 21 5C F5 61   AB BA DE 19 EE 5A 38 FD  .b..!\.a.....Z8.
#     00F0: 74 01 34 0C A2 83 57 5D   D6 4E 60 8B 44 26 EC 1F  t.4...W].N`.D&..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.074 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 DF CB 90 1F 90 0E 01   7E F6 30 EA F9 71 8F EA  ".........0..q..
#     0010: A5 5C DE DD A5 14 1C 15   F1 6A 93 4B 89 C7 53 7E  .\.......j.K..S.
#     0020: 66 75 D9 BA 07 36 64 89   00 C6 A6 83 BB 8B 96 55  fu...6d........U
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.074 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:06.136 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "11 A2 F2 33 7C 98 A5 8B 7E B7 C3 B6 BF 90 EE 36 2B 58 FC 67 F1 73 69 F8 99 9A C0 EB 77 1A EC 37",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 07:27:06.412 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 07:27:06.413 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 07:27:07.361; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 07:27:07.367; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 07:27:07.725; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 07:27:07.728; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 07:27:07.728; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-G4Ff8P/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:07.759 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 43 92 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:40.000 UTC",
#     "not  after"         : "2024-01-24 07:26:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 55 85 8E A7 8F C1 40   60 F5 AF 54 84 7D 0A 35  .U.....@`..T...5
#         0010: D1 CE 3C 91                                        ..<.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:07.764 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 DB 3C DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:32.000 UTC",
#     "not  after"         : "2024-01-24 07:26:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:07.778 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:07.862 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:07.866 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:07.866 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:27:07.866 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:08.001 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:08.003 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:08.004 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.021 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:08.023 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "01 67 B6 4E 2D 95 4C F4 8F 3D DC CA 20 81 6E FF 7C 8A F4 15 7D 8C 3D 2A EE 63 A0 6D 92 87 23 7E",
#   "session id"          : "34 9C F5 51 DC CA 41 C9 5F 6B 3F FC F2 FD 81 D3 7F A9 EA CA B7 CA A6 B7 F7 A8 82 8B 42 BB 55 0B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 19 3E F4 19 14 42 41 8B   B9 2D 13 36 C4 27 CD FF  .>...BA..-.6.'..
#             0010: 2B F1 E3 38 D5 66 F8 CA   8F 57 F5 00 7D CA 6E 73  +..8.f...W....ns
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.116 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A2 08 79 3C AC 48 C4 F8 11 30 84 E1 4D A5 88 39 39 57 B3 5C CE BA B2 D3 F7 A3 B1 6D 4B 84 F0 FD",
#   "session id"          : "34 9C F5 51 DC CA 41 C9 5F 6B 3F FC F2 FD 81 D3 7F A9 EA CA B7 CA A6 B7 F7 A8 82 8B 42 BB 55 0B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 83 E7 E7 1A D6 E9 0F D9   5F AA 3E 0F 87 77 AE E7  ........_.>..w..
#           0010: 95 5B 83 13 27 B6 85 93   74 50 C2 6C 49 2B 0E 4C  .[..'...tP.lI+.L
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.116 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.116 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.119 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.121 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.122 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.122 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.131 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.132 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.133 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.137 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.137 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.137 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.137 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.138 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.140 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.140 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.140 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.141 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.141 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.142 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.145 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 AD 71 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:37.000 UTC",
#       "not  after"         : "2024-01-24 07:26:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 86 DA F6 28 72 B3 C5   A7 9B A9 AF 15 7C 6C 72  ....(r........lr
#           0010: 17 7D A7 25                                        ...%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.145 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.224 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 3F 1E BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 07:26:34.000 UTC",
#     "not  after"         : "2024-01-24 07:26:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#         0010: E1 60 24 2A                                        .`$*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#         0010: 05 FD 11 87                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.228 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9C 0C 45 FD 4E 37 21 B8   4B 5C 9D 3A E3 57 BC 3A  ..E.N7!.K\.:.W.:
#     0010: B5 A1 9B 26 4B 6B BF 06   2A 42 65 B1 6B 04 A2 84  ...&Kk..*Be.k...
#     0020: B8 28 38 F6 23 61 76 A8   96 35 4A 1C 92 B4 79 66  .(8.#av..5J...yf
#     0030: 7C 01 0E 93 12 F3 90 85   1F 92 BB 4E 5F 4E A8 CD  ...........N_N..
#     0040: 0E EC A5 92 6B 4C 98 54   38 FE F3 2B 15 33 B2 85  ....kL.T8..+.3..
#     0050: C8 18 E6 C2 13 EC 91 50   21 8E 2E 58 96 20 D2 8C  .......P!..X. ..
#     0060: E5 A7 A4 2E 79 58 23 83   3D 61 F3 9F 80 F8 D2 E3  ....yX#.=a......
#     0070: D5 26 AE 58 D7 24 26 2A   A4 8E 95 59 7C DF 49 00  .&.X.$&*...Y..I.
#     0080: 45 A9 72 1C 9D 5C 4A CF   A7 3E EB 14 02 86 D3 D3  E.r..\J..>......
#     0090: DC 3D C5 1D F1 1F 4D EE   96 39 3C 80 5F 34 2D 20  .=....M..9<._4-
#     00A0: 83 64 54 39 47 17 A0 7A   C3 F5 7B 00 BA 7A ED 91  .dT9G..z.....z..
#     00B0: 3E 46 4A 5A AD C9 DC 92   34 13 00 2D 9B 74 51 B9  >FJZ....4..-.tQ.
#     00C0: B4 A5 B7 E1 93 D2 11 DE   33 08 80 A4 5F D8 48 C5  ........3..._.H.
#     00D0: 9B 3F 03 1B F6 89 7C 92   4E 3A 61 43 61 A2 BC CA  .?......N:aCa...
#     00E0: BA 31 BE 66 80 EF 64 3D   F0 18 66 17 25 8E C8 13  .1.f..d=..f.%...
#     00F0: 72 E9 3C E8 90 45 C4 97   38 47 1F 37 3E 9D E7 B7  r.<..E..8G.7>...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.230 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 9E 44 D1 48 32 9D 3A   0F 90 4C 4C A1 BB C3 B2  ..D.H2.:..LL....
#     0010: 6C E6 2D 83 3A F4 E9 05   B9 4A ED F0 F8 06 EA EE  l.-.:....J......
#     0020: AB AB 02 83 70 D5 FE 79   E9 BD 3F FE A9 77 FB 1B  ....p..y..?..w..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:08.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.233 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:08.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.234 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 07:27:08.234 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:08.234 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.234 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.237 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 43 92 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:40.000 UTC",
#       "not  after"         : "2024-01-24 07:26:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 55 85 8E A7 8F C1 40   60 F5 AF 54 84 7D 0A 35  .U.....@`..T...5
#           0010: D1 CE 3C 91                                        ..<.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 3F 1E BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:34.000 UTC",
#       "not  after"         : "2024-01-24 07:26:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#           0010: E1 60 24 2A                                        .`$*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.264 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 53 ED 60 9E B0 9C 4F   1C 19 94 0E 1F 25 4B A8  .S.`...O.....%K.
#     0010: 09 7A 29 CE 36 9D C5 17   FC B8 E4 F6 F5 2C C9 AA  .z).6........,..
#     0020: 14 AF 3B F6 C7 60 1D 0D   3F 84 B1 51 31 64 3C 59  ..;..`..?..Q1d<Y
#     0030: EA 0D 4E B8 C2 A1 61 F7   8A 06 70 B4 FD 6C CC 0D  ..N...a...p..l..
#     0040: 32 81 9E 4A 7F 89 F8 AA   8E 1A E7 FF CA 75 08 61  2..J.........u.a
#     0050: 80 2D AF AC 12 A6 46 AA   1D 06 56 C1 32 0E 68 E0  .-....F...V.2.h.
#     0060: 88 5D E0 1C 56 E7 56 E5   F3 B0 73 58 6D 62 3C EB  .]..V.V...sXmb<.
#     0070: 9B 5C 5A 44 9C 1B F6 8F   35 45 BA 53 8F 50 E4 5E  .\ZD....5E.S.P.^
#     0080: FF 15 36 3B 4A A4 EA 6B   D5 96 C3 8D 12 FA 82 76  ..6;J..k.......v
#     0090: 05 AE 50 FD 93 62 4D 84   19 4A 85 89 B3 56 52 F2  ..P..bM..J...VR.
#     00A0: 11 00 FE 03 E9 81 79 C3   6F A3 97 78 33 CE C1 7C  ......y.o..x3...
#     00B0: AE 9A 75 D1 A9 FC 1C 02   CC 81 F0 94 1B 97 D5 88  ..u.............
#     00C0: 81 F1 DD 2A DC 17 88 98   A7 B3 00 01 BE 53 63 8D  ...*.........Sc.
#     00D0: 3B E5 FC 3E 3D D6 E3 40   FC 50 A1 98 CD 83 BC D7  ;..>=..@.P......
#     00E0: 77 23 84 B3 CE AC 66 AE   97 38 25 94 72 C7 2E BE  w#....f..8%.r...
#     00F0: 36 A5 F6 AC 36 4E A3 7C   A1 1D 91 2B BE 04 CA 27  6...6N.....+...'
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.265 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7A 86 94 71 D0 27 3B FA   BF 21 FF B0 35 FA A7 A7  z..q.';..!..5...
#     0010: DD 8E 31 ED 20 5F 25 43   C1 DC F4 EF 22 97 79 F8  ..1. _%C....".y.
#     0020: AB 82 5A 9D AB 58 FD CB   2E 43 C3 28 FF CF 9C 47  ..Z..X...C.(...G
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.266 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:08.320 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 9E 54 21 CE 9A 04 6A CE 76 62 3B B4 C0 E2 1C 11 5E 32 9C 69 FA 88 98 D6 EE B6 1B D5 5E 26 AA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 07:27:08.621 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 07:27:08.623 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 07:27:19.799; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:20.106 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 3F 1E BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:34.000 UTC",
#       "not  after"         : "2024-01-24 07:26:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#           0010: E1 60 24 2A                                        .`$*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 0C A2 6F 69 BD 71 0E   53 08 B4 C4 FA 0F 8E B6  ...oi.q.S.......
#           0010: 05 FD 11 87                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 DB 3C DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 07:26:32.000 UTC",
#       "not  after"         : "2024-01-24 07:26:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F D7 91 03 AF 01 30 03   1D 48 B8 F1 FF 16 15 66  /.....0..H.....f
#           0010: E1 60 24 2A                                        .`$*
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 07:27:20.121 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:20.344 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.344 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:20.346 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 07:27:20.346 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.363 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.363 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.363 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 07:27:20.365 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "76 A9 D9 6B 5B C8 9A BB 81 8E E7 49 C3 A3 0A E0 4C 04 93 93 F8 5E 25 AC 08 89 69 07 14 5D 27 AB",
#     "session id"          : "40 C9 84 93 9D 40 F3 9A 1A B0 91 FB DA 96 A8 CA 88 94 66 E9 41 9E 19 A7 9D C4 45 E1 23 7C F5 0A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 32 8D F2 3E 4F 3C 89 78   94 DC 40 B7 5D 77 ED F1  2..>O<.x..@.]w..
#               0010: 3C AC 13 F8 AD FF B2 F9   41 49 2C 78 03 E4 08 21  <.......AI,x...!
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.383 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F0 2D 83 BA 88 5D 5D 77 93 42 70 D5 BB A8 FB FE D4 FB E4 D8 68 D1 4D 69 13 34 6B 9F 5A DB 32 09",
#     "session id"          : "40 C9 84 93 9D 40 F3 9A 1A B0 91 FB DA 96 A8 CA 88 94 66 E9 41 9E 19 A7 9D C4 45 E1 23 7C F5 0A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: AA 55 B2 D8 6D 14 0E 23   A3 C7 5D 80 FA EF 6B AF  .U..m..#..]...k.
#             0010: D4 6D 7B 3B 3A 67 B3 6F   D1 CF B6 52 BE 9F CF 3A  .m.;:g.o...R...:
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.384 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.384 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.386 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.388 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.398 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.399 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.401 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.404 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:27:20.405 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 07:27:20.407 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certif

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 07:28:40.855 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:28:40.897 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:28:40.897 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:28:40.897 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 07:28:40.897 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34054/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28738ms
ok 65 stop command for single port in 31708ms
ok 66 status detects locally running solr in 14696ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2180ms
ok 69 copying files around in 6617ms
ok 70 upconfig in 2601ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 31s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m54s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5737 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5737/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40389/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 03:19:25.220; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 03:19:25.226; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 03:19:26.102; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 03:19:26.142; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22275ms
ok 61 start solr with client truststore and security manager in 24904ms
not ok 62 start solr with mTLS needed in 58291ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-qlokfv/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40389.
#
# Started Solr server on port 40389 (pid=201565). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40390.
#
# Started Solr server on port 40390 (pid=202018). Happy searching!
#
# INFO  - 2023-10-26 03:20:48.299; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 03:20:48.305; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 03:20:48.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 03:20:48.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 03:20:48.667; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:48.698 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D DA 8D 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:24.000 UTC",
#     "not  after"         : "2024-01-24 03:20:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 56 33 CC FA 7A 70 B3   15 A7 A1 8B A7 3E E1 85  .V3..zp......>..
#         0010: 3E 55 B7 CD                                        >U..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:48.702 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 FF CA 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:16.000 UTC",
#     "not  after"         : "2024-01-24 03:20:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:48.716 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:48.944 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.944 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:48.946 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:48.946 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.952 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.964 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.964 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.964 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:48.967 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED B6 B8 09 53 42 04 58 45 56 BC 67 60 8E B4 0F 53 92 84 F7 C7 5A 13 64 C9 C8 4F 67 50 36 ED F7",
#   "session id"          : "6C 97 9B 70 30 95 CA 7E B0 46 59 B5 32 D0 47 7B 4A E1 2C 9A 23 6C 34 F1 A1 44 FA 33 E7 62 BA 6F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC A8 62 EE 85 37 AB 92   34 E5 C7 A5 B4 DE B3 02  ..b..7..4.......
#             0010: 0E 26 B6 55 09 63 99 50   1D 50 E3 00 44 0B 63 24  .&.U.c.P.P..D.c$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.078 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C0 4B 3B 6E 3A EB 80 B9 E2 A1 ED ED D4 32 50 44 E3 3D 6E 1A 18 57 18 10 5D 02 95 AE 52 D7 65 91",
#   "session id"          : "6C 97 9B 70 30 95 CA 7E B0 46 59 B5 32 D0 47 7B 4A E1 2C 9A 23 6C 34 F1 A1 44 FA 33 E7 62 BA 6F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3C 9E 68 31 64 44 33 71   34 F0 D8 0C 08 6E 5F E7  <.h1dD3q4....n_.
#           0010: 51 8B 49 C7 65 A0 09 D2   AD D6 31 A0 85 4B 28 38  Q.I.e.....1..K(8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.078 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.079 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.081 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.083 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.083 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.084 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.085 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.093 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.095 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.096 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.100 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.100 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.100 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.100 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.100 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.102 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.104 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.105 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.106 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.106 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.109 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 0D 2E CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:20.000 UTC",
#       "not  after"         : "2024-01-24 03:20:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 5F F9 84 7C 5A 92 A0   86 B8 C6 4A E3 2A 59 2B  ._...Z.....J.*Y+
#           0010: FB 7B B8 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.109 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:49.164 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:49.164 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:49.165 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:49.165 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.194 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.198 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 75 95 74 75 F6 65 67   ED 1D 9E A7 36 25 46 80  )u.tu.eg....6%F.
#     0010: B9 54 71 C9 88 41 80 2F   F7 F4 AF A1 13 E6 C9 29  .Tq..A./.......)
#     0020: 24 4A 70 17 A8 50 7E 1C   87 E0 32 8D 50 BB 59 04  $Jp..P....2.P.Y.
#     0030: 48 4C 96 27 D3 87 54 D2   E6 7F 96 C4 5D 30 02 09  HL.'..T.....]0..
#     0040: 68 E6 DF 65 23 47 14 E0   46 76 19 53 B7 FE BB 6D  h..e#G..Fv.S...m
#     0050: C9 FC FF 5C 3C 0E C6 DA   BA 1D DD 59 A0 F8 71 21  ...\<......Y..q!
#     0060: FE 26 D6 1F 44 D0 CB 68   78 4A 33 2E 07 AC 10 E6  .&..D..hxJ3.....
#     0070: 0E 11 47 FD 51 1C 12 54   16 6B FC D8 97 46 63 EF  ..G.Q..T.k...Fc.
#     0080: F6 88 2A B9 C1 15 C1 CA   AB A9 40 00 FE 3A 1C 38  ..*.......@..:.8
#     0090: AF C6 C9 2C 6E 46 4F 45   51 30 12 89 59 E8 1B F5  ...,nFOEQ0..Y...
#     00A0: 19 AF 2C 53 54 74 0F F5   83 A7 CE 7A 56 5A D7 F8  ..,STt.....zVZ..
#     00B0: BA BF E3 18 2B 4C 9A 7E   7D A2 B7 19 B2 44 87 43  ....+L.......D.C
#     00C0: 7F CF 99 82 51 37 76 E4   43 08 6F EA C6 32 34 94  ....Q7v.C.o..24.
#     00D0: A1 91 DC 67 ED 0E 76 40   28 3B 7F 99 29 F9 1E 45  ...g..v@(;..)..E
#     00E0: 44 BB 59 CF 98 A4 7A 59   C3 D7 61 64 29 CE 88 A2  D.Y...zY..ad)...
#     00F0: 7D 78 D0 9F 2A 50 AF 47   3D E4 D2 16 0A 32 17 6E  .x..*P.G=....2.n
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.200 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B9 F5 C4 EF 49 E7 F1 AD   F5 62 77 E5 D0 82 2F EE  ....I....bw.../.
#     0010: AB 62 88 3F 88 21 DC 5E   19 4C 93 E7 61 0B 1C 97  .b.?.!.^.L..a...
#     0020: C7 B4 80 4C 1D F6 E5 0B   2D 7A 54 29 57 F2 40 40  ...L....-zT)W.@@
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.203 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:49.204 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.205 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:49.205 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.205 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:49.205 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:49.205 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.206 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.209 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D DA 8D 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:24.000 UTC",
#       "not  after"         : "2024-01-24 03:20:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 56 33 CC FA 7A 70 B3   15 A7 A1 8B A7 3E E1 85  .V3..zp......>..
#           0010: 3E 55 B7 CD                                        >U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2F 62 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:18.000 UTC",
#       "not  after"         : "2024-01-24 03:20:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#           0010: 7D 17 89 F0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.236 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 82 63 57 84 5F EA 08 7D   94 F7 20 9A FB 12 22 67  .cW._..... ..."g
#     0010: 38 D9 F2 FE 1E 7D 73 8A   07 C2 49 55 44 AF C2 B0  8.....s...IUD...
#     0020: 64 44 E1 8A 6F E2 7A 7B   74 9C 37 0B 5A FE C0 59  dD..o.z.t.7.Z..Y
#     0030: 79 26 9C A1 46 0B C2 07   AC F2 74 1F DB A5 EE 3A  y&..F.....t....:
#     0040: B3 AA CC E1 16 39 B2 2A   F4 C4 09 2B 7F 62 2D DC  .....9.*...+.b-.
#     0050: 91 F5 AE 7D C6 2F 90 EF   A2 BF 70 D1 21 D7 F5 56  ...../....p.!..V
#     0060: EE 41 5D 97 08 B5 EE D7   64 8B 7B 9E 3A C8 DA F9  .A].....d...:...
#     0070: E8 2A E5 E9 57 DB 4E D1   ED 72 AA E5 B7 78 59 F6  .*..W.N..r...xY.
#     0080: 85 24 33 17 6F 0A F4 8A   32 8B F0 6C 57 E5 55 B8  .$3.o...2..lW.U.
#     0090: 2A FB 65 73 90 2F FC 9F   A5 69 E9 83 58 CA 14 61  *.es./...i..X..a
#     00A0: F6 B7 FA 5D BC 97 EF CB   93 CD 4B BD 0C CA B0 B1  ...]......K.....
#     00B0: EF D3 F0 CA EA 34 46 FD   EA 5D 73 5D 97 B7 52 A0  .....4F..]s]..R.
#     00C0: FF BA 20 0D DB 15 5A 57   B8 F3 C0 A3 26 20 E2 21  .. ...ZW....& .!
#     00D0: 57 E0 E8 60 04 2A 89 A3   5E E1 B5 67 A4 3F 4D FC  W..`.*..^..g.?M.
#     00E0: F0 96 B3 BC AE 01 78 DE   B1 85 CA 74 91 8C 34 F5  ......x....t..4.
#     00F0: 83 C5 24 06 8A B4 27 80   2B 06 B5 40 9E AB 86 2F  ..$...'.+..@.../
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.237 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D6 21 E2 2E 70 7F 29 22   99 75 7D C5 42 7E 3D 51  .!..p.)".u..B.=Q
#     0010: 0A 1B F8 B4 AE 0E E7 B2   ED 2B 99 80 A5 70 3C DE  .........+...p<.
#     0020: 58 A4 8C F0 90 24 10 3B   60 22 50 72 CE F9 C9 38  X....$.;`"Pr...8
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.238 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:49.296 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "38 D9 72 0D 3C 98 32 5F 0D D3 22 A4 38 D2 92 AB AE F9 A1 FB 04 85 A8 72 3C B0 1A 11 55 3A 21 2A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 03:20:49.575 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 03:20:49.576 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 03:20:50.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 03:20:50.515; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 03:20:50.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 03:20:50.877; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 03:20:50.878; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-qlokfv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:50.909 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D DA 8D 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:24.000 UTC",
#     "not  after"         : "2024-01-24 03:20:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 56 33 CC FA 7A 70 B3   15 A7 A1 8B A7 3E E1 85  .V3..zp......>..
#         0010: 3E 55 B7 CD                                        >U..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:50.914 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 FF CA 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:16.000 UTC",
#     "not  after"         : "2024-01-24 03:20:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 03:20:50.928 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:51.016 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:51.022 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:51.022 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:20:51.023 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:51.159 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.160 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:51.161 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:20:51.162 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.167 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.179 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.179 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:20:51.181 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 94 7B D7 5C 40 47 A4 F3 25 10 C8 00 7D 02 C7 8B 60 9C CD 93 82 F5 00 0C 9E F4 4D E3 16 C2 C3",
#   "session id"          : "78 BB 1C 78 61 51 76 3A A7 09 F7 8D 0B F4 F6 D6 8D 30 12 8F 07 50 3D B7 CC D1 DD C4 E2 78 2F BE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E5 AC 14 6E 94 0F 23 DA   43 36 BE E4 E7 1A 1E AA  ...n..#.C6......
#             0010: 64 8B 49 02 08 89 69 DD   05 EF 08 68 A1 1D 7E 1C  d.I...i....h....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.274 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "45 30 CC 89 AA AA DB 0C 11 D9 D5 E9 24 E3 8B 82 D3 CE FD B9 64 0B AE 67 DC D9 78 A8 E2 DC D8 3E",
#   "session id"          : "78 BB 1C 78 61 51 76 3A A7 09 F7 8D 0B F4 F6 D6 8D 30 12 8F 07 50 3D B7 CC D1 DD C4 E2 78 2F BE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FF F7 99 D9 5F AE 39 BE   70 DA CB 9A 7C 43 89 29  ...._.9.p....C.)
#           0010: 13 13 63 8B A7 3D 55 47   BB C8 BA 85 39 7A 66 7E  ..c..=UG....9zf.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.274 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.275 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.277 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.277 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.279 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.279 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.279 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.281 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.281 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.281 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.281 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.290 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.292 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.293 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.297 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.297 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.297 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.298 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.300 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.300 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.301 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.301 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.302 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.303 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.307 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 0D 2E CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:20.000 UTC",
#       "not  after"         : "2024-01-24 03:20:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 5F F9 84 7C 5A 92 A0   86 B8 C6 4A E3 2A 59 2B  ._...Z.....J.*Y+
#           0010: FB 7B B8 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.308 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.394 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2F 62 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 03:20:18.000 UTC",
#     "not  after"         : "2024-01-24 03:20:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#         0010: 7D 17 89 F0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#         0010: 28 D2 A0 36                                        (..6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.398 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B2 48 6E E0 B9 AA 86 0B   C7 BE 4F 1C 5D 08 1E 89  .Hn.......O.]...
#     0010: 91 87 07 E5 C6 4A B6 75   FB 54 3E E4 C6 6D D9 F9  .....J.u.T>..m..
#     0020: 16 A8 32 BE CC 36 E2 04   FF 7E 05 2C 80 F4 8C 97  ..2..6.....,....
#     0030: 2A 7E F0 4A 0D CF 38 AE   1F 78 B6 2C 4D 16 36 DA  *..J..8..x.,M.6.
#     0040: 11 87 D2 E9 D7 A8 DC 91   C5 4E 29 D0 0E 47 56 8B  .........N)..GV.
#     0050: 06 4D 21 0A 16 53 C5 6F   B3 0B 70 8B FB D5 F0 1F  .M!..S.o..p.....
#     0060: F2 95 36 1D DC C0 B1 DC   F2 ED 4E 0E 30 6C 54 57  ..6.......N.0lTW
#     0070: F5 3C 22 EB EF 0C 51 17   06 E7 6F 39 CE AB A4 6C  .<"...Q...o9...l
#     0080: 29 5B DC 60 64 66 18 58   84 CC 1D E2 B3 28 CC FC  )[.`df.X.....(..
#     0090: 79 2B D9 7C AA 09 86 F2   36 49 2D 98 67 B3 3C 19  y+......6I-.g.<.
#     00A0: 1B 37 D7 8E 07 8C DE B4   0B 20 3D F3 B5 8E A2 62  .7....... =....b
#     00B0: E0 CF 77 8B 30 71 97 F4   81 B3 F4 57 A5 A8 B8 89  ..w.0q.....W....
#     00C0: 5C 65 5F 4F ED 8D D7 98   9C 1B 19 E7 C1 F1 6F E2  \e_O..........o.
#     00D0: 28 A6 57 D3 BA 57 C7 52   75 92 96 80 73 98 1C E7  (.W..W.Ru...s...
#     00E0: B6 47 87 B1 06 FF CB C4   A2 A8 80 47 FA E4 6B 14  .G.........G..k.
#     00F0: 71 91 33 EF AC 14 DC EB   73 25 35 AF 3F 6E F0 63  q.3.....s%5.?n.c
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.400 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 53 E5 19 8E 68 72 5A 81   55 28 17 DD A4 AD 54 62  S...hrZ.U(....Tb
#     0010: 75 E7 FC 69 C5 47 3D 10   43 40 D8 77 FE 6C B0 77  u..i.G=.C@.w.l.w
#     0020: 1C A5 F5 5D DD D4 BF 6E   66 F0 F9 D7 CF D4 F0 26  ...]...nf......&
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.403 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:51.404 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.404 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:51.404 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.404 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 03:20:51.405 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:20:51.405 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.405 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.408 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D DA 8D 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:24.000 UTC",
#       "not  after"         : "2024-01-24 03:20:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 56 33 CC FA 7A 70 B3   15 A7 A1 8B A7 3E E1 85  .V3..zp......>..
#           0010: 3E 55 B7 CD                                        >U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2F 62 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:18.000 UTC",
#       "not  after"         : "2024-01-24 03:20:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#           0010: 7D 17 89 F0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.444 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 21 FD 1F 5A 84 7B FE 7C   BA CA A6 30 5F 5F 10 41  !..Z.......0__.A
#     0010: 91 A9 BF E0 C8 9D 5E 58   34 5A 82 5A 8B 1B 72 BA  ......^X4Z.Z..r.
#     0020: 8E 4E 29 B6 31 EB 1A 88   35 D7 B4 AD 66 A8 37 5E  .N).1...5...f.7^
#     0030: 45 B1 28 DF 95 2D EC 74   1B A2 15 5E EC E6 B4 36  E.(..-.t...^...6
#     0040: F7 6D FD 06 07 56 41 2A   F7 14 4C D8 60 85 E8 2D  .m...VA*..L.`..-
#     0050: F6 A3 65 72 6B 73 D6 87   89 7B 77 1B 14 03 7E 49  ..erks....w....I
#     0060: AA AF 55 72 78 5F D4 26   E6 D1 1F 01 E1 EB EC 5D  ..Urx_.&.......]
#     0070: FA 61 2C 54 74 D6 CA 77   BC 38 E5 8E 38 97 C6 6B  .a,Tt..w.8..8..k
#     0080: 93 CC 8B 67 DF 9F C3 69   9E 21 6C 13 94 52 0E 73  ...g...i.!l..R.s
#     0090: 98 E8 A7 68 35 5F BA 87   40 90 6F 19 4D C6 26 4D  ...h5_..@.o.M.&M
#     00A0: 23 C1 14 09 B1 F4 43 C5   9B BB E4 FE 37 CF 16 B9  #.....C.....7...
#     00B0: D3 3B 12 42 10 58 0E CD   3A 56 1E 2D 83 DE DC AA  .;.B.X..:V.-....
#     00C0: EF 66 0B D7 01 14 CE 73   8C 59 11 0D A7 A1 72 D5  .f.....s.Y....r.
#     00D0: D5 CE 52 81 46 27 68 34   24 B4 31 AF 9A 58 8F 60  ..R.F'h4$.1..X.`
#     00E0: D0 FC A6 39 17 87 4E CE   21 77 BD 19 5D 13 EF FE  ...9..N.!w..]...
#     00F0: 7E 0C 5B 52 30 19 B3 1C   D0 A4 AE 56 D2 18 E8 DD  ..[R0......V....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.446 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E1 FA F5 A2 A0 0A 74 3D   9D E6 D3 72 EB 7A 0C 90  ......t=...r.z..
#     0010: 93 D5 5E C9 72 B5 A0 54   D9 E6 B1 B8 75 54 E5 B2  ..^.r..T....uT..
#     0020: E7 93 CF 1E 95 DC 35 69   9C 78 69 86 C1 F4 0E 6A  ......5i.xi....j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.446 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:20:51.505 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9C FB 83 D1 AF 4C A9 D0 E2 90 41 BB 74 D9 13 43 48 18 8D 61 FE 18 0D DA 85 4F C3 5A 7F 4B AD 34",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 03:20:51.776 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 03:20:51.777 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 03:21:02.683; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 03:21:03.021 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2F 62 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:18.000 UTC",
#       "not  after"         : "2024-01-24 03:20:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#           0010: 7D 17 89 F0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 AD 7B 41 98 31 F5 AD   01 BF 82 0A 29 22 1C 72  g..A.1......)".r
#           0010: 28 D2 A0 36                                        (..6
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 FF CA 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 03:20:16.000 UTC",
#       "not  after"         : "2024-01-24 03:20:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 11 F9 62 03 1D C8 51   2D FD E0 E4 0A 26 29 C8  N..b...Q-....&).
#           0010: 7D 17 89 F0                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 03:21:03.037 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:21:03.138 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:21:03.138 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:21:03.138 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:21:03.138 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:21:03.271 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.271 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:21:03.273 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 03:21:03.273 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.279 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.291 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.291 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.291 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 03:21:03.293 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "73 B8 EA 8D AA D5 91 99 3D 94 D9 69 91 E1 8D A3 56 B8 A8 B1 DA 64 B8 91 F2 27 36 26 4D 11 1B BE",
#     "session id"          : "97 9B 9D 69 B3 F8 53 43 91 08 0B 35 9A FE 03 EB F6 D1 09 65 E9 D0 BB F5 91 1D 32 7F 51 5F 01 DB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 8A 79 C5 71 A7 56 A2 FB   08 8C 51 7B 12 7A 72 B0  .y.q.V....Q..zr.
#               0010: A0 2B D7 1E 7C B9 21 93   17 4B FC AD 78 A3 BD 0B  .+....!..K..x...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.312 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "A4 A8 E2 21 A7 CC E1 D2 18 2C 9C 01 F1 4C 38 32 66 B1 6D E2 7F 9F 07 DA B7 29 5B BF 3F 8C B2 0B",
#     "session id"          : "97 9B 9D 69 B3 F8 53 43 91 08 0B 35 9A FE 03 EB F6 D1 09 65 E9 D0 BB F5 91 1D 32 7F 51 5F 01 DB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 39 00 3D E4 F7 89 E5   C4 29 AA AC AC 83 5A 85  m9.=.....)....Z.
#             0010: BF E7 C2 4F 32 D6 33 C5   0B B2 D3 69 07 12 B3 4C  ...O2.3....i...L
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.312 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.312 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.315 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.316 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.317 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.326 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.327 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.328 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.333 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:21:03.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 03:21:03.336 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 03:22:23.418 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:22:23.466 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:22:23.466 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:22:23.466 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 03:22:23.466 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40390/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28104ms
ok 65 stop command for single port in 31087ms
ok 66 status detects locally running solr in 14360ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2160ms
ok 69 copying files around in 6579ms
ok 70 upconfig in 2628ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1212ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m38s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5736 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5736/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40813/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-26 00:23:44.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 00:23:44.970; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-26 00:23:46.147; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 00:23:46.187; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22522ms
ok 61 start solr with client truststore and security manager in 25091ms
not ok 62 start solr with mTLS needed in 57119ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-REnJmL/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40813.
#
# Started Solr server on port 40813 (pid=197788). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40814.
#
# Started Solr server on port 40814 (pid=198209). Happy searching!
#
# INFO  - 2023-10-26 00:25:08.778; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 00:25:08.783; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 00:25:09.162; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 00:25:09.165; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 00:25:09.165; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:09.196 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 60 C6 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:44.000 UTC",
#     "not  after"         : "2024-01-24 24:24:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 3F 1E 7C F1 58 0E 19   A4 FB 12 E7 73 73 29 D8  N?...X......ss).
#         0010: D3 D9 37 18                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:09.201 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 ED 01 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:36.000 UTC",
#     "not  after"         : "2024-01-24 24:24:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:09.215 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:09.315 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:09.315 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:09.316 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:09.316 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:09.450 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.450 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:09.452 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:09.452 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.457 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.469 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:09.471 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E4 D1 9F CD B7 0E 5E 59 C9 AA 17 01 24 6A FE F6 34 2B 96 38 D1 ED C8 27 A8 B4 26 66 2C 37 65 D7",
#   "session id"          : "BE 39 A5 C0 15 F6 2C D5 BC B3 87 E1 E4 3A 31 D8 55 DE 13 C2 F1 6E 6F 15 4F 17 07 3F 96 B9 2C 30",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 99 37 52 4E 60 3A 03 B4   37 20 8A 28 E1 1A 3B FE  .7RN`:..7 .(..;.
#             0010: A0 42 69 0A 0B B3 D4 5C   B5 F6 97 0C 06 BA 85 2B  .Bi....\.......+
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.575 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AD A3 89 D7 B5 3C 86 B2 2A A3 27 96 34 C7 91 0F 66 05 69 90 23 51 08 10 39 DC 42 69 88 DA CF 56",
#   "session id"          : "BE 39 A5 C0 15 F6 2C D5 BC B3 87 E1 E4 3A 31 D8 55 DE 13 C2 F1 6E 6F 15 4F 17 07 3F 96 B9 2C 30",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3E A2 8E 5B B0 1E 44 B5   5A D8 56 B2 2D A4 86 FD  >..[..D.Z.V.-...
#           0010: 8A C9 77 93 15 1E 32 59   7F 5D 2B A1 F2 63 57 3A  ..w...2Y.]+..cW:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.575 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.576 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.578 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.580 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.580 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.589 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.591 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.592 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.596 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.599 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.599 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.600 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.601 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.604 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 C8 69 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:41.000 UTC",
#       "not  after"         : "2024-01-24 24:24:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 C5 D9 AB 07 EA BB F5   C8 4D A6 9B A7 AC 93 F8  %........M......
#           0010: B5 69 B7 82                                        .i..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.604 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.685 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.689 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 12 AE 07 CD 59 EA D8   06 C9 27 7E 80 38 E6 44  .....Y....'..8.D
#     0010: C7 95 7E AD 07 9A 65 04   16 0B 3B A1 08 FC D4 FA  ......e...;.....
#     0020: A1 D3 1D E6 77 68 8A A2   16 43 B8 F9 FE 4E 64 CE  ....wh...C...Nd.
#     0030: 8C 71 B2 8E 03 9C 5B E0   50 81 BC F9 22 39 CD 10  .q....[.P..."9..
#     0040: 8D 91 D0 74 32 DE F7 7D   26 07 20 E1 EB 89 7D E7  ...t2...&. .....
#     0050: 63 10 5C 0A 2E 59 A0 20   79 D8 36 98 D1 6A 05 BD  c.\..Y. y.6..j..
#     0060: D2 97 D6 53 1B FF 38 98   98 10 F4 3C B6 27 67 8B  ...S..8....<.'g.
#     0070: 3A B7 53 34 67 A4 70 C9   30 8D 41 C9 AE 7F BA CC  :.S4g.p.0.A.....
#     0080: B7 46 04 40 97 90 A3 A9   07 51 FD F7 7E BF CA C7  .F.@.....Q......
#     0090: 15 05 F3 0D F4 FC FA 72   A4 72 74 31 9E 7F 8B F8  .......r.rt1....
#     00A0: B4 8D 94 85 F5 34 20 25   F7 DB 48 4E 6F BC C6 47  .....4 %..HNo..G
#     00B0: AC 32 0A 2A 90 A7 CB 0B   A6 91 3C 64 37 C1 00 B7  .2.*......<d7...
#     00C0: C0 5F 52 A0 C0 B9 5D B4   9C 07 3E 18 FA 43 1F A8  ._R...]...>..C..
#     00D0: 5A 11 A8 74 1D 9A 34 BF   80 9D A6 34 C7 75 0E EA  Z..t..4....4.u..
#     00E0: 4D 8D C3 25 0A 7D CC 54   29 E0 D1 94 5D 09 97 B0  M..%...T)...]...
#     00F0: A1 21 41 ED 04 5B B0 32   8F 88 1C BA D4 BC 9A 1E  .!A..[.2........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.691 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FA A8 78 5E 5D 1C E5 04   28 37 5E FA 80 53 54 61  ..x^]...(7^..STa
#     0010: B9 95 5E C4 D8 D5 76 C1   0E BB 0F B7 DE D0 A2 31  ..^...v........1
#     0020: 06 B4 85 46 60 65 0F B8   2B FB 7E E2 DB AE 85 07  ...F`e..+.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.693 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:09.694 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.694 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:09.695 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.695 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:09.695 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:09.695 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.696 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.698 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 60 C6 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:44.000 UTC",
#       "not  after"         : "2024-01-24 24:24:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 3F 1E 7C F1 58 0E 19   A4 FB 12 E7 73 73 29 D8  N?...X......ss).
#           0010: D3 D9 37 18                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 2A ED D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:38.000 UTC",
#       "not  after"         : "2024-01-24 24:24:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#           0010: D0 6A EB B9                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.723 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 40 0F 9A 38 6E 8F DA   53 45 78 0B 68 0C E5 42  V@..8n..SEx.h..B
#     0010: A3 56 03 E4 37 99 C7 A6   83 57 16 B4 1F 19 03 C8  .V..7....W......
#     0020: DD 38 2A 10 F4 FC F4 36   66 E2 E9 68 FA 68 44 E4  .8*....6f..h.hD.
#     0030: 17 3B BE 25 51 37 77 13   EB BE C2 F0 87 C9 32 5B  .;.%Q7w.......2[
#     0040: 16 5C E5 74 A1 FC FB AF   AB 83 D4 F7 E2 75 52 86  .\.t.........uR.
#     0050: 73 73 B6 FD 66 8D E2 ED   B3 50 6B 3C 7A C5 FB 17  ss..f....Pk<z...
#     0060: 07 95 B7 48 D6 F9 8A 04   CA 31 F8 0F AA 58 67 F5  ...H.....1...Xg.
#     0070: 2B EB 12 85 91 EB FB E7   E0 9E FF 94 60 49 E2 68  +...........`I.h
#     0080: A9 F5 0A B7 D1 C8 77 20   61 87 5C AB C4 3E 93 99  ......w a.\..>..
#     0090: 03 C2 70 6C 06 39 07 B8   47 19 8E BD 8D F0 B2 AA  ..pl.9..G.......
#     00A0: 80 BE 3F BC 93 63 65 4C   E2 30 68 01 DD BE 63 5A  ..?..ceL.0h...cZ
#     00B0: C8 59 94 51 B1 5A 5F 23   19 8A E9 56 2B 28 B1 16  .Y.Q.Z_#...V+(..
#     00C0: DE A1 7C CF 06 18 0C DD   AE 22 72 73 87 35 56 74  ........."rs.5Vt
#     00D0: 71 33 8C E7 39 E1 D2 7A   EC 02 0C F3 09 2C 42 BC  q3..9..z.....,B.
#     00E0: 4A 67 AA A1 E6 9D FD F3   56 33 09 B7 39 98 F3 94  Jg......V3..9...
#     00F0: B8 34 DC 71 36 98 43 FA   60 5C 90 62 4C 0D F2 43  .4.q6.C.`\.bL..C
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.724 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6B CF A5 CD 12 6D AB 5D   DF 18 E2 AD 24 96 CA D2  k....m.]....$...
#     0010: 95 14 C8 3C 0C 80 2E 2D   97 B1 2F 44 F7 A3 7C DE  ...<...-../D....
#     0020: 0C 3B 73 60 08 1A 7C 93   E9 34 0B 6E C1 3E 99 2F  .;s`.....4.n.>./
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.725 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:09.779 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A0 62 42 65 1D A9 27 C5 8D CE 4E 9B D6 AB 92 E3 2D 34 1A 7F 74 01 8A 81 3E 22 EA 22 92 CD 24 9D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 24:25:10.058 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 24:25:10.059 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 00:25:11.003; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 00:25:11.008; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 00:25:11.358; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 00:25:11.361; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 00:25:11.362; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-REnJmL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:11.393 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 60 C6 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:44.000 UTC",
#     "not  after"         : "2024-01-24 24:24:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 3F 1E 7C F1 58 0E 19   A4 FB 12 E7 73 73 29 D8  N?...X......ss).
#         0010: D3 D9 37 18                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:11.398 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 ED 01 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:36.000 UTC",
#     "not  after"         : "2024-01-24 24:24:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:11.412 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:11.636 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.636 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:11.638 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:11.638 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.644 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.655 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:11.658 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "11 A5 8C F7 54 51 24 BB 3B 7D 7A 10 7D 6C 0F BC DD E8 BC A5 7D 03 F3 92 46 7D E1 70 81 8D 21 D9",
#   "session id"          : "0E D3 8C C3 85 9C 83 E4 2A DF AD B9 67 02 4C 47 8D B0 68 42 BD 13 0F 03 A1 98 28 AF AC 76 8A 6B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7B B8 6C F9 EB C5 04 8A   C7 5A 41 17 71 E1 F6 AD  ..l......ZA.q...
#             0010: BC 28 47 43 B8 7B 63 12   11 6B 6A 42 DF 7C E3 6B  .(GC..c..kjB...k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.754 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E8 93 D9 6A BB 9C FA E8 4C E2 41 F2 3C FC BC 4B 30 57 80 28 19 EB C4 46 E7 79 C3 DC 3E 6C CE B6",
#   "session id"          : "0E D3 8C C3 85 9C 83 E4 2A DF AD B9 67 02 4C 47 8D B0 68 42 BD 13 0F 03 A1 98 28 AF AC 76 8A 6B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 97 0F 08 C0 42 C8 AF 55   48 1C 5D A0 7C 64 99 EC  ....B..UH.]..d..
#           0010: 96 DA 54 B1 E3 31 8E 8F   AE CE 2C 2B 79 98 A0 12  ..T..1....,+y...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.755 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.755 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.758 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.760 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.760 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.769 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.771 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.772 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.776 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.776 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.776 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.776 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.777 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.777 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.777 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.779 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.779 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.779 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.779 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.780 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.781 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.781 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.784 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 C8 69 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:41.000 UTC",
#       "not  after"         : "2024-01-24 24:24:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 C5 D9 AB 07 EA BB F5   C8 4D A6 9B A7 AC 93 F8  %........M......
#           0010: B5 69 B7 82                                        .i..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.784 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:11.845 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:11.846 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:11.846 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:11.847 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.866 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 2A ED D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 24:24:38.000 UTC",
#     "not  after"         : "2024-01-24 24:24:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#         0010: D0 6A EB B9                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#         0010: 05 96 0B AA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.870 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 31 80 79 B2 67 85 9F 62   00 85 43 5E 78 E1 DD 5D  1.y.g..b..C^x..]
#     0010: 01 2F B0 51 56 33 C5 4D   16 FB 04 CA 53 03 9A C2  ./.QV3.M....S...
#     0020: 2D 46 9E C8 D9 3A 69 B1   22 09 11 0E 82 8E 1F 5C  -F...:i."......\
#     0030: 58 CC 4B 55 FC DC 87 73   E4 29 B1 DD 81 42 10 22  X.KU...s.)...B."
#     0040: E7 93 CB 67 FA 19 93 6E   63 20 ED FC 44 38 B8 56  ...g...nc ..D8.V
#     0050: 5F 47 5D 75 58 1E C8 76   71 9D A3 AD D1 80 9B 40  _G]uX..vq......@
#     0060: A6 1D DF 26 BF 4A FB 85   7B AE FD 4A 17 15 F6 8E  ...&.J.....J....
#     0070: 9F 73 E3 80 23 CE 62 04   42 AA 41 81 C4 B1 1D F0  .s..#.b.B.A.....
#     0080: BC 7A 66 F9 18 F8 A7 B8   A4 2D 47 60 2B B6 61 3B  .zf......-G`+.a;
#     0090: C0 9F 4E 66 34 4F 24 70   A1 C0 7F 5B 2C AF EC A9  ..Nf4O$p...[,...
#     00A0: EA C6 2D 2B 5C E0 A8 A8   99 5C EB ED AC 3E 6D D8  ..-+\....\...>m.
#     00B0: FB 05 B0 89 86 D3 1D 47   60 6C 81 42 93 2A D9 B1  .......G`l.B.*..
#     00C0: 4E E9 F0 41 03 0B 78 1E   33 1E CC FA 97 5C 2F 59  N..A..x.3....\/Y
#     00D0: E5 15 B7 1D 6D E4 62 C7   6A EF 31 D4 E8 B8 FC E8  ....m.b.j.1.....
#     00E0: F5 64 88 85 D6 8E 30 15   90 8E 0C 3C 8C 91 ED 8E  .d....0....<....
#     00F0: 19 9A D1 9B 07 64 6C 49   6F 81 65 D6 87 C2 A2 A4  .....dlIo.e.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.871 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 08 B0 1B 34 2E CB ED 3F   7F 57 82 37 FC D5 B8 E5  ...4...?.W.7....
#     0010: 49 09 94 26 D5 66 28 15   58 D6 39 DC A2 80 87 C8  I..&.f(.X.9.....
#     0020: 1E 67 41 7E 4A 33 3C FC   07 D1 B9 F5 D0 B5 34 83  .gA.J3<.......4.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.874 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:11.875 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.875 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:11.875 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.875 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-26 24:25:11.875 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:11.876 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.876 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.879 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 60 C6 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:44.000 UTC",
#       "not  after"         : "2024-01-24 24:24:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 3F 1E 7C F1 58 0E 19   A4 FB 12 E7 73 73 29 D8  N?...X......ss).
#           0010: D3 D9 37 18                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 2A ED D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:38.000 UTC",
#       "not  after"         : "2024-01-24 24:24:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#           0010: D0 6A EB B9                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.905 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 14 B2 F9 3A 8D D1 41 6B   1A E4 54 9B DE 95 F0 AB  ...:..Ak..T.....
#     0010: D8 B8 3B AD 5A C5 4A 3B   1D AD 0A 06 40 08 3C E3  ..;.Z.J;....@.<.
#     0020: 18 46 94 C4 9F 9C 5B 5D   CE 4A 13 DF 2F CD DE E3  .F....[].J../...
#     0030: E8 C4 85 28 65 A7 3D 7E   54 68 22 DC E4 D1 76 DB  ...(e.=.Th"...v.
#     0040: 01 B1 FA 11 10 DE D2 7D   91 CB 6F 8F 8F 06 AA 7A  ..........o....z
#     0050: D7 E7 7E 9E C0 02 E4 33   9C 5D 98 6E C0 A3 82 F1  .......3.].n....
#     0060: C2 01 AA 45 FB A0 29 A6   A3 1A 1D CF 9E 94 F0 60  ...E..)........`
#     0070: 3E D8 50 5B 01 93 E9 28   00 25 65 BB F6 47 DD 3C  >.P[...(.%e..G.<
#     0080: F6 FE 3B 44 79 CC 96 16   A7 55 40 30 31 07 F0 0F  ..;Dy....U@01...
#     0090: 9D C3 5B EC C4 12 57 17   65 32 6D 58 4E 36 30 43  ..[...W.e2mXN60C
#     00A0: A0 32 F9 1B 63 3B A5 A0   AD 58 13 CC D0 52 61 C4  .2..c;...X...Ra.
#     00B0: AA 4C 74 D6 A9 67 66 DB   8D 10 8B D9 83 FD C9 A7  .Lt..gf.........
#     00C0: AB 3B A6 D6 21 80 B7 0D   8D 65 29 49 0B D0 00 CA  .;..!....e)I....
#     00D0: B5 A6 7D 28 7A 2A 53 2F   6D 98 5F 96 84 E5 44 F9  ...(z*S/m._...D.
#     00E0: 0E E2 11 E7 8E 48 EF AB   9F 1F EF D8 64 F7 E9 54  .....H......d..T
#     00F0: 0B 5E EE 7B 4F 05 9E FB   EC 98 36 44 10 74 2D A3  .^..O.....6D.t-.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.906 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC 4D A2 B1 5C D2 35 30   00 A3 0B 88 0C 03 1C 6C  .M..\.50.......l
#     0010: 74 A3 8D AC BA 8C 4F E2   73 EC 8D 5C 29 C4 1D A7  t.....O.s..\)...
#     0020: 53 44 90 4C BE A2 C1 6D   EB E2 28 3C A5 44 69 B0  SD.L...m..(<.Di.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.907 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:11.962 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F4 2F 70 7C 7D D4 29 AD 64 31 1C 56 AB 8E B2 93 22 32 A9 5C 97 E4 54 6F 4A 7F 57 D2 3E CD 3F 47",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 24:25:12.238 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 24:25:12.239 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-26 00:25:23.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:24.113 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 ED 01 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:36.000 UTC",
#       "not  after"         : "2024-01-24 24:24:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#           0010: D0 6A EB B9                                        .j..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 2A ED D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 24:24:38.000 UTC",
#       "not  after"         : "2024-01-24 24:24:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E A2 96 4A D3 FD 75 03   2C 91 A3 73 20 9B 8A 64  >..J..u.,..s ..d
#           0010: D0 6A EB B9                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D D1 BB 11 D3 17 6D 00   E8 C7 99 B0 A2 CB 86 C9  =.....m.........
#           0010: 05 96 0B AA                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 24:25:24.130 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:24.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:24.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:24.542 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:25:24.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:24.631 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:24.633 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-26 24:25:24.634 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.640 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.652 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.652 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.652 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-26 24:25:24.655 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F2 21 30 99 1A BE 9E 9D CF 6D 68 0E 76 9D 1A 57 3E 1A 02 B2 74 AA CE 1E 39 7C 54 16 21 4E 44 58",
#     "session id"          : "63 D8 7C 67 C4 D8 16 EE FD 28 DE D2 FF 67 6F 64 38 05 59 95 24 4C 13 E9 A3 50 61 0E E6 20 61 4F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 28 98 E9 B2 A4 AB 7D E7   BD E2 F9 51 E4 14 67 B6  (..........Q..g.
#               0010: 37 BC 44 B2 76 54 CF 2C   77 20 F9 26 55 EC C6 55  7.D.vT.,w .&U..U
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.674 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C7 9D 58 1B 6A 2D 5D 05 F1 E8 C4 FC 4A A2 EF F0 A6 9D 60 A9 81 DE EF CF E1 68 AB CC F6 A5 83 06",
#     "session id"          : "63 D8 7C 67 C4 D8 16 EE FD 28 DE D2 FF 67 6F 64 38 05 59 95 24 4C 13 E9 A3 50 61 0E E6 20 61 4F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C6 2A F0 13 39 1E 39 64   93 59 CD 4D 7B 6E 9A 68  .*..9.9d.Y.M.n.h
#             0010: 9A DA 27 A1 B3 B4 30 63   1D BB 44 C3 69 1A 0C 61  ..'...0c..D.i..a
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.675 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.675 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.680 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.680 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:24.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:24.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.689 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.691 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.692 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.696 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:25:24.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-26 24:25:24.699 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-26 24:26:42.648 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:26:42.696 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:26:42.696 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:26:42.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 24:26:42.697 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40814/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28122ms
ok 65 stop command for single port in 31079ms
ok 66 status detects locally running solr in 14379ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2179ms
ok 69 copying files around in 6576ms
ok 70 upconfig in 2628ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 35s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m58.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5735 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5735/

2 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([868EC3F7EE79336E:B37A28AC05A50530]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset

Error Message:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1/solrconfig.xml
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/collection_state.json
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/backup_0.properties
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata/md_shard1_0.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata/md_shard2_0.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0/collection_state.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/backup_0.properties

Stack Trace:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1/solrconfig.xml
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/collection_state.json
hdfs://localhost:40939/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/backup_0.properties
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata/md_shard1_0.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata/md_shard2_0.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0/collection_state.json
hdfs://localhost:40939/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/backup_0.properties
	at __randomizedtesting.SeedInfo.seed([868EC3F7EE79336E:8D775CFE763B6579]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertFalse(Assert.java:65)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testSkipConfigset(AbstractIncrementalBackupTest.java:382)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5223 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=868EC3F7EE79336E -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=868EC3F7EE79336E -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 43s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m19s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5734 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5734/

1 tests failed.
FAILED:  org.apache.solr.client.solrj.TestLBHttp2SolrClient.testReliability

Error Message:
org.apache.solr.client.solrj.impl.BaseHttpSolrClient$RemoteSolrException: Error from server at http://127.0.0.1:44223/solr/collection1/select?q=*%3A*&wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1"/>
<title>Error 404 Can not find: /solr/collection1/select</title>
</head>
<body><h2>HTTP ERROR 404 Can not find: /solr/collection1/select</h2>
<table>
<tr><th>URI:</th><td>/solr/collection1/select</td></tr>
<tr><th>STATUS:</th><td>404</td></tr>
<tr><th>MESSAGE:</th><td>Can not find: /solr/collection1/select</td></tr>
<tr><th>SERVLET:</th><td>org.apache.solr.embedded.JettySolrRunner$Servlet404-234be8b2</td></tr>
</table>
<hr/><a href="https://eclipse.org/jetty">Powered by Jetty:// 10.0.17</a><hr/>

</body>
</html>


Stack Trace:
org.apache.solr.client.solrj.impl.BaseHttpSolrClient$RemoteSolrException: Error from server at http://127.0.0.1:44223/solr/collection1/select?q=*%3A*&wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1"/>
<title>Error 404 Can not find: /solr/collection1/select</title>
</head>
<body><h2>HTTP ERROR 404 Can not find: /solr/collection1/select</h2>
<table>
<tr><th>URI:</th><td>/solr/collection1/select</td></tr>
<tr><th>STATUS:</th><td>404</td></tr>
<tr><th>MESSAGE:</th><td>Can not find: /solr/collection1/select</td></tr>
<tr><th>SERVLET:</th><td>org.apache.solr.embedded.JettySolrRunner$Servlet404-234be8b2</td></tr>
</table>
<hr/><a href="https://eclipse.org/jetty">Powered by Jetty:// 10.0.17</a><hr/>

</body>
</html>

	at __randomizedtesting.SeedInfo.seed([79896E4B008EA43E:B841B30DA1E87597]:0)
	at app//org.apache.solr.client.solrj.impl.Http2SolrClient.checkContentType(Http2SolrClient.java:975)
	at app//org.apache.solr.client.solrj.impl.Http2SolrClient.processErrorsAndResponse(Http2SolrClient.java:864)
	at app//org.apache.solr.client.solrj.impl.Http2SolrClient.processErrorsAndResponse(Http2SolrClient.java:577)
	at app//org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:534)
	at app//org.apache.solr.client.solrj.impl.LBSolrClient.request(LBSolrClient.java:630)
	at app//org.apache.solr.client.solrj.impl.LBSolrClient.request(LBSolrClient.java:604)
	at app//org.apache.solr.client.solrj.SolrRequest.process(SolrRequest.java:242)
	at app//org.apache.solr.client.solrj.SolrClient.query(SolrClient.java:926)
	at app//org.apache.solr.client.solrj.SolrClient.query(SolrClient.java:939)
	at app//org.apache.solr.client.solrj.TestLBHttp2SolrClient.testReliability(TestLBHttp2SolrClient.java:224)
	at java.base@11.0.16/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base@11.0.16/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base@11.0.16/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base@11.0.16/java.lang.reflect.Method.invoke(Method.java:566)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at app//com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at app//org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1852 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.client.solrj.TestLBHttp2SolrClient.testReliability (:solr:solrj)
    Test output: /tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.TestLBHttp2SolrClient.txt
    Reproduce with: gradlew :solr:solrj:test --tests "org.apache.solr.client.solrj.TestLBHttp2SolrClient.testReliability" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=79896E4B008EA43E -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 24s
644 actionable tasks: 627 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m50.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5733 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5733/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45357/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-25 12:51:14.527; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:51:14.533; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-25 12:51:15.432; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 12:51:15.472; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22785ms
ok 61 start solr with client truststore and security manager in 25286ms
not ok 62 start solr with mTLS needed in 56372ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-xOen6y/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45357.
#
# Started Solr server on port 45357 (pid=196917). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45358.
#
# Started Solr server on port 45358 (pid=197368). Happy searching!
#
# INFO  - 2023-10-25 12:52:38.530; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:52:38.535; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:52:38.901; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:52:38.904; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:52:38.904; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:38.936 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 84 EA A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:14.000 UTC",
#     "not  after"         : "2024-01-23 12:52:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 73 07 73 2E 69 7B 6A   1F 27 2B 86 20 F5 37 3D  @s.s.i.j.'+. .7=
#         0010: 75 84 50 43                                        u.PC
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:38.941 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 29 15 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:06.000 UTC",
#     "not  after"         : "2024-01-23 12:52:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:38.956 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:39.055 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:39.055 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:39.055 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:39.056 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:39.195 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.195 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:39.197 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:39.197 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.202 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.214 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.214 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:39.217 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "29 73 C1 E0 F4 29 9F 92 ED AA 38 B2 9E 42 2F 6A 4C 03 79 95 01 A5 5E 9C 3F 0A 46 D0 56 5B 09 21",
#   "session id"          : "B2 0C 3D F4 07 28 75 86 97 6A 11 E8 F8 15 F1 B6 C8 92 B4 AF 9A 34 55 E4 FE 2E 7F 12 9D BE AF 34",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BB 61 9D 89 0B DE 7E 9A   4A 7B 47 46 35 13 A8 20  .a......J.GF5..
#             0010: 69 DC 8F 9A B4 E9 28 7C   CB 06 7E 67 17 73 3A 11  i.....(....g.s:.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.327 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9C 76 A4 02 0D 89 0C 9B 21 C3 EF 3E C8 44 36 8F 6D 92 28 08 38 E2 17 57 AB 8D A7 0D 38 F1 B4 05",
#   "session id"          : "B2 0C 3D F4 07 28 75 86 97 6A 11 E8 F8 15 F1 B6 C8 92 B4 AF 9A 34 55 E4 FE 2E 7F 12 9D BE AF 34",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FF 26 84 58 F5 43 B6 7E   27 0E 0E CA F5 85 60 EA  .&.X.C..'.....`.
#           0010: AF 70 26 59 55 12 36 84   52 B5 F8 5F E3 FC 60 74  .p&YU.6.R.._..`t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.327 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.327 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.328 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.328 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.329 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.331 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.332 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.332 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.332 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.333 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.341 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.343 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.344 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.348 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.350 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.351 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.351 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.351 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.352 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.353 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.356 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 11 C5 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:10.000 UTC",
#       "not  after"         : "2024-01-23 12:52:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 F8 FE B8 1B C2 B1 48   FF 3D 28 82 07 74 D2 0D  "......H.=(..t..
#           0010: AB 27 F8 A1                                        .'..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.356 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.438 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.441 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 7C 24 56 9A B5 CC 77   76 79 9B 99 EA BA 80 E6  F.$V...wvy......
#     0010: A9 DF BD BC EE 10 F1 AA   6F FC 4F 85 BE 91 0A 68  ........o.O....h
#     0020: AC C8 86 E7 91 B5 6A C8   90 67 B5 5E FE 02 A2 2C  ......j..g.^...,
#     0030: 9B DA C5 15 95 49 A6 A7   A5 45 8A B0 5A 50 39 43  .....I...E..ZP9C
#     0040: 64 22 9C C5 35 88 94 9C   07 0B 59 29 6C 7E 52 6E  d"..5.....Y)l.Rn
#     0050: 3C 1F B6 41 8E A6 99 6B   58 0F C5 02 AF D6 F6 B6  <..A...kX.......
#     0060: AC 5A 27 E9 F1 F2 8E B1   81 44 05 CD DB 00 B4 C0  .Z'......D......
#     0070: 6E 06 AA 65 CB EB 0C 9A   4C 9C D2 DF 2A F9 17 33  n..e....L...*..3
#     0080: 36 6D 08 F3 28 03 40 F7   80 D6 65 AA 7C D0 B9 92  6m..(.@...e.....
#     0090: 14 14 BE DB DF A4 26 25   F9 69 E8 D5 AF 6F 47 52  ......&%.i...oGR
#     00A0: A0 D6 C4 36 7B 5E 7D 67   B1 09 08 91 0D 76 C0 AC  ...6.^.g.....v..
#     00B0: C4 98 F7 6B 77 3B FF 5C   FE DB FC 4A D4 78 C7 A8  ...kw;.\...J.x..
#     00C0: CA 2D AE 43 7F 98 92 16   B6 C6 11 3C CF 5B 74 8E  .-.C.......<.[t.
#     00D0: F7 4A 06 D3 F8 EE F8 B2   CD 3F 27 F6 96 1C DC D2  .J.......?'.....
#     00E0: CC CC 74 E1 67 5A 4A 64   62 0F 74 62 4D 7A 6B DE  ..t.gZJdb.tbMzk.
#     00F0: AA 2D AF 33 57 4A 39 02   2F 7D EF 4A FC 60 97 81  .-.3WJ9./..J.`..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.443 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 9A AC A9 15 9D 02 60   B7 51 D8 25 56 F8 54 CE  .......`.Q.%V.T.
#     0010: C9 60 62 BC 6E 4F 62 F8   94 93 D3 98 4C AF F8 0A  .`b.nOb.....L...
#     0020: 32 87 7A 44 DF 01 72 C5   83 C8 A6 8D 61 4E EA A6  2.zD..r.....aN..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.445 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:39.446 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.447 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:39.447 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.447 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:39.447 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:39.447 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.448 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.450 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 84 EA A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:14.000 UTC",
#       "not  after"         : "2024-01-23 12:52:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 73 07 73 2E 69 7B 6A   1F 27 2B 86 20 F5 37 3D  @s.s.i.j.'+. .7=
#           0010: 75 84 50 43                                        u.PC
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C8 34 AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:08.000 UTC",
#       "not  after"         : "2024-01-23 12:52:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#           0010: 36 A7 C0 50                                        6..P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.477 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 4A 0A 8E 54 4B CD FA   44 35 D7 CD 3D 38 5A 67  PJ..TK..D5..=8Zg
#     0010: 2E 94 32 19 D9 04 CC 5C   27 ED 96 94 78 11 AB 56  ..2....\'...x..V
#     0020: FA 8B 22 BD 5A 8D 14 ED   89 EA 7B 07 94 11 50 EB  ..".Z.........P.
#     0030: 0B C7 71 B5 1F F2 08 CF   B4 0E D1 0A 38 59 84 68  ..q.........8Y.h
#     0040: 94 E6 D4 E4 AB E2 77 61   E4 40 69 7F 27 E0 3B D9  ......wa.@i.'.;.
#     0050: 00 3D B1 C5 D4 B8 33 CB   0C 2C 46 6B 76 40 F4 9B  .=....3..,Fkv@..
#     0060: 69 BD 44 75 03 D2 E3 3F   CE F8 5B F9 94 5D 7A 12  i.Du...?..[..]z.
#     0070: CE 3B 96 F1 E1 35 D3 C0   DC FD 64 FE B0 AA CD FA  .;...5....d.....
#     0080: FD E1 15 36 BB 62 7D 94   25 C9 51 ED B6 3F 62 F8  ...6.b..%.Q..?b.
#     0090: A6 00 EA EE 13 D4 08 52   2A 45 6F 3D 50 4A 29 A9  .......R*Eo=PJ).
#     00A0: 26 E6 68 96 8D 5F B9 D8   4B 68 26 73 4F 13 91 03  &.h.._..Kh&sO...
#     00B0: D2 DC 00 4E E8 76 9B AD   C7 31 1B 31 80 B3 C9 E8  ...N.v...1.1....
#     00C0: 12 C1 E2 D7 95 DF C0 C9   C9 8D 92 6D 70 2E A6 69  ...........mp..i
#     00D0: 7A 54 EF 7D 06 68 66 C0   1E D7 F0 E1 69 1B C4 8C  zT...hf.....i...
#     00E0: FF 7A C8 5B ED 51 01 89   27 0B A6 14 68 6A FF 1D  .z.[.Q..'...hj..
#     00F0: EA 4C 3A E3 BD 78 FC D2   1B C3 C6 49 2D 9A 84 6E  .L:..x.....I-..n
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.478 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2E 87 FF 4B DC 48 B4 E4   EF 6A 4A 5A 9B 97 C5 0F  ...K.H...jJZ....
#     0010: 7B 25 45 46 CF F4 ED 79   28 4C 29 8E 18 D8 8F B6  .%EF...y(L).....
#     0020: 16 6D E9 A3 59 8B B4 49   A4 B3 34 3E 47 E7 F3 19  .m..Y..I..4>G...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.478 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:39.535 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "22 27 89 17 AB F4 46 76 9C 09 E1 BE C7 01 81 2D D7 3B 69 D9 ED 79 B9 9B F1 E4 03 6E 3F 55 5D A2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:52:39.869 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:52:39.870 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 12:52:40.784; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:52:40.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:52:41.167; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:52:41.170; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:52:41.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-xOen6y/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:41.202 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 84 EA A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:14.000 UTC",
#     "not  after"         : "2024-01-23 12:52:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 40 73 07 73 2E 69 7B 6A   1F 27 2B 86 20 F5 37 3D  @s.s.i.j.'+. .7=
#         0010: 75 84 50 43                                        u.PC
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:41.207 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 29 15 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:06.000 UTC",
#     "not  after"         : "2024-01-23 12:52:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:41.222 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:41.319 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:41.319 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:41.319 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:41.320 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:41.456 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.457 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:41.458 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:41.459 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.464 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.476 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:41.478 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 ED 07 E2 11 A7 C4 36 23 F4 04 E7 04 BE 20 2D 9F 99 59 7B E6 1C 9E 26 3B D0 F3 C0 D3 EC 9B 96",
#   "session id"          : "0F ED 5F BD E4 C9 4B DE 94 53 27 D9 86 74 55 67 49 E5 1F 0A 89 0A FF 8D 79 AD 4D 7F A0 0D 01 E9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E4 00 E4 1C F4 10 13 F1   03 05 C3 36 42 55 75 26  ...........6BUu&
#             0010: 9B EC 90 0C 72 4D 5F D9   78 E1 27 0D 8E AA 9A 43  ....rM_.x.'....C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.576 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A1 7B 1E 32 B3 50 8C A8 32 25 59 20 4C C9 27 B6 07 B7 E3 C7 0A 9E 34 E1 D8 18 DE DE 10 9C 21 38",
#   "session id"          : "0F ED 5F BD E4 C9 4B DE 94 53 27 D9 86 74 55 67 49 E5 1F 0A 89 0A FF 8D 79 AD 4D 7F A0 0D 01 E9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7A 03 45 C8 EE 74 E1 29   BD 99 6D 10 FB 92 55 34  z.E..t.)..m...U4
#           0010: 84 83 CD AA 3D C7 D1 21   A3 F5 E0 9B A9 DD 11 35  ....=..!.......5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.577 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.579 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.581 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.582 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.591 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.594 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.597 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.600 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.601 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.605 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 11 C5 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:10.000 UTC",
#       "not  after"         : "2024-01-23 12:52:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 F8 FE B8 1B C2 B1 48   FF 3D 28 82 07 74 D2 0D  "......H.=(..t..
#           0010: AB 27 F8 A1                                        .'..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.692 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C8 34 AC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:52:08.000 UTC",
#     "not  after"         : "2024-01-23 12:52:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#         0010: 36 A7 C0 50                                        6..P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#         0010: 9D F1 30 84                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.696 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C D2 8B C4 82 90 09 36   A3 D6 2A 33 A1 CD 3E A3  .......6..*3..>.
#     0010: EB 0D 4F 74 09 C2 61 78   A4 22 B1 A5 D9 54 A6 F2  ..Ot..ax."...T..
#     0020: 0E 86 F8 00 41 B4 81 78   0E 68 BD 14 D6 9D F6 D7  ....A..x.h......
#     0030: 04 3E E7 A6 2F 34 53 49   16 95 66 F2 54 40 D0 D4  .>../4SI..f.T@..
#     0040: 47 4A 3E EE 5A A1 5E 68   42 78 D8 91 E8 FA 6E 54  GJ>.Z.^hBx....nT
#     0050: 34 B7 9A DF 24 AA 5D 82   31 56 22 11 62 8C 13 37  4...$.].1V".b..7
#     0060: 56 48 F6 8F 78 33 00 4D   13 69 E3 49 C0 C1 D2 82  VH..x3.M.i.I....
#     0070: A2 46 E6 7B C6 F4 1C 61   0A 71 D6 78 AC 77 D1 5E  .F.....a.q.x.w.^
#     0080: 0F CB F1 71 CD B5 13 EB   77 39 47 AE 69 53 13 91  ...q....w9G.iS..
#     0090: 0A EF 23 7F E3 9D E8 0B   9D F6 93 2A B5 35 C7 3D  ..#........*.5.=
#     00A0: EB 2F 03 54 0D 48 3E 34   81 2F 96 1D FE 37 46 12  ./.T.H>4./...7F.
#     00B0: 16 FF 15 33 9C 63 7E 57   10 33 79 2E CF 04 DD FF  ...3.c.W.3y.....
#     00C0: 71 AC 0A 96 F4 98 05 D6   69 4C E3 FC D8 5E 04 06  q.......iL...^..
#     00D0: 5A 23 B5 4B AF 58 47 99   DA 25 C0 12 0D 5F E1 01  Z#.K.XG..%..._..
#     00E0: 32 BD 4C 36 A5 11 81 E8   87 01 E5 D9 5C C4 19 72  2.L6........\..r
#     00F0: D3 E2 17 22 1D A2 B1 0F   83 07 76 65 45 DD 17 CA  ..."......veE...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.698 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 93 FE E5 29 9C A7 74 FC   83 9C 4E C5 E8 81 19 7D  ...)..t...N.....
#     0010: 49 9A 79 B6 28 FC 49 B5   A2 32 3D 5A D3 6A 0E 3A  I.y.(.I..2=Z.j.:
#     0020: 0C 8B 94 32 69 BC 4E 0A   E5 B2 59 42 36 27 4A C6  ...2i.N...YB6'J.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.701 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:41.702 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.702 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:41.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.703 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 12:52:41.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:41.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.704 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.707 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 84 EA A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:14.000 UTC",
#       "not  after"         : "2024-01-23 12:52:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 73 07 73 2E 69 7B 6A   1F 27 2B 86 20 F5 37 3D  @s.s.i.j.'+. .7=
#           0010: 75 84 50 43                                        u.PC
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C8 34 AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:08.000 UTC",
#       "not  after"         : "2024-01-23 12:52:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#           0010: 36 A7 C0 50                                        6..P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.734 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 7D 0D E5 F7 6D 72 51   5B F0 CF A0 E5 66 EB FD  e....mrQ[....f..
#     0010: 4A 28 A1 FF 78 6E 24 C5   AA FC D5 02 12 D6 94 22  J(..xn$........"
#     0020: 40 84 E8 14 E1 A8 B8 79   3F AE D5 6F A3 C5 14 CD  @......y?..o....
#     0030: F2 8E 21 9F 19 A1 67 3A   F1 DC BC 2F FA 51 68 15  ..!...g:.../.Qh.
#     0040: 60 4E D9 0E EF 7A EE BB   75 1A B4 17 24 64 7B 30  `N...z..u...$d.0
#     0050: 39 9C 49 C1 B9 EC 09 88   41 F9 2B 2F 89 0E 5D 85  9.I.....A.+/..].
#     0060: 97 FB 2A 5D 6F 05 E3 3A   3A 77 C2 91 BF E1 2A AA  ..*]o..::w....*.
#     0070: 7A 6F CB 04 C5 7E 12 8D   B8 91 70 3E 1D 11 87 4B  zo........p>...K
#     0080: 99 42 32 C1 FE 35 64 2D   FC FE 56 61 B1 C4 36 51  .B2..5d-..Va..6Q
#     0090: FE 3E 27 EC 98 6A A3 D8   AF 2B 1D 04 FF F2 74 B9  .>'..j...+....t.
#     00A0: 6F B5 BD 67 8C DE D2 A3   C5 67 97 19 7C 78 D5 2B  o..g.....g...x.+
#     00B0: 44 76 9E 3F 53 23 17 EE   C4 73 1B 0F DD 84 5D 67  Dv.?S#...s....]g
#     00C0: B9 0F DE 7F 0A 27 84 3A   2B 85 82 C7 13 DE 8F B4  .....'.:+.......
#     00D0: 53 95 37 67 D7 87 7F 67   9D C5 89 A3 AB 8F 9F 57  S.7g...g.......W
#     00E0: FB 70 BD 3B 8D 64 32 1F   44 DA 48 21 61 E2 77 06  .p.;.d2.D.H!a.w.
#     00F0: 3F 03 F8 89 4B 72 EB A0   4A 91 1A 8D 28 6F 6C 75  ?...Kr..J...(olu
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.736 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE 6B 44 9F 2F 16 76 9C   E0 D3 AB 95 20 63 62 0E  .kD./.v..... cb.
#     0010: E1 A2 7E 31 96 C4 7A 2E   7E D7 5E FB 9C 54 2F 98  ...1..z...^..T/.
#     0020: 25 FB 30 73 45 32 93 B7   D5 A6 B3 DF C7 1E 34 51  %.0sE2........4Q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.736 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:41.792 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "45 FF 22 B1 56 A9 98 D9 C8 BE FE C3 E8 5B 8F 12 97 84 96 6E BB 17 13 21 CA B8 8F 26 6F FD BD 8D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:52:42.092 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:52:42.092 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-25 12:52:53.316; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:53.640 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C8 34 AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:08.000 UTC",
#       "not  after"         : "2024-01-23 12:52:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#           0010: 36 A7 C0 50                                        6..P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 7D B5 F6 DD 5C E7 84   56 7C D0 B0 76 39 52 05  .....\..V...v9R.
#           0010: 9D F1 30 84                                        ..0.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 29 15 E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:52:06.000 UTC",
#       "not  after"         : "2024-01-23 12:52:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 26 1F A9 D6 48 C8 10   2B 94 D6 8A 98 98 59 B1  m&...H..+.....Y.
#           0010: 36 A7 C0 50                                        6..P
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:52:53.655 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:53.804 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:53.805 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:53.806 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:52:53.806 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:53.891 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.891 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:53.893 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 12:52:53.893 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.898 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.910 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 12:52:53.913 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E6 0B 45 FE D4 9D 47 60 E2 10 C7 27 04 76 25 F6 A0 3B 34 CC 88 11 7D 2B 76 87 BD DE EB 62 3B 42",
#     "session id"          : "64 37 9A F2 7D 16 5D 7D 98 FE 53 77 19 95 3D B2 8A FB 9E D8 1C 04 79 BD 41 29 D5 70 F8 69 E9 94",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 19 62 AE 2D 64 58 FC F0   11 EB F7 A2 9B A3 ED 07  .b.-dX..........
#               0010: 35 86 B2 3D 2C DE 41 54   42 92 E7 E9 0D 93 59 4B  5..=,.ATB.....YK
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.932 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "31 D3 59 C9 0A 85 31 13 16 CC 82 46 4C 0A D8 E2 E2 AB 1B 62 46 AD 56 E4 D2 50 4B A8 AA 87 71 D6",
#     "session id"          : "64 37 9A F2 7D 16 5D 7D 98 FE 53 77 19 95 3D B2 8A FB 9E D8 1C 04 79 BD 41 29 D5 70 F8 69 E9 94",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 99 CF CC D7 C4 4F E0   2B C8 01 14 34 E3 8C 0C  Y.....O.+...4...
#             0010: 60 82 33 7F 1B 0C 37 95   8A 5A 99 C6 45 26 D6 2C  `.3...7..Z..E&.,
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.933 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.933 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.935 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.937 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.937 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:53.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:53.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.947 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.948 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.949 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.953 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.953 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.953 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.953 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.954 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:53.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:52:53.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 12:52:53.955 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 12:54:12.232 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:54:12.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:54:12.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:54:12.288 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:54:12.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45358/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28363ms
ok 65 stop command for single port in 31016ms
ok 66 status detects locally running solr in 14327ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6557ms
ok 70 upconfig in 2652ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1221ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 20m 56s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m21s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5732 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5732/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45725/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-25 03:35:04.323; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:35:04.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-25 03:35:05.562; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 03:35:05.609; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22903ms
ok 61 start solr with client truststore and security manager in 25000ms
not ok 62 start solr with mTLS needed in 58566ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-OfM4Pe/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45725.
#
# Started Solr server on port 45725 (pid=199384). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45726.
#
# Started Solr server on port 45726 (pid=199811). Happy searching!
#
# INFO  - 2023-10-25 03:36:28.880; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:36:28.886; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 03:36:29.247; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:36:29.250; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:36:29.250; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:29.281 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 DE 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:36:04.000 UTC",
#     "not  after"         : "2024-01-23 03:36:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 52 9A AC AE 23 CC D9   E0 E4 CF 6D 1F C2 0E 94  3R...#.....m....
#         0010: 6D CA C3 6C                                        m..l
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:29.285 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F B2 8B 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:56.000 UTC",
#     "not  after"         : "2024-01-23 03:35:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:29.299 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:29.526 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.527 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:29.529 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:29.529 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.535 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.546 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.546 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.546 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:29.548 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0B E3 C4 05 72 44 D1 9C 14 BA 96 82 1D 40 89 6E B2 2B 78 D5 EC 88 E8 E4 1C 6F 48 63 0A 07 1B 33",
#   "session id"          : "25 73 A9 E8 18 D2 FE BF D5 EA C4 55 3D 25 F5 73 51 1E B5 72 C2 37 99 D2 BD 72 4F BA 1A 36 8A 39",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 D3 EB F6 D6 C2 B2 29   61 BF 51 6B 91 7F 3D B5  .......)a.Qk..=.
#             0010: 69 AF 9F 93 27 A7 50 B6   10 43 DA F3 72 29 71 04  i...'.P..C..r)q.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.652 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "69 71 D3 E3 91 1C FA 53 38 55 14 11 8C 9E BB 16 DC 2A 04 B3 88 EA 5C 30 73 DF 1A AA D4 83 4D F0",
#   "session id"          : "25 73 A9 E8 18 D2 FE BF D5 EA C4 55 3D 25 F5 73 51 1E B5 72 C2 37 99 D2 BD 72 4F BA 1A 36 8A 39",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DD 33 5A 08 27 F3 EF 7A   FE 5C AD 82 F0 10 16 E1  .3Z.'..z.\......
#           0010: 6C 77 B9 D2 BD 55 C0 E4   B3 34 AF A8 4F 0B C7 50  lw...U...4..O..P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.653 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.653 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.655 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.657 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.659 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.659 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.659 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.659 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.659 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.667 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.669 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.670 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.673 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.674 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.674 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.674 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.674 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.676 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.677 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.677 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.677 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.678 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.679 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.679 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.681 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 C5 A4 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:36:01.000 UTC",
#       "not  after"         : "2024-01-23 03:36:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F BD E2 A6 6B D1 B0 59   71 67 09 B5 51 F8 3A 21  ....k..Yqg..Q.:!
#           0010: 66 D0 40 62                                        f.@b
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.682 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:29.733 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:29.733 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:29.734 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:29.734 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.762 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.766 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 41 8B 5D CD EE F9 63 FC   F7 10 A9 85 C2 BA D1 2F  A.]...c......../
#     0010: 91 80 2B C6 CA 42 2E 85   D5 D6 8B 64 01 5E A4 D9  ..+..B.....d.^..
#     0020: 47 A3 AB F0 8F A1 8C AC   1A 49 D8 AC 03 5F D0 73  G........I..._.s
#     0030: 06 88 39 BB 88 29 D8 0B   F3 8E 46 40 53 4D 8A 0A  ..9..)....F@SM..
#     0040: 9A 30 8C 67 8E 07 76 84   B5 B4 B6 36 C2 7D 40 97  .0.g..v....6..@.
#     0050: C4 0D 48 66 05 17 68 0D   68 17 CA 70 49 47 7A E9  ..Hf..h.h..pIGz.
#     0060: 48 48 FE 63 01 5A 6F C4   65 BE 99 87 57 64 20 A8  HH.c.Zo.e...Wd .
#     0070: D5 DF AD F9 68 D5 AC A7   3A 8F CA 97 93 E0 3B E3  ....h...:.....;.
#     0080: 09 E6 AE E9 B6 84 E5 A3   C0 0A 51 13 78 C7 90 96  ..........Q.x...
#     0090: BA 61 3F 82 8B 18 B8 6A   16 17 39 46 78 95 B1 19  .a?....j..9Fx...
#     00A0: 02 D3 0D 3D 71 20 B6 7F   69 BC F7 57 0D 55 79 6E  ...=q ..i..W.Uyn
#     00B0: 29 DE 10 93 92 4B E8 0F   3E 6F 7C 24 F9 33 3F 5B  )....K..>o.$.3?[
#     00C0: FC 0E 90 D5 52 F0 74 3F   08 C7 DE 16 39 EE 1A D2  ....R.t?....9...
#     00D0: 6A F1 F4 ED 65 D6 4E 67   FD 60 94 73 58 74 1B 31  j...e.Ng.`.sXt.1
#     00E0: 6F 55 36 FB E3 CF 28 DA   BE CE 8B 19 24 3A E5 C9  oU6...(.....$:..
#     00F0: E3 8F 03 C5 D2 77 E7 F2   09 46 58 8D C9 35 2B 9C  .....w...FX..5+.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.767 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EA D6 C2 B1 9D 8B AC 63   75 E9 AA 54 A6 F4 C2 AD  .......cu..T....
#     0010: 86 25 53 B8 5D 3A 7F DB   91 D9 52 05 61 2C 36 7D  .%S.]:....R.a,6.
#     0020: 92 42 E4 EE 28 4D 79 25   90 A7 D8 C6 53 78 5B 4C  .B..(My%....Sx[L
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.770 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:29.771 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.771 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:29.771 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.771 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:29.772 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:29.772 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.772 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.775 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 DE 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:36:04.000 UTC",
#       "not  after"         : "2024-01-23 03:36:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 52 9A AC AE 23 CC D9   E0 E4 CF 6D 1F C2 0E 94  3R...#.....m....
#           0010: 6D CA C3 6C                                        m..l
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 AD 7B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:35:58.000 UTC",
#       "not  after"         : "2024-01-23 03:35:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#           0010: 54 1F D9 EA                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.801 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 20 1F A7 57 F9 07 22   5D 8F A8 C2 42 04 18 EC  M ..W.."]...B...
#     0010: 1A 89 77 08 75 38 09 4D   84 78 D1 59 0C E8 4A 9D  ..w.u8.M.x.Y..J.
#     0020: 89 57 42 A9 FA 4F 01 57   E0 CD D6 B5 90 23 EB D2  .WB..O.W.....#..
#     0030: F3 02 D1 7F E4 A7 1D 69   CE E8 77 7A F9 87 38 48  .......i..wz..8H
#     0040: AC DE C4 6F 5E 6A 5B 80   CD 01 6D E8 04 D4 22 1D  ...o^j[...m...".
#     0050: 4D 81 B2 0C 02 95 F9 B0   58 CA AE BB 0E 16 0B 33  M.......X......3
#     0060: 55 59 C5 D4 66 91 59 BC   C0 CE 09 9E 29 7C 5C 6B  UY..f.Y.....).\k
#     0070: 89 78 C1 89 76 70 25 4A   C1 C7 18 3E 56 43 7F 1C  .x..vp%J...>VC..
#     0080: CF E6 5B C3 8B 97 8F 40   2A 9D E9 18 A9 7C FB A8  ..[....@*.......
#     0090: A2 1E 88 45 EC 8F D3 6C   D7 92 45 B4 6B 7C EB 32  ...E...l..E.k..2
#     00A0: C6 8A F8 2B 32 30 CC 9F   21 1B 42 77 59 A6 0E CA  ...+20..!.BwY...
#     00B0: 15 74 4C 13 61 DD 1C BA   8C FB 89 0E 27 F0 1A 0D  .tL.a.......'...
#     00C0: 6B EB D8 72 A7 07 77 C3   7C 82 55 74 BC 83 37 03  k..r..w...Ut..7.
#     00D0: 94 1C E1 43 BA 01 94 9C   7D F8 FF DD A7 63 60 70  ...C.........c`p
#     00E0: 5F 56 BE 08 39 D5 44 B4   29 C7 BA 5B 8A 40 E7 04  _V..9.D.)..[.@..
#     00F0: 6D DF 84 FE 4F 4B 0A 7A   2C D5 E7 80 6E BB B6 0F  m...OK.z,...n...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.802 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 7D 8C FB FB F7 B7 3D   E7 47 A1 B5 23 49 8A D3  .......=.G..#I..
#     0010: BE AA 30 77 EE D8 12 63   9B D1 C5 E0 3B D4 E4 C0  ..0w...c....;...
#     0020: 7F 8B B3 1D DA 6A EE 03   CF 89 B7 CC DD 93 AE 88  .....j..........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:29.859 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7C BD 48 E9 37 CB B2 E3 51 B1 71 DC B6 BE E5 16 15 A1 70 35 4F 1D BF C9 74 C4 CC 23 FC BD F5 90",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 03:36:30.146 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 03:36:30.147 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 03:36:31.090; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 03:36:31.095; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 03:36:31.458; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:36:31.461; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 03:36:31.461; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OfM4Pe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:31.493 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 DE 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:36:04.000 UTC",
#     "not  after"         : "2024-01-23 03:36:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 52 9A AC AE 23 CC D9   E0 E4 CF 6D 1F C2 0E 94  3R...#.....m....
#         0010: 6D CA C3 6C                                        m..l
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:31.498 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F B2 8B 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:56.000 UTC",
#     "not  after"         : "2024-01-23 03:35:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:31.512 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:31.601 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:31.602 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:31.602 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:36:31.602 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:31.742 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:31.744 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:31.744 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.750 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.762 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:31.764 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "49 A9 22 C0 E8 70 39 14 0A 5C AB E1 93 FA 22 2F 9F A1 16 9F 94 AE BD C7 96 11 9B 5A A4 D2 8F C0",
#   "session id"          : "83 BC 2E 71 E4 D7 61 1F 97 17 3A 78 98 14 5D D8 C6 DA 44 10 2B 3D 06 FD C0 2C B7 75 98 A6 0D E1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 E9 02 0C 21 65 D8 37   07 0D 45 A8 91 8F CA C1  ....!e.7..E.....
#             0010: CF AA A0 D8 5D F2 C7 60   FB A9 F5 DA A7 E6 21 78  ....]..`......!x
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.865 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 B3 3A 7D BB 22 9E 7A 29 3F 48 71 B7 BB 61 4E F8 0C 0E 4A CF 0E 75 65 0F FF 91 54 63 04 3B F4",
#   "session id"          : "83 BC 2E 71 E4 D7 61 1F 97 17 3A 78 98 14 5D D8 C6 DA 44 10 2B 3D 06 FD C0 2C B7 75 98 A6 0D E1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D7 5F 73 5F DD 11 38 DC   30 40 CF 76 C0 24 E2 8B  ._s_..8.0@.v.$..
#           0010: 24 52 06 A9 3B 0E 32 E6   F5 E8 C2 63 59 84 E8 64  $R..;.2....cY..d
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.866 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.866 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.868 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.879 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.881 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.882 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.886 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.886 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.886 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.886 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.886 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.888 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.889 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.889 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.889 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.890 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.891 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.891 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.893 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 C5 A4 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:36:01.000 UTC",
#       "not  after"         : "2024-01-23 03:36:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F BD E2 A6 6B D1 B0 59   71 67 09 B5 51 F8 3A 21  ....k..Yqg..Q.:!
#           0010: 66 D0 40 62                                        f.@b
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.894 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.976 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 AD 7B 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 03:35:58.000 UTC",
#     "not  after"         : "2024-01-23 03:35:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#         0010: 54 1F D9 EA                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#         0010: 96 65 5A DA                                        .eZ.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.979 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 B1 65 BE 24 C6 34 74   51 8A 40 55 C2 4A 2B 4C  ..e.$.4tQ.@U.J+L
#     0010: 39 8C EF BA A7 DD 3C 3A   AD B4 0E FD 5C 75 C8 E2  9.....<:....\u..
#     0020: 78 C2 73 29 89 B7 35 14   3D 4D E9 6D A1 E9 C9 3C  x.s)..5.=M.m...<
#     0030: 83 78 0A C9 32 F3 31 51   B2 0D 5A 44 4D E4 0F 43  .x..2.1Q..ZDM..C
#     0040: 7C 36 13 A5 94 40 61 40   D7 8C AE A8 F9 21 55 E0  .6...@a@.....!U.
#     0050: B4 6B 12 3D 09 C9 39 07   0B 32 9C BC 4D 14 AC 20  .k.=..9..2..M..
#     0060: 35 C9 63 96 17 93 D0 FD   8F EC 69 8F 36 35 18 5E  5.c.......i.65.^
#     0070: 48 FC 6D 58 4F D9 72 A8   9B 3F F6 BF F0 DB A0 F6  H.mXO.r..?......
#     0080: 31 6C 2A 17 37 AA 8B 44   A4 4E A9 8D D0 93 2F 80  1l*.7..D.N..../.
#     0090: 2B 08 95 50 83 11 9F 33   4A 51 3A 66 57 66 A0 9E  +..P...3JQ:fWf..
#     00A0: E4 0E 98 AD 3D 70 DD 8F   95 D1 89 23 6E 7D 46 E2  ....=p.....#n.F.
#     00B0: AE 4F DF D8 A2 49 C8 D0   4C 9A 18 D6 74 7A 04 63  .O...I..L...tz.c
#     00C0: 37 E4 CE B1 FE 89 A8 11   73 BF 75 33 E9 19 F5 60  7.......s.u3...`
#     00D0: 7C BA B0 F3 7E 5F A2 B0   F2 53 49 46 41 60 90 C8  ....._...SIFA`..
#     00E0: CE B4 6B BA 08 C0 37 BF   BB 6E 04 36 80 64 22 B5  ..k...7..n.6.d".
#     00F0: 71 E1 FC 59 F1 57 8C D0   14 C0 2F AF 5C 02 FB 71  q..Y.W..../.\..q
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.981 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FB 90 EC 2F 1D 07 15 94   34 04 A5 22 05 B9 72 0A  .../....4.."..r.
#     0010: BB F5 0C 3D 26 D0 DD E0   80 74 A8 C1 49 DA D8 D3  ...=&....t..I...
#     0020: 8A 16 29 7A 0D AB 23 BB   D3 C7 53 E3 EF 76 26 34  ..)z..#...S..v&4
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.984 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:31.984 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.985 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:31.985 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.985 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-25 03:36:31.985 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:31.985 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.986 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:31.989 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 DE 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:36:04.000 UTC",
#       "not  after"         : "2024-01-23 03:36:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 52 9A AC AE 23 CC D9   E0 E4 CF 6D 1F C2 0E 94  3R...#.....m....
#           0010: 6D CA C3 6C                                        m..l
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 AD 7B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:35:58.000 UTC",
#       "not  after"         : "2024-01-23 03:35:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#           0010: 54 1F D9 EA                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:32.035 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 F2 62 8B C2 FA B8 71   23 9B 1D 98 B0 92 BB 1A  E.b....q#.......
#     0010: BD 26 4E 12 B0 23 DF 7D   CE 9E C7 37 6B AC 3D 10  .&N..#.....7k.=.
#     0020: 7C 5F 21 64 91 89 67 97   80 B5 AB 85 90 B7 68 4E  ._!d..g.......hN
#     0030: 5D C5 64 2E CF 36 72 F5   6F B8 AA F2 A5 54 8F 3D  ].d..6r.o....T.=
#     0040: 79 18 7C DD F3 62 5E 0E   A1 55 3F E3 A1 75 C4 53  y....b^..U?..u.S
#     0050: B8 2A 9E A7 D1 26 7E 63   FA BC 01 56 96 71 3B 0E  .*...&.c...V.q;.
#     0060: 8C 01 98 64 CA 6A 6A 2A   F2 C4 7D E5 68 95 28 03  ...d.jj*....h.(.
#     0070: 9C 91 E8 2A 40 4B 0A 86   65 1E 38 DE F5 1C C3 95  ...*@K..e.8.....
#     0080: 75 EF 22 8C 39 32 DC 9B   5B BF 1F D8 BC 7D FF 91  u.".92..[.......
#     0090: 57 FD CE 67 D0 C3 B1 B1   A6 D2 B4 B1 58 D0 64 E3  W..g........X.d.
#     00A0: DF 41 90 86 55 BE 9D 52   23 87 CF 8A EE B5 99 00  .A..U..R#.......
#     00B0: A7 61 C5 E6 D3 74 6E E3   A8 B1 B5 AF 75 08 66 BA  .a...tn.....u.f.
#     00C0: 88 8C 62 31 D7 CC 5C 3F   75 41 2A 3B FC D8 F8 2C  ..b1..\?uA*;...,
#     00D0: DE D1 99 FB 5D D9 A5 6D   EE 90 41 53 F7 9C 38 94  ....]..m..AS..8.
#     00E0: 31 1D B9 8A 3D 08 F2 6D   19 3A D6 21 5C D6 B2 F3  1...=..m.:.!\...
#     00F0: 64 24 71 D7 53 D3 45 88   68 03 36 57 DD E0 4B 8B  d$q.S.E.h.6W..K.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:32.037 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D 64 06 80 47 74 E2 C0   47 42 79 8A D9 9C E8 DA  .d..Gt..GBy.....
#     0010: 2D BA 44 89 B9 8D 05 D4   21 A1 E3 E3 67 2B 39 96  -.D.....!...g+9.
#     0020: 76 C5 64 3D 9A 16 69 F9   B7 A7 95 B6 DA 06 F3 9E  v.d=..i.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:32.037 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:32.094 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A3 36 C0 92 DC 1D BF D2 F7 57 E7 D1 B8 7D D5 C5 FE 3E 8C B0 B0 4B 79 68 98 C3 4F 6A 5D 0A D4 34",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 03:36:32.378 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 03:36:32.379 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-25 03:36:43.286; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:43.613 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 AD 7B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:35:58.000 UTC",
#       "not  after"         : "2024-01-23 03:35:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#           0010: 54 1F D9 EA                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 38 2D A1 59 E9 3F 04   2C 9A BC CC 3A 75 D1 C2  -8-.Y.?.,...:u..
#           0010: 96 65 5A DA                                        .eZ.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F B2 8B 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 03:35:56.000 UTC",
#       "not  after"         : "2024-01-23 03:35:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 49 05 0E 15 6F 47 DD   D2 0F A8 9E 4B 69 CD 67  .I...oG.....Ki.g
#           0010: 54 1F D9 EA                                        T...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 03:36:43.628 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:43.858 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.858 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:43.860 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-25 03:36:43.860 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.865 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.876 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.877 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.877 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-25 03:36:43.879 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2B 63 C9 F6 5B B6 A4 B6 5B FA 26 AF EF 3E 5F CF 77 8C 46 2A C0 52 3F FB D7 41 91 5A 80 A3 C6 52",
#     "session id"          : "1F 1A 9D A4 30 2C 7F 3B 4B 2A B5 C1 39 1F 5D 1F A8 10 19 8D 91 57 F0 23 36 C8 F1 3A 9B CE DB 06",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 39 33 BC 98 59 03 72 21   DC 0D A5 5D 3C A0 8F D3  93..Y.r!...]<...
#               0010: 0D A7 C1 EB 17 FF F9 FA   49 C7 C9 CD 0C 54 3A 35  ........I....T:5
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.896 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BB 3E 13 A1 12 E9 65 84 D2 4C C6 CD 7C 02 95 C2 B4 33 36 3B 1D 7F DC 63 99 10 75 55 45 14 C3 2E",
#     "session id"          : "1F 1A 9D A4 30 2C 7F 3B 4B 2A B5 C1 39 1F 5D 1F A8 10 19 8D 91 57 F0 23 36 C8 F1 3A 9B CE DB 06",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 88 80 5E 9B 03 C2 57 6B   97 DB 1F CA 85 60 E2 CC  ..^...Wk.....`..
#             0010: EA 66 B0 37 FA AB 6A DA   8D D3 23 F5 38 9A EC 1A  .f.7..j...#.8...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.896 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.897 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.898 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.901 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.901 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.901 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:43.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.909 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.911 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.912 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.916 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.916 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.916 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:36:43.917 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-25 03:36:43.919 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_author

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-25 03:38:04.639 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:38:04.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:38:04.683 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:38:04.683 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 03:38:04.683 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45726/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28672ms
ok 65 stop command for single port in 30972ms
ok 66 status detects locally running solr in 14355ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2181ms
ok 69 copying files around in 6592ms
ok 70 upconfig in 2646ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1222ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 43s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m7.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5731 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5731/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44467/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-24 16:43:40.749; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:43:40.754; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-24 16:43:41.984; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 16:43:42.029; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22874ms
ok 61 start solr with client truststore and security manager in 25758ms
not ok 62 start solr with mTLS needed in 59020ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-50Bhif/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44467.
#
# Started Solr server on port 44467 (pid=199860). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44468.
#
# Started Solr server on port 44468 (pid=200305). Happy searching!
#
# INFO  - 2023-10-24 16:45:06.851; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:45:06.856; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 16:45:07.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:45:07.234; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:45:07.234; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:07.267 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A2 2C 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:42.000 UTC",
#     "not  after"         : "2024-01-22 16:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FC E7 2A 02 08 D1 4B 80   55 F0 7A C3 73 33 CA 84  ..*...K.U.z.s3..
#         0010: F0 BF 52 B0                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:07.273 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3C 4A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:33.000 UTC",
#     "not  after"         : "2024-01-22 16:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:07.289 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:07.397 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:07.398 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:07.398 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:07.398 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:07.534 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.534 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:07.536 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:07.537 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.556 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.556 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:07.560 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "25 31 E6 BE 7D 27 84 DD DD 92 35 F1 1C F6 D8 1D DB 71 F5 1A 21 E6 0F CE AD EE 3A B9 1E 26 E5 72",
#   "session id"          : "D5 A6 13 64 E7 A9 F9 EB 90 75 24 EC 62 AE 35 19 25 B2 E1 85 C4 36 DD 6E 2E E8 12 B9 B0 B2 F8 A6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 28 B0 AD 72 27 73 10 97   32 C0 E7 3A B5 87 9F 38  (..r's..2..:...8
#             0010: 38 89 4D 96 4D B4 A7 1B   67 47 46 A6 D0 8B AC 68  8.M.M...gGF....h
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.675 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 1A F9 B2 0F 28 F9 E6 11 05 83 A3 19 DC A4 93 EE 0C 07 6F 4C 06 A1 3D BE C9 0E 7B 35 A4 F4 59",
#   "session id"          : "D5 A6 13 64 E7 A9 F9 EB 90 75 24 EC 62 AE 35 19 25 B2 E1 85 C4 36 DD 6E 2E E8 12 B9 B0 B2 F8 A6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1B 32 CB 68 77 28 52 08   0C 8C 61 54 96 C5 CB AD  .2.hw(R...aT....
#           0010: 46 FB E1 26 7F 51 7A 9C   07 0D 7A 6B 2B B8 B3 5E  F..&.Qz...zk+..^
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.675 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.676 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.678 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.680 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.681 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.692 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.694 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.695 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.705 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.705 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.705 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.705 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.705 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.708 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.708 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.708 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.709 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.710 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.710 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.711 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.714 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 D8 6D B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:38.000 UTC",
#       "not  after"         : "2024-01-22 16:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 19 C5 65 3D C7 1D 30   67 E2 94 56 D3 15 8F 79  ...e=..0g..V...y
#           0010: B4 23 02 67                                        .#.g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.814 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.821 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 CF D8 62 25 3F A5 2A   CE 2C 11 5C 14 AF 6B C9  ...b%?.*.,.\..k.
#     0010: 5E CC FA C1 B0 90 53 F3   F0 66 CA 4B DA 10 1D DA  ^.....S..f.K....
#     0020: DF C6 EF A5 80 F3 21 3B   15 70 80 E5 09 D0 5F C8  ......!;.p...._.
#     0030: FF 1B F9 E4 9B AC 27 02   3D 9F 9D FB 9E 37 67 0F  ......'.=....7g.
#     0040: 95 9B 5E B0 7D 92 0D F2   79 88 A1 B6 4F F1 D9 DC  ..^.....y...O...
#     0050: 50 A7 7E 45 A4 36 C6 A8   31 07 59 27 0B 1B 00 A2  P..E.6..1.Y'....
#     0060: 2D E8 85 34 E6 53 B4 AA   83 D5 22 5C FA 6C EB 4D  -..4.S...."\.l.M
#     0070: 47 C4 DA 32 5B A5 08 9E   70 95 78 D2 A2 83 42 1D  G..2[...p.x...B.
#     0080: 39 C8 A3 36 A7 C4 1A 02   06 81 14 4C D1 D2 0D 43  9..6.......L...C
#     0090: 8A E8 18 04 8B 48 A1 97   01 D6 9B 78 AC DF 7B 2A  .....H.....x...*
#     00A0: 5A E1 30 4A B7 8A D0 DA   D7 2C 4D EB B3 0C FE BD  Z.0J.....,M.....
#     00B0: 20 5A FB BA 85 04 21 45   F7 AF C5 91 10 AE 63 C6   Z....!E......c.
#     00C0: 35 D4 99 6C CD AB 62 89   A1 82 E1 97 61 06 65 E5  5..l..b.....a.e.
#     00D0: 0E 80 D4 36 82 69 16 40   C7 EC 61 D1 B2 12 8F CF  ...6.i.@..a.....
#     00E0: 08 04 24 92 28 95 EF 1C   12 D0 E2 5E E8 82 B4 9D  ..$.(......^....
#     00F0: A8 CA 1E FB F9 38 45 A5   37 E2 52 91 EA 35 48 A6  .....8E.7.R..5H.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.824 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 24 AE 3F 2E CF 79 77 A8   8C C0 F0 14 8D 4D FE A3  $.?..yw......M..
#     0010: 78 BC B9 04 03 C0 9A 59   00 B7 E3 FD D8 1E A7 A0  x......Y........
#     0020: 8E BC 9D 0E 8E 51 46 29   29 9F 3D 96 A8 63 C5 FD  .....QF)).=..c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.827 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:07.828 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.828 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:07.829 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.829 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:07.829 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:07.829 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.829 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.833 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A2 2C 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:42.000 UTC",
#       "not  after"         : "2024-01-22 16:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FC E7 2A 02 08 D1 4B 80   55 F0 7A C3 73 33 CA 84  ..*...K.U.z.s3..
#           0010: F0 BF 52 B0                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 20 47 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:35.000 UTC",
#       "not  after"         : "2024-01-22 16:44:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#           0010: 61 03 27 02                                        a.'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.872 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 52 BB ED 38 4C F4 2D   CC 48 E7 2C 6A 13 1A AC  _R..8L.-.H.,j...
#     0010: B6 DC 4E 82 AC 9B 75 31   23 D9 58 46 F7 84 9F D3  ..N...u1#.XF....
#     0020: D6 BA 00 41 14 80 BF AF   99 3A 1E B3 51 4B 60 A3  ...A.....:..QK`.
#     0030: CA 95 37 D1 BA 04 0C B8   0E 90 1D 60 6C 31 F5 0B  ..7........`l1..
#     0040: 8F C3 49 59 21 C2 DD 56   AE A1 A0 0F 00 70 BF 9B  ..IY!..V.....p..
#     0050: 80 C6 C2 73 30 81 B4 44   73 54 43 C1 84 C1 55 E8  ...s0..DsTC...U.
#     0060: 5C 8D 84 92 37 6F 9B E0   7C 3B E5 4C AC F0 16 CA  \...7o...;.L....
#     0070: C5 83 AF 46 0B CB BD 38   78 8A D4 C6 0A 6F 82 3A  ...F...8x....o.:
#     0080: 7D A3 A0 45 A6 36 C1 49   73 5A D8 E5 5A 57 DE B9  ...E.6.IsZ..ZW..
#     0090: 0F 98 79 65 37 9F A9 75   20 8D FB B7 76 90 CD FF  ..ye7..u ...v...
#     00A0: ED 3C BC ED 7F F6 FD C1   64 B6 04 4E C1 0C 53 6D  .<......d..N..Sm
#     00B0: 44 A0 4B DF 08 6E 4A 08   6D 16 26 72 1D 91 16 4A  D.K..nJ.m.&r...J
#     00C0: 59 23 04 EE 65 C5 87 E6   09 CA 03 14 F8 1E F1 B8  Y#..e...........
#     00D0: A5 50 D1 E4 2C FD AA 34   9D 45 3F 40 1E 2B B2 15  .P..,..4.E?@.+..
#     00E0: E7 BB 8D AC 5F DF 3E 0A   15 29 65 E4 EA 3E 92 8B  ...._.>..)e..>..
#     00F0: F3 02 D9 34 68 8D F9 8C   A6 54 D9 E7 48 11 FB 58  ...4h....T..H..X
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.873 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FD C3 A2 2B 81 90 E8 51   5D A8 AC 32 7D AE 01 54  ...+...Q]..2...T
#     0010: 9D 45 32 D0 F6 CA 1A 7F   79 17 0F 58 CF 75 A2 C5  .E2.....y..X.u..
#     0020: 2F A9 F0 95 3F D3 DD 62   04 03 5A 58 42 0F 35 C0  /...?..b..ZXB.5.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.874 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:07.933 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "76 0A 31 33 13 EB 4E A0 FA 05 D2 6B 63 E2 5F E1 05 B7 73 9B 1F F6 C4 2B EF 40 91 BD 29 9E 6C 23",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-24 16:45:08.229 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-24 16:45:08.230 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-24 16:45:09.211; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 16:45:09.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 16:45:09.584; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:45:09.587; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@663411de(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 16:45:09.587; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@63dd899(ca,h=[localhost],a=[],w=[]) for Client@62e20a76[provider=null,keyStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-50Bhif/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:09.622 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A2 2C 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:42.000 UTC",
#     "not  after"         : "2024-01-22 16:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FC E7 2A 02 08 D1 4B 80   55 F0 7A C3 73 33 CA 84  ..*...K.U.z.s3..
#         0010: F0 BF 52 B0                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:09.627 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 3C 4A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:33.000 UTC",
#     "not  after"         : "2024-01-22 16:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:09.644 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:09.921 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:09.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:09.922 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:45:09.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:10.072 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.072 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:10.074 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:10.074 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.081 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.097 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.097 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:10.100 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0B D9 77 6B 33 19 D1 0D 07 2B 18 A1 49 1B 1A D5 05 24 48 EB 9B 21 1A 79 BE 3C 86 AB 1F BD 24 18",
#   "session id"          : "78 8F A2 6A B9 0E 1A C4 E3 85 02 55 EC 34 4B 9C BC 56 D5 A9 F9 B2 9A A8 96 4E 01 F4 E1 CC F0 08",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 5D C2 DA 24 42 44 C2   4C 2E 76 7C 60 A0 F6 A7  .]..$BD.L.v.`...
#             0010: 64 6B DE 87 F1 FC AC E3   EC 77 EF 44 64 5C 57 02  dk.......w.Dd\W.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.218 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DB E3 0C C8 EE 40 C3 A6 30 ED 64 43 26 12 47 09 9D 26 B4 25 AA A6 0C 50 9A A4 4C 16 C6 8C 57 1E",
#   "session id"          : "78 8F A2 6A B9 0E 1A C4 E3 85 02 55 EC 34 4B 9C BC 56 D5 A9 F9 B2 9A A8 96 4E 01 F4 E1 CC F0 08",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CC AA 38 D8 D9 12 92 66   54 7C 25 79 29 23 E4 D0  ..8....fT.%y)#..
#           0010: D6 7B D6 5B 93 CD 71 38   A9 42 D0 74 A7 86 11 5B  ...[..q8.B.t...[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.219 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.219 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.220 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.220 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.221 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.224 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.225 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.225 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.225 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.226 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.227 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.236 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.238 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.240 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.249 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.249 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.250 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.250 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.250 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.251 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.251 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.253 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.253 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.253 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.254 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.255 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.256 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.261 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 D8 6D B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:38.000 UTC",
#       "not  after"         : "2024-01-22 16:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 19 C5 65 3D C7 1D 30   67 E2 94 56 D3 15 8F 79  ...e=..0g..V...y
#           0010: B4 23 02 67                                        .#.g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.370 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 20 47 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 16:44:35.000 UTC",
#     "not  after"         : "2024-01-22 16:44:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#         0010: 61 03 27 02                                        a.'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#         0010: D3 09 4A 55                                        ..JU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.377 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0D 79 B6 C1 5B 1F 87 40   E9 55 1D E5 E8 43 23 8E  .y..[..@.U...C#.
#     0010: 81 71 FA 39 30 9E 6B 3C   12 31 DF 8A 5C CD CE E8  .q.90.k<.1..\...
#     0020: 64 BA 8D 1D B6 1A 32 B2   0A FC D3 CF 57 6D B1 07  d.....2.....Wm..
#     0030: 2B 20 2E FD 2C 49 4A 56   EC 5A 72 4A F4 3A B8 2F  + ..,IJV.ZrJ.:./
#     0040: 7B 2F 67 29 6B 2C 08 03   70 94 F7 B6 6D 50 56 8C  ./g)k,..p...mPV.
#     0050: 26 5F 76 11 76 28 33 9F   BB DD 1A 13 B5 28 0F A6  &_v.v(3......(..
#     0060: 52 51 F7 55 50 F0 41 6A   3C D3 27 8B 3D AC BE A0  RQ.UP.Aj<.'.=...
#     0070: 72 3E E4 B5 F4 D1 0F 58   F9 D2 0A D4 D2 EF F2 7A  r>.....X.......z
#     0080: 3B 77 15 E7 D9 EA 38 3E   E4 B3 93 72 D5 4A F3 2D  ;w....8>...r.J.-
#     0090: E1 51 5B B9 DC 29 73 ED   F5 11 86 5D 85 4B 69 39  .Q[..)s....].Ki9
#     00A0: 50 50 1B 46 A4 99 0C CC   5F 6B 51 8C AE 1C 78 67  PP.F...._kQ...xg
#     00B0: 14 0E 78 50 78 E0 E9 30   CA AF 97 D3 39 D7 05 35  ..xPx..0....9..5
#     00C0: 26 BC C8 DA 02 D2 1C 59   04 A9 8F 40 5B E9 F9 CA  &......Y...@[...
#     00D0: FE 37 D5 7F 4C DF 5F DA   C7 4F 63 78 A5 D8 5C 28  .7..L._..Ocx..\(
#     00E0: 35 B9 27 12 CF 6F A3 67   49 E3 34 AE 54 DC 25 1A  5.'..o.gI.4.T.%.
#     00F0: 1D B2 CB 1A 2F 66 F3 04   3D A5 F3 D1 C9 1A 1C C8  ..../f..=.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.380 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E 9F 0D EC E3 10 52 C1   FD 5F C9 AC 20 8B 2E A9  ......R.._.. ...
#     0010: A4 BE 6E 85 E0 5A 1B 53   46 5B 9C 8A CB FD 8E 8D  ..n..Z.SF[......
#     0020: C6 CE 51 95 62 73 EF 9D   95 9F E2 D5 3E 30 9D 0B  ..Q.bs......>0..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.384 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:10.385 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.385 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:10.385 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.386 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 16:45:10.386 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:10.386 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.387 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.390 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A2 2C 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:42.000 UTC",
#       "not  after"         : "2024-01-22 16:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FC E7 2A 02 08 D1 4B 80   55 F0 7A C3 73 33 CA 84  ..*...K.U.z.s3..
#           0010: F0 BF 52 B0                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 20 47 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:35.000 UTC",
#       "not  after"         : "2024-01-22 16:44:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#           0010: 61 03 27 02                                        a.'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.430 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 C9 27 1B 93 55 BB 75   16 F3 76 03 E7 5E 9D AC  H.'..U.u..v..^..
#     0010: FC 9D C5 22 99 F6 59 BC   53 B2 19 E2 71 EA 6A 86  ..."..Y.S...q.j.
#     0020: D7 6D B7 D4 05 51 29 FA   1F 24 5B 3F B6 7F 0D 12  .m...Q)..$[?....
#     0030: 06 FD 5B 6D A6 2E 36 7C   2A A9 DC 67 67 A0 B4 2D  ..[m..6.*..gg..-
#     0040: D8 9A 5E E4 0C E4 CC A1   19 F4 69 C4 E1 4C EF 31  ..^.......i..L.1
#     0050: 56 EC 8E 44 AC 8B 02 97   2B 39 C9 92 C2 FC 3D 34  V..D....+9....=4
#     0060: 55 56 30 2C A1 B2 DD AF   EF 0B 91 77 A0 EE F5 F4  UV0,.......w....
#     0070: 54 A5 20 6F C5 DE 10 E4   FC 71 A3 94 8F F3 6C 2E  T. o.....q....l.
#     0080: 23 CC 52 B4 AB 0A 9D 47   03 EA 92 E2 41 91 DA 2B  #.R....G....A..+
#     0090: C2 99 79 FE F0 74 FC F9   2E 52 D6 9F 0E 83 CF 56  ..y..t...R.....V
#     00A0: 7E C3 11 7E 5C FA DE 46   09 CE 10 4A A5 EF F0 5B  ....\..F...J...[
#     00B0: D2 24 61 66 9E C5 77 87   50 6E EB 63 17 EA 53 24  .$af..w.Pn.c..S$
#     00C0: 5B 2F D5 A5 30 A1 44 DD   54 3A 8D C3 8B 61 42 F8  [/..0.D.T:...aB.
#     00D0: EF 79 FE 6F 39 6B AE 9E   F6 BE 4A BB F4 FB 6E D0  .y.o9k....J...n.
#     00E0: F7 3A D1 3D 9A A4 56 B3   72 D1 49 AC CF A4 8C CA  .:.=..V.r.I.....
#     00F0: FF F9 31 30 FE B4 7E 32   7E 1C 0A E2 E4 D4 A8 54  ..10...2.......T
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.431 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C4 31 BB 1F 03 E6 ED 86   35 85 02 23 46 E9 6A D1  .1......5..#F.j.
#     0010: C6 8F AC 10 E5 3A 82 59   F8 C1 76 3F 06 34 4B 61  .....:.Y..v?.4Ka
#     0020: AF F6 72 5E AC C7 D1 BD   60 B8 E4 B4 15 1C 16 CB  ..r^....`.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.432 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:10.495 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AB CF 58 4D 5B FE 86 49 29 20 80 26 49 0A 83 82 1B C7 D0 0A E0 9A 25 68 1B B7 69 8E 3C DD 52 DF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-24 16:45:10.778 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-24 16:45:10.779 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-24 16:45:22.470; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:22.828 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 20 47 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:35.000 UTC",
#       "not  after"         : "2024-01-22 16:44:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#           0010: 61 03 27 02                                        a.'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F5 CB FA C1 DA 8C 6D   61 07 7C DB 26 AB B8 2F  .......ma...&../
#           0010: D3 09 4A 55                                        ..JU
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 3C 4A AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 16:44:33.000 UTC",
#       "not  after"         : "2024-01-22 16:44:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 2B 17 60 07 5C 17 10   F6 68 2A 75 B0 78 5A 3D  <+.`.\...h*u.xZ=
#           0010: 61 03 27 02                                        a.'.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-24 16:45:22.845 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:23.082 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:23.084 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 16:45:23.085 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.105 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.105 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 16:45:23.109 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C0 D0 61 76 49 D3 D7 E0 69 F8 35 38 0B 96 FB 44 DE E4 8D 4E 86 C6 E3 59 FB 27 42 99 13 BB FE 0C",
#     "session id"          : "3B 8A D2 AC BE 95 87 92 D2 88 51 C6 A5 B9 99 37 2E BC 13 4F 12 C8 96 2B 05 8A 56 5A B2 24 A6 68",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 02 F7 E3 5A EE 2F 02 B8   E3 E2 6C 4F 21 2A CE B3  ...Z./....lO!*..
#               0010: 3D F0 DA 59 56 25 11 D0   F5 FE F5 0A CE 7B 16 55  =..YV%.........U
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.129 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BF 4B 94 EF 61 D2 DC E5 F6 3F 61 16 38 3B 78 EA B4 A7 E4 F4 D3 C9 21 65 4B 49 BB 26 93 03 D0 6A",
#     "session id"          : "3B 8A D2 AC BE 95 87 92 D2 88 51 C6 A5 B9 99 37 2E BC 13 4F 12 C8 96 2B 05 8A 56 5A B2 24 A6 68",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 12 CF BD 01 FC E3 52   2C E7 F4 C2 04 47 86 69  Y......R,....G.i
#             0010: 61 B2 32 21 B8 D5 BB C4   CD 83 AD C8 3C E3 C4 4A  a.2!........<..J
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.130 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.130 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.132 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.134 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.145 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.147 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.148 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.158 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.158 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.159 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:23.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:45:23.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 16:45:23.161 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 16:46:45.455 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:46:45.498 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:46:45.498 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:46:45.499 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 16:46:45.499 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44468/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28502ms
ok 65 stop command for single port in 31076ms
ok 66 status detects locally running solr in 14465ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2209ms
ok 69 copying files around in 6826ms
ok 70 upconfig in 2836ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1255ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1269ms
ok 73 Cleanup in 1232ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 47s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m18.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5730 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5730/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39165/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-24 07:07:58.685; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 07:07:58.690; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-24 07:07:59.916; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-24 07:07:59.960; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23313ms
ok 61 start solr with client truststore and security manager in 25341ms
not ok 62 start solr with mTLS needed in 60688ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-aANn1l/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39165.
#
# Started Solr server on port 39165 (pid=200846). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39166.
#
# Started Solr server on port 39166 (pid=201296). Happy searching!
#
# INFO  - 2023-10-24 07:09:23.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 07:09:23.740; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 07:09:24.121; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 07:09:24.124; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 07:09:24.124; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:24.158 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9E A9 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:59.000 UTC",
#     "not  after"         : "2024-01-22 07:08:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 7C 3F 19 11 66 87 7C   F5 35 FC A3 7D 52 EF EC  ..?..f...5...R..
#         0010: 57 29 90 28                                        W).(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:24.163 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C F8 C7 D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:51.000 UTC",
#     "not  after"         : "2024-01-22 07:08:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:24.178 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:24.529 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:24.530 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:24.530 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:24.530 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:24.683 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.684 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:24.685 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:24.686 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.692 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.704 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:24.707 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "88 2F 8C A6 5A 6E 9D 56 A5 6D C3 57 8B 84 6E C4 10 FF 24 60 5A 48 E1 FE 8A 18 D4 80 97 4F 93 BD",
#   "session id"          : "26 4C 27 CF CA 1E 1F 54 29 12 60 1B F2 01 27 33 5C 3D 4A 67 36 2D 1E 69 0B F6 76 FD 23 C1 DB EA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A5 A2 C8 0D E7 4B A3 F5   3B A8 2B F2 D2 4C 16 FE  .....K..;.+..L..
#             0010: 9E 33 EA EC CC 89 7A C2   EE F9 BC EA EF EF 85 28  .3....z........(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.813 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "27 EA 1E CA 49 C2 F5 3C 7D 81 60 77 8E BC 13 31 2A E6 3F BA 0E FE F8 F1 32 50 0A 4B 81 BB C7 76",
#   "session id"          : "26 4C 27 CF CA 1E 1F 54 29 12 60 1B F2 01 27 33 5C 3D 4A 67 36 2D 1E 69 0B F6 76 FD 23 C1 DB EA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 05 3F 31 FD F6 A3 8D 64   8E 93 A5 1A 54 DB E2 99  .?1....d....T...
#           0010: FD 34 B3 CD 0A 00 CC 97   1F A6 50 EB 8F 49 BB 34  .4........P..I.4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.813 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.813 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.816 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.818 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.818 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.818 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.828 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.830 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.831 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.834 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.836 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.836 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.837 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.838 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.838 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.838 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.840 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.840 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.841 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.844 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 80 DC BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:55.000 UTC",
#       "not  after"         : "2024-01-22 07:08:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 1B 09 5B A3 E1 53 A8   AC 82 FE 44 D2 2C 4C F8  ...[..S....D.,L.
#           0010: 5A 9A E1 3C                                        Z..<
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.845 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.945 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.949 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 16 B8 20 7F F0 47 E8   BF E8 E7 E6 76 E3 34 CE  ... ..G.....v.4.
#     0010: 6A 4A 3E D5 C5 5E 0B 3C   A8 9E EE 4D 51 28 55 78  jJ>..^.<...MQ(Ux
#     0020: A7 95 8B 27 35 FB 80 07   5B EA 91 A1 3E 0B 3F DD  ...'5...[...>.?.
#     0030: B9 CF DD 26 90 56 D0 07   9B 13 F6 E5 20 C3 63 2B  ...&.V...... .c+
#     0040: C5 93 49 33 3B B4 99 50   10 49 EC E0 7B 79 CD 14  ..I3;..P.I...y..
#     0050: 6F 5E 40 2A C9 E2 16 60   A5 BE 54 FA 0F B5 12 7F  o^@*...`..T.....
#     0060: 7C 46 97 E5 14 F5 F5 35   16 5F 61 46 D9 CB 05 51  .F.....5._aF...Q
#     0070: C5 51 CF C2 EC B2 90 72   28 7F 7D 6E 43 72 9C 38  .Q.....r(..nCr.8
#     0080: B7 72 12 CA C0 67 90 06   04 F4 78 17 2C FE EB C1  .r...g....x.,...
#     0090: A9 BA 2D 98 80 A7 52 C1   3F 38 3C AD DD A4 0F 28  ..-...R.?8<....(
#     00A0: 5A 23 3E 17 31 62 82 30   7D D8 C3 29 97 9C 09 AE  Z#>.1b.0...)....
#     00B0: 8C AB E1 17 DA 0B 9F 06   1A C3 F2 5D B5 7E 55 82  ...........]..U.
#     00C0: BB 50 2E D1 7F 2C 3D 91   9F 60 69 32 C3 D9 0C 9E  .P...,=..`i2....
#     00D0: 75 39 6C 4C C5 13 5F 21   E0 A7 4E 60 91 C2 C1 AF  u9lL.._!..N`....
#     00E0: 68 E7 86 BC 09 17 1B 33   08 FE F6 F2 65 B9 D1 3A  h......3....e..:
#     00F0: 37 61 09 70 68 0F 30 1C   56 17 F6 A1 55 7A AB 42  7a.ph.0.V...Uz.B
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.950 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 47 85 21 E7 4F 07 B4 D1   49 27 7A B5 43 EF E9 89  G.!.O...I'z.C...
#     0010: B6 A4 81 A6 C9 EC 3E 64   95 4F D0 F7 BD F0 E3 F0  ......>d.O......
#     0020: 64 E4 A3 61 D3 79 F1 F5   17 0F D7 12 E4 0B 0A C3  d..a.y..........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.953 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:24.954 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.954 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:24.954 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.954 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:24.955 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:24.955 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.955 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.958 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 9E A9 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:59.000 UTC",
#       "not  after"         : "2024-01-22 07:08:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 7C 3F 19 11 66 87 7C   F5 35 FC A3 7D 52 EF EC  ..?..f...5...R..
#           0010: 57 29 90 28                                        W).(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 9D 63 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:53.000 UTC",
#       "not  after"         : "2024-01-22 07:08:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#           0010: D4 3A 7C 8C                                        .:..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.984 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 21 03 5A 66 57 D7 03 F4   1E 3B DC E7 7E 2E BF 55  !.ZfW....;.....U
#     0010: F0 EF 7E 5D 55 4D FF 48   AE AA 37 83 48 60 EB 18  ...]UM.H..7.H`..
#     0020: CD B1 0C 93 C5 03 9E 94   20 2F 70 27 9B 3C 8B C7  ........ /p'.<..
#     0030: D4 F4 47 F8 D3 9D 2F 03   FB FF BA FF 35 A4 90 12  ..G.../.....5...
#     0040: 31 B8 58 FA AE 95 C2 C9   F3 28 C0 FA 3D AE 1F 11  1.X......(..=...
#     0050: F3 4E 36 E5 7B 65 2B 14   D8 C1 CB 9B 45 D0 F2 66  .N6..e+.....E..f
#     0060: CC 7A C4 6F 2A B2 3F 8F   9D C2 CE 29 96 02 6B 31  .z.o*.?....)..k1
#     0070: 12 BA F2 7F 70 7C F1 F5   E4 1D 66 A8 15 27 9E 48  ....p.....f..'.H
#     0080: F5 A2 88 22 A3 4B C7 31   4B 7D A2 D6 5F FC 97 DE  ...".K.1K..._...
#     0090: A4 E7 B1 8F FD 6A 19 68   A2 F5 CC B2 F0 F1 4B 0A  .....j.h......K.
#     00A0: 95 A4 DA 22 E7 95 F9 FF   D3 79 A7 4C 0E 74 47 7D  ...".....y.L.tG.
#     00B0: 1A 38 96 3D 5A 65 C2 6E   4B 47 6F E0 4C A2 48 8C  .8.=Ze.nKGo.L.H.
#     00C0: E5 A1 A2 B9 53 B4 0A 7F   54 2A 49 14 ED C4 3B C6  ....S...T*I...;.
#     00D0: 42 F1 D7 C0 23 62 71 78   F6 77 E4 74 F5 FE 48 7E  B...#bqx.w.t..H.
#     00E0: 05 98 2E ED D8 9B 9A C6   29 72 3F 86 AF CC 6A 89  ........)r?...j.
#     00F0: 7C FD 00 F4 F0 48 4C 80   FB EB 7D 64 52 BF 3F 5A  .....HL....dR.?Z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.985 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 55 97 63 E4 AA 1F C0 EC   BF 3A AA 99 3F 40 89 8F  U.c......:..?@..
#     0010: 9D BD E3 56 13 67 EB 0F   D5 C7 66 E4 A6 EC 71 8E  ...V.g....f...q.
#     0020: EA C6 F9 B1 3B C3 F4 AB   C1 93 BA 7B 23 DE A7 68  ....;.......#..h
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:24.986 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:25.047 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "01 08 51 18 4A C1 66 4E 83 F4 21 E9 33 12 E4 2F 37 EC 6C BE 72 08 14 5E 6D 22 2F D7 86 DE 68 57",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-24 07:09:25.331 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-24 07:09:25.332 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-24 07:09:26.261; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-24 07:09:26.266; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-24 07:09:26.625; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 07:09:26.628; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-24 07:09:26.629; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aANn1l/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:26.660 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9E A9 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:59.000 UTC",
#     "not  after"         : "2024-01-22 07:08:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 7C 3F 19 11 66 87 7C   F5 35 FC A3 7D 52 EF EC  ..?..f...5...R..
#         0010: 57 29 90 28                                        W).(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:26.665 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C F8 C7 D5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:51.000 UTC",
#     "not  after"         : "2024-01-22 07:08:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:26.679 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:26.911 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.911 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:26.913 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:26.913 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.918 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.929 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.930 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.930 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:26.932 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9E 8B 48 0C 46 15 8E 11 04 8F B2 F0 D7 E1 52 62 30 AD 5D AB 12 63 DD 32 D0 A5 51 23 A0 5D 81 A5",
#   "session id"          : "FA A8 FE 31 A6 0F AD D1 F7 F9 45 6E 13 16 65 8A 33 67 EC 77 1D 8F 94 72 1D 80 31 1E B9 9E 63 35",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 08 B8 86 B3 96 FB 0B 76   B2 99 2E AD EB BC 41 41  .......v......AA
#             0010: AE A7 83 68 8E DF 76 29   C1 16 FF D8 55 F0 67 1C  ...h..v)....U.g.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.033 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "95 EC 9D F9 FF 29 E0 BE 01 C4 14 B5 EF 64 1C 33 76 5D 2E 75 42 79 4F DE 69 AF 64 3B 6B AF C5 85",
#   "session id"          : "FA A8 FE 31 A6 0F AD D1 F7 F9 45 6E 13 16 65 8A 33 67 EC 77 1D 8F 94 72 1D 80 31 1E B9 9E 63 35",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2F 86 36 7C EE AC E1 7C   5B 6C 8D CA 95 4A AF 4B  /.6.....[l...J.K
#           0010: A5 19 31 A7 84 59 43 41   2F 29 92 12 3D CA 79 4C  ..1..YCA/)..=.yL
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.033 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.034 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.036 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.038 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.039 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.040 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.041 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.041 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.048 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.050 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.051 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.054 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.057 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.057 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.058 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.058 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.059 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.059 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.059 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.062 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 80 DC BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:55.000 UTC",
#       "not  after"         : "2024-01-22 07:08:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 1B 09 5B A3 E1 53 A8   AC 82 FE 44 D2 2C 4C F8  ...[..S....D.,L.
#           0010: 5A 9A E1 3C                                        Z..<
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.063 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:27.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:27.121 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:27.121 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:09:27.121 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.145 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 9D 63 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-24 07:08:53.000 UTC",
#     "not  after"         : "2024-01-22 07:08:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#         0010: D4 3A 7C 8C                                        .:..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#         0010: 64 56 03 06                                        dV..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.149 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 61 0D 9C 84 BC 80 A2 C9   C8 58 61 57 ED 73 6D 65  a........XaW.sme
#     0010: F9 4A 21 4D D6 A2 52 EB   2F 63 2A C6 62 00 5A 0B  .J!M..R./c*.b.Z.
#     0020: 00 FC BF 58 71 B7 BA 84   23 E1 88 2C 6F 75 8D B1  ...Xq...#..,ou..
#     0030: 37 38 2A 81 77 74 0D DA   FF FD 1D 02 08 0C E1 62  78*.wt.........b
#     0040: 6A 67 43 9E 86 DF 16 27   6F 45 11 99 5F 73 64 9E  jgC....'oE.._sd.
#     0050: EC 33 84 B6 D0 C9 CC 62   B2 66 51 C6 B2 65 3C 67  .3.....b.fQ..e<g
#     0060: D4 23 9F E7 DF C5 0C 25   D5 05 BC 6A B0 5F B5 0C  .#.....%...j._..
#     0070: 8E B1 02 D5 B9 7A 9A F4   AA 8C 0F 91 2C 57 37 6D  .....z......,W7m
#     0080: 59 D5 3F 42 CB 09 4C 3F   5F EF CE 26 40 79 5F 62  Y.?B..L?_..&@y_b
#     0090: 90 6A 36 61 36 20 75 BA   BD 88 8D 9F 8C D8 D2 11  .j6a6 u.........
#     00A0: D4 4B 42 19 71 57 3D 21   AB 61 6D 45 C9 CB B8 69  .KB.qW=!.amE...i
#     00B0: AB 4C AB B0 75 B1 15 C3   BA 9E 7F F5 CA D2 BF 58  .L..u..........X
#     00C0: 4E 22 BD 0A 68 2C BE B3   E1 60 13 C7 7A A0 1D 37  N"..h,...`..z..7
#     00D0: 82 8B 9B 4E D5 EA 4F 96   6A 54 0E F4 5E E0 A7 49  ...N..O.jT..^..I
#     00E0: 81 9A E9 5A D8 28 90 A1   1F 69 D3 33 68 3D AA F2  ...Z.(...i.3h=..
#     00F0: 34 B4 56 28 C5 F3 D0 0F   9D 3A 22 AC 9D 4F 05 5F  4.V(.....:"..O._
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.152 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 23 4C 0D 7C 61 55 B6 49   91 2F 65 7D 45 40 04 FF  #L..aU.I./e.E@..
#     0010: 64 EB CC C1 93 28 10 D8   0F 25 FD 47 67 EB 2D 53  d....(...%.Gg.-S
#     0020: F2 00 A1 1A 57 05 FB 86   02 D1 B3 36 EB 63 F7 2E  ....W......6.c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.154 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:27.155 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.155 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:27.155 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-24 07:09:27.156 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:27.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.156 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.159 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 9E A9 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:59.000 UTC",
#       "not  after"         : "2024-01-22 07:08:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 7C 3F 19 11 66 87 7C   F5 35 FC A3 7D 52 EF EC  ..?..f...5...R..
#           0010: 57 29 90 28                                        W).(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 9D 63 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:53.000 UTC",
#       "not  after"         : "2024-01-22 07:08:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#           0010: D4 3A 7C 8C                                        .:..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.184 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 A2 4A F8 B4 C7 1D 8C   F6 EE 59 0B F2 76 7A 69  ..J.......Y..vzi
#     0010: 98 F3 4D FE 98 96 66 36   E5 F8 19 6A 2B 58 DF 13  ..M...f6...j+X..
#     0020: EE 92 9B 0E E5 14 BA 5B   A0 41 17 71 CA AB 8B C5  .......[.A.q....
#     0030: 3F D2 DE 4A 2B A2 F2 71   0A 17 0A 3A 74 9B A4 BF  ?..J+..q...:t...
#     0040: 71 F5 A5 FF 2C 47 90 C6   EC 9A 50 C7 1B 12 F4 AB  q...,G....P.....
#     0050: 54 BB CB 53 E7 0A 9B DF   B6 04 D1 BB C3 10 72 CA  T..S..........r.
#     0060: BA FD CD 3A 3D 0A 74 19   46 8F 12 F4 6A 4C E1 73  ...:=.t.F...jL.s
#     0070: EB 78 E2 7E FC 81 6D 0E   03 F2 BA BB C3 70 2F A7  .x....m......p/.
#     0080: 98 83 A3 9A 14 A4 B8 8B   2B 82 F5 00 F5 EE F0 46  ........+......F
#     0090: FC 55 87 94 37 C9 E7 F7   16 63 3B 72 41 3A CF 0A  .U..7....c;rA:..
#     00A0: ED 76 A8 C4 01 11 45 FD   15 12 02 F7 62 E5 D2 79  .v....E.....b..y
#     00B0: 27 95 8C AD 2D 78 78 83   E4 84 EE 0C A5 44 90 E3  '...-xx......D..
#     00C0: E9 60 F7 7D AF 1C 89 A0   E9 24 B0 AA 04 86 48 08  .`.......$....H.
#     00D0: 8B D7 E3 37 6A 12 A2 26   8C 1A 48 2B BD 23 F5 E8  ...7j..&..H+.#..
#     00E0: AD DE 92 82 F7 16 6F 4D   6D 41 7A 4C 52 C3 38 C7  ......oMmAzLR.8.
#     00F0: 2A 84 E0 E1 08 9B 17 EF   F9 4A AA 4C 1D 51 D0 4C  *........J.L.Q.L
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.185 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 32 32 81 2C B9 38 36 32   E3 2F 54 4E DC DE A1 28  22.,.862./TN...(
#     0010: C8 58 AE 9F 99 42 ED 42   9E 20 59 23 30 D0 38 9F  .X...B.B. Y#0.8.
#     0020: FD 4B E3 79 D5 DA 18 21   98 60 AB A7 2F 0B 4F 15  .K.y...!.`../.O.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.186 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:27.240 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AD 51 B5 78 2B 07 7C 80 DB E7 2C B5 4E CC 04 09 19 E2 E6 07 49 8B E0 A5 0F DE 06 71 03 A2 BD 88",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-24 07:09:27.518 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-24 07:09:27.519 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-24 07:09:38.597; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:38.912 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 9D 63 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:53.000 UTC",
#       "not  after"         : "2024-01-22 07:08:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#           0010: D4 3A 7C 8C                                        .:..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 AF F0 4C 8F 03 09 A6   7B 4F 54 07 DA 53 EB B2  "..L.....OT..S..
#           0010: 64 56 03 06                                        dV..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C F8 C7 D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-24 07:08:51.000 UTC",
#       "not  after"         : "2024-01-22 07:08:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 76 CD A1 DB 63 DC BB   D1 BD 1E 01 A0 70 FB CD  .v...c.......p..
#           0010: D4 3A 7C 8C                                        .:..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-24 07:09:38.929 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:39.165 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.165 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:39.167 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-24 07:09:39.167 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.184 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.184 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.184 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-24 07:09:39.187 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "77 52 23 3A 48 48 47 09 12 92 77 E5 71 1F 96 58 DD D4 01 C2 4E 9C CF 86 0F F9 55 1C B0 4C 33 2C",
#     "session id"          : "B2 CA B9 D9 4D F8 2C FF 8E 19 A1 97 5E F6 33 BC 0B A7 2E 0F 40 DF 6E E1 B8 46 4B 40 61 88 CE CF",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 59 19 98 AA 1D 2D DA FC   91 0F 36 7D 65 FD FF CB  Y....-....6.e...
#               0010: 31 AB C0 50 A6 20 40 2B   1F B2 0A 80 00 6D BA 27  1..P. @+.....m.'
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.206 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "9E 39 2F DE EF D0 C2 49 EC 9C 43 E3 D9 7B 4F D2 B4 AA B9 0C AE B5 0C C5 4E F2 78 9C 62 39 F7 B9",
#     "session id"          : "B2 CA B9 D9 4D F8 2C FF 8E 19 A1 97 5E F6 33 BC 0B A7 2E 0F 40 DF 6E E1 B8 46 4B 40 61 88 CE CF",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 CB D1 88 07 20 99 BC   39 D3 61 E9 C9 BF D7 5D  b.... ..9.a....]
#             0010: 07 2C EF 74 F8 09 F1 D0   0A 99 03 BF 02 04 0D 77  .,.t...........w
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.206 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.206 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.208 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.210 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.219 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.221 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.222 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.225 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:09:39.226 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-24 07:09:39.228 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "cert

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-24 07:11:02.888 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:11:02.937 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:11:02.938 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:11:02.938 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-24 07:11:02.938 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39166/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28721ms
ok 65 stop command for single port in 31115ms
ok 66 status detects locally running solr in 14367ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2180ms
ok 69 copying files around in 6629ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1230ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 41s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m6s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5729 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5729/

All tests passed

Build Log:
[...truncated 1317 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38281/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-23 23:49:54.001; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:49:54.006; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-23 23:49:54.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 23:49:54.946; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22867ms
ok 61 start solr with client truststore and security manager in 24953ms
not ok 62 start solr with mTLS needed in 57615ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-LuBppT/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38281.
#
# Started Solr server on port 38281 (pid=200469). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38282.
#
# Started Solr server on port 38282 (pid=200896). Happy searching!
#
# INFO  - 2023-10-23 23:51:17.880; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:51:17.885; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 23:51:18.266; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:51:18.269; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:51:18.270; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:18.303 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F BF 45 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:54.000 UTC",
#     "not  after"         : "2024-01-21 23:50:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 5D 9E 22 D0 BB CB E8   88 C0 AA 3C 42 03 05 56  .].".......<B..V
#         0010: 73 CC 76 88                                        s.v.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:18.308 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 2E 1E 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:45.000 UTC",
#     "not  after"         : "2024-01-21 23:50:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:18.323 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:18.650 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:18.650 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:18.651 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:18.651 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:18.802 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:18.804 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:18.804 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.823 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:18.826 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C8 DA DC 2C 04 CB F5 94 AD B2 85 21 06 98 9A F9 9A 80 98 F1 F6 00 C8 FE 44 9A E7 D4 4B C0 73 CF",
#   "session id"          : "75 39 DF 74 71 9C E3 6C 31 6D 09 33 70 B7 DC 7D 02 51 67 70 D4 B7 E2 7A 92 61 9C 0E F3 09 14 01",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8C 71 93 A0 B8 5A F3 AB   2D 70 18 97 76 D4 6C E3  .q...Z..-p..v.l.
#             0010: 57 40 43 A5 EE 19 AA 34   A9 C5 8A 03 43 D6 6D 35  W@C....4....C.m5
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 53 43 BC 07 BA 7A F2 71 4F F7 7F C1 71 77 CF FD 8E 09 B0 48 E8 06 A4 51 08 37 B3 64 E8 FB EF",
#   "session id"          : "75 39 DF 74 71 9C E3 6C 31 6D 09 33 70 B7 DC 7D 02 51 67 70 D4 B7 E2 7A 92 61 9C 0E F3 09 14 01",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7C 62 E4 78 03 0B 7C 86   C5 7C 6D E0 AF DB C5 13  .b.x......m.....
#           0010: 1D 49 F1 46 18 D3 E1 9B   0D 6C 8C 42 C5 F7 CF 7F  .I.F.....l.B....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.927 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.927 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.930 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.932 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.933 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:18.934 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.935 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.935 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.942 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.944 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.945 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.949 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.949 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.949 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.949 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.950 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:18.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:18.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.952 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.952 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.953 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.955 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:18.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.960 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 0C 27 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:50.000 UTC",
#       "not  after"         : "2024-01-21 23:50:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 29 CC EF 17 21 FE BB   F2 42 B5 42 1A 56 7D 55  .)...!...B.B.V.U
#           0010: 7E A9 FE 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:18.960 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.047 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.051 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 42 A9 02 47 7C D5 98   E3 D0 55 96 76 1C 10 9D  .B..G.....U.v...
#     0010: DE F0 5D F9 20 11 48 92   C8 D8 15 BE 39 8C 3D 03  ..]. .H.....9.=.
#     0020: 65 CC 2E DD 5F D0 09 7A   46 76 49 05 76 3C 62 9A  e..._..zFvI.v<b.
#     0030: 6F 4B BE 94 A9 FA 2B C9   F7 DB 8A AB 2E 83 E5 DC  oK....+.........
#     0040: 05 D3 EF F3 0B AF 2D 4C   9B 15 46 8C 8D A6 B2 9F  ......-L..F.....
#     0050: 3E 74 8E 7E EB 07 78 75   D0 2B 37 98 79 22 7A 25  >t....xu.+7.y"z%
#     0060: 61 41 1A 65 56 B4 6E 08   9D 6F 9B 65 6B FD 0F 32  aA.eV.n..o.ek..2
#     0070: DA 30 27 2E CE 34 53 6B   CD E4 F8 30 25 B3 3C A3  .0'..4Sk...0%.<.
#     0080: 1B 85 5C 99 73 91 6B 02   8D DB 84 5F C8 98 D0 95  ..\.s.k...._....
#     0090: 58 BF 7E BE E6 5B 7B ED   6D E5 55 B1 07 45 65 27  X....[..m.U..Ee'
#     00A0: 0D 9F 8E A6 73 50 27 7A   2F D3 4F A3 80 BC E7 DB  ....sP'z/.O.....
#     00B0: 6F 09 CE 0A 07 64 CF 3D   A1 53 EC 7F 9E F4 59 AB  o....d.=.S....Y.
#     00C0: C0 95 4B 58 D3 33 2E 25   69 EC 04 96 91 E1 50 35  ..KX.3.%i.....P5
#     00D0: A4 AE 0B B2 0E AD 28 A6   24 9C CE 46 F1 E8 B2 2D  ......(.$..F...-
#     00E0: 39 B8 91 DB EC AB 80 E5   EA B9 F6 04 E6 B0 3D D7  9.............=.
#     00F0: E1 7B 07 F9 49 56 E1 78   A2 CE 4E BC 43 B5 89 B5  ....IV.x..N.C...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.053 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0F 72 CF 95 D6 39 74 3F   AB 73 8D 64 9E EF E6 53  .r...9t?.s.d...S
#     0010: 34 88 51 08 D3 D7 5D F2   E4 D9 CB 8E A9 66 C8 F5  4.Q...]......f..
#     0020: 9C 9B 91 A5 B7 2D DC 49   BA 57 85 1D 55 70 5B F7  .....-.I.W..Up[.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.055 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:19.056 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:19.057 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:19.057 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:19.057 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:19.057 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:19.058 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.058 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.061 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F BF 45 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:54.000 UTC",
#       "not  after"         : "2024-01-21 23:50:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 5D 9E 22 D0 BB CB E8   88 C0 AA 3C 42 03 05 56  .].".......<B..V
#           0010: 73 CC 76 88                                        s.v.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E AC 3F 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:47.000 UTC",
#       "not  after"         : "2024-01-21 23:50:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#           0010: 26 FF E3 80                                        &...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.087 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 51 B2 F8 B3 C5 58 42   55 2C 63 2F BB 78 BC CD  9Q....XBU,c/.x..
#     0010: 06 81 29 26 16 7A F0 B6   4A 42 BF 4A C1 76 8B B0  ..)&.z..JB.J.v..
#     0020: B9 27 F5 6E 95 5F 80 EE   D8 83 A7 B9 3B C3 F7 27  .'.n._......;..'
#     0030: 05 EB 00 4C 7B BA 49 13   CD 5B CA 60 16 36 A7 15  ...L..I..[.`.6..
#     0040: 51 3B 32 B2 89 F3 C5 9A   4A 0F B8 84 81 3D 64 D2  Q;2.....J....=d.
#     0050: E7 9D CA 19 89 C8 F6 D4   12 76 27 76 D1 CD BF 55  .........v'v...U
#     0060: EE 8F 59 81 D7 37 7D 8B   C1 7C 70 A1 70 3D 79 9D  ..Y..7....p.p=y.
#     0070: 9D 67 CB A6 37 01 BB 76   66 A3 00 BC A0 3F 2F D4  .g..7..vf....?/.
#     0080: A2 05 B6 91 2C 9A DD 7B   91 1F A1 8B B5 41 BD 42  ....,........A.B
#     0090: 74 F5 00 DF 29 7C FA 09   D6 81 A8 DD 6E 67 62 A4  t...).......ngb.
#     00A0: EC B3 CF 3E 16 F2 A3 8E   CF 01 CC 76 90 A6 BD 99  ...>.......v....
#     00B0: FB 15 D4 4C 32 AB A4 B3   03 84 54 8A 86 22 B1 15  ...L2.....T.."..
#     00C0: D2 CD 59 D0 6E 22 E4 B5   0A 88 C7 BF 3C E7 61 70  ..Y.n"......<.ap
#     00D0: FD F4 7B 3F 15 38 99 9A   E8 01 4D D5 A8 47 DD E1  ...?.8....M..G..
#     00E0: BA FF D9 A2 CF FA 87 3F   AC 82 FE 7D 91 24 FB A6  .......?.....$..
#     00F0: 42 10 9E 71 05 A7 BD 04   3A AD 08 3F 78 CD 0A 93  B..q....:..?x...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.088 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 86 AC B4 07 A0 9A 07 19   B7 2D FE 5F 26 E2 21 A0  .........-._&.!.
#     0010: 37 5B AA 9C E7 33 FC 4E   7D 9E 4D AD 2E 2E 4E 96  7[...3.N..M...N.
#     0020: 35 00 7E BA 16 05 21 D1   1E 21 61 99 5C 0D B6 A1  5.....!..!a.\...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.089 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:19.147 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C8 41 3F 8B 26 55 03 23 77 C1 55 68 2C 48 AE 5E 7E F2 76 F3 EA 02 C7 22 9A 1E 36 30 34 91 AE AE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-23 23:51:19.427 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-23 23:51:19.428 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-23 23:51:20.359; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 23:51:20.364; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 23:51:20.746; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:51:20.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 23:51:20.750; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LuBppT/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:20.782 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F BF 45 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:54.000 UTC",
#     "not  after"         : "2024-01-21 23:50:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 5D 9E 22 D0 BB CB E8   88 C0 AA 3C 42 03 05 56  .].".......<B..V
#         0010: 73 CC 76 88                                        s.v.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:20.787 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 2E 1E 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:45.000 UTC",
#     "not  after"         : "2024-01-21 23:50:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:20.801 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:20.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:20.893 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:20.893 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:51:20.894 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:21.031 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.031 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:21.033 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:21.034 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.040 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.052 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.052 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:21.055 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4B F7 6C A8 04 FA 26 7A E1 C7 91 89 A0 6C DB CF 77 D5 FF 47 BB 65 9C 7E AC 63 21 7D 73 EE 94 C3",
#   "session id"          : "1E A6 82 69 A2 88 26 7C 7D E2 06 63 9B EF 73 1E 09 51 6E F7 AC 4E 14 38 46 5F D8 3B 71 23 2F 3C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 25 54 BB D3 C5 CE BC 8B   D6 D4 B0 AE 99 A5 59 98  %T............Y.
#             0010: 2B EC A2 EF 53 26 7E 38   8F E0 F7 40 49 6C B2 7A  +...S&.8...@Il.z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.150 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "15 51 6E 12 51 F2 C8 7E DD 53 EC 36 58 3F 15 68 4D AB 26 CD C1 D0 77 F2 CB 46 B1 01 AD C6 70 A7",
#   "session id"          : "1E A6 82 69 A2 88 26 7C 7D E2 06 63 9B EF 73 1E 09 51 6E F7 AC 4E 14 38 46 5F D8 3B 71 23 2F 3C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C6 26 83 F5 8A D5 AB C1   CB 7B 7F 54 2E 44 6E 9F  .&.........T.Dn.
#           0010: 0D 93 53 63 DE 7F 40 53   F4 93 CE 48 BE 5F 0D 34  ..Sc..@S...H._.4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.151 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.154 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.156 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.156 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.156 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.157 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.165 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.167 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.168 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.171 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.172 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.172 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.175 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.176 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.176 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.179 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 0C 27 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:50.000 UTC",
#       "not  after"         : "2024-01-21 23:50:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 29 CC EF 17 21 FE BB   F2 42 B5 42 1A 56 7D 55  .)...!...B.B.V.U
#           0010: 7E A9 FE 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.180 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.261 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E AC 3F 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 23:50:47.000 UTC",
#     "not  after"         : "2024-01-21 23:50:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#         0010: 26 FF E3 80                                        &...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#         0010: 19 AF 78 24                                        ..x$
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.264 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 11 DB 41 43 9E 5A 3D   AE D9 0D DD 1A A8 CE 4C  y..AC.Z=.......L
#     0010: A8 75 92 4C 5B 19 83 22   0D 9E CF BB EF 12 6A A0  .u.L[.."......j.
#     0020: 32 F5 D2 52 FF 13 D6 6E   16 DB 6F 10 6A E6 81 4A  2..R...n..o.j..J
#     0030: D8 3B 1F B0 00 B2 3E 28   8C 79 D6 E5 42 89 DF 48  .;....>(.y..B..H
#     0040: DD 63 B2 2E 9A A9 B6 41   F2 AF 91 E0 DD C0 44 5F  .c.....A......D_
#     0050: 21 03 04 9C D5 18 53 AD   58 41 06 AC 53 AB 8B B0  !.....S.XA..S...
#     0060: EF 6A AD AA 24 07 C0 94   49 CA BC F6 AC A9 B2 06  .j..$...I.......
#     0070: C7 EE 85 03 F4 79 F2 90   12 BB A9 28 EA C2 15 A5  .....y.....(....
#     0080: E1 50 CF 70 82 11 C4 B1   F5 EE A2 29 E4 B8 D2 5E  .P.p.......)...^
#     0090: C2 C9 9F 29 B6 1E 12 A5   A1 F9 F1 D1 D8 5A D0 F6  ...).........Z..
#     00A0: 45 E3 10 87 F2 34 29 EB   59 14 27 34 68 39 D7 77  E....4).Y.'4h9.w
#     00B0: 20 1B 91 74 A8 4C 9E C8   85 BC 40 EA 80 7B FD DF   ..t.L....@.....
#     00C0: 3B 51 DB 8D EB AE AC 2D   1E 53 CA 3C 90 EA 53 2E  ;Q.....-.S.<..S.
#     00D0: 8A D9 CD C0 BC 3A 78 A2   73 7A 7C A6 AB F5 BB 32  .....:x.sz.....2
#     00E0: 96 EE 7B 57 6F DD 6F D8   9A 56 64 E6 62 81 B5 51  ...Wo.o..Vd.b..Q
#     00F0: 63 1E 0F E1 03 71 0D 09   19 32 C9 71 23 D1 D9 7B  c....q...2.q#...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.266 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 25 56 2F BB 87 25 5E D2   C5 8E 6E 0E B5 39 29 FB  %V/..%^...n..9).
#     0010: E8 39 6D A5 A4 4C 2A 4A   E3 0C 46 92 EC F1 38 01  .9m..L*J..F...8.
#     0020: FB 73 11 8F 06 64 CF 7D   07 4C 9B 90 64 01 C6 6B  .s...d...L..d..k
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.269 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:21.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.270 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:21.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.270 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 23:51:21.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:21.271 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.271 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.274 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F BF 45 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:54.000 UTC",
#       "not  after"         : "2024-01-21 23:50:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 5D 9E 22 D0 BB CB E8   88 C0 AA 3C 42 03 05 56  .].".......<B..V
#           0010: 73 CC 76 88                                        s.v.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E AC 3F 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:47.000 UTC",
#       "not  after"         : "2024-01-21 23:50:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#           0010: 26 FF E3 80                                        &...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.307 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 AE E5 F9 8C 7D 75 45   64 63 FB CC 2F F0 98 1A  6.....uEdc../...
#     0010: 14 AE 9A 9F 74 D6 F0 EF   B8 68 73 10 D9 F0 DE CB  ....t....hs.....
#     0020: D7 2A EC 04 07 E0 20 F8   D7 C0 2F DC 19 56 6A D1  .*.... .../..Vj.
#     0030: DF CA 39 D3 44 60 38 45   4D 21 CE BF 82 9D A8 34  ..9.D`8EM!.....4
#     0040: D8 76 CE 47 DD 17 E9 72   77 EF 59 4D 58 EC 1F 92  .v.G...rw.YMX...
#     0050: F4 D8 0A 14 4A 62 3A 95   14 EC 8F 27 ED 22 BA 3D  ....Jb:....'.".=
#     0060: 6D 55 D2 7B F6 1D 28 A6   DF CA 91 68 7F 8D EE 85  mU....(....h....
#     0070: DF 8A A9 6F E3 2D 7A 6A   A0 D4 CF 9D A5 3F B8 52  ...o.-zj.....?.R
#     0080: 13 6E 57 88 7E 21 D8 00   02 D5 08 58 73 CC 94 E2  .nW..!.....Xs...
#     0090: 70 85 54 58 9C 4D FB 06   AD 1D AD A8 01 A3 C6 41  p.TX.M.........A
#     00A0: 90 9D CE 8D 49 F6 EB 1C   B5 94 6D A0 CD A8 BC 3D  ....I.....m....=
#     00B0: 69 87 A0 A4 BA B9 97 12   0D 9B 97 81 D3 B4 6E F5  i.............n.
#     00C0: 77 9E 62 A6 BB A0 C9 D1   16 D7 C2 2B 0C EA 7B 01  w.b........+....
#     00D0: 3D EC F8 27 3B EB AF 0F   5A BA E9 77 9A 64 E9 38  =..';...Z..w.d.8
#     00E0: 75 B5 EB D9 C5 6D 2A 94   D8 7E 74 6E 1D 3B 89 56  u....m*...tn.;.V
#     00F0: B4 5E 16 A7 95 E3 6A C1   86 65 DC 72 95 47 E9 46  .^....j..e.r.G.F
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.310 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 26 B8 8C D4 6C F9 2E F3   F1 E5 E4 60 CB 19 E2 51  &...l......`...Q
#     0010: 4E 14 33 BF FE 1B 88 BC   A6 4F 81 E3 C3 E4 7D 78  N.3......O.....x
#     0020: D0 21 22 33 1E 41 F1 6C   0E A1 81 A8 74 05 C2 D1  .!"3.A.l....t...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.311 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:21.376 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 10 BF 18 DE AC 85 EF 69 90 AB A0 B0 4B 3A B4 71 EA EB EF 81 35 88 93 0F A8 75 10 EB 41 5B 8F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-23 23:51:21.646 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-23 23:51:21.648 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (467 lines):
#   INFO  - 2023-10-23 23:51:33.448; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:33.776 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 2E 1E 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:45.000 UTC",
#       "not  after"         : "2024-01-21 23:50:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#           0010: 26 FF E3 80                                        &...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E AC 3F 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 23:50:47.000 UTC",
#       "not  after"         : "2024-01-21 23:50:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 CA 5F A6 1A 0D DB 87   FB E5 A5 02 87 7A 14 92  .._..........z..
#           0010: 26 FF E3 80                                        &...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 32 D6 AA 24 7D 1A D7   68 85 62 A0 99 12 2C F2  +2..$...h.b...,.
#           0010: 19 AF 78 24                                        ..x$
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-23 23:51:33.791 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:34.021 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:34.023 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 23:51:34.024 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.029 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.041 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 23:51:34.043 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "01 01 BD 02 61 1B 78 9A 02 25 89 6A 5A 74 45 3A 64 DB E4 40 5B 7E FD 9C 7D 6F EF 3E 27 33 A6 57",
#     "session id"          : "CD 39 D4 89 24 91 E7 96 A2 95 65 3B 4A 84 B8 BC 07 31 14 06 93 2B 12 3C DE BE C1 80 21 1C 74 25",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 66 B0 5B 35 68 CB 6C DC   24 4B 36 B0 4A 13 4D 02  f.[5h.l.$K6.J.M.
#               0010: B7 C5 A8 5A 02 AF 70 13   99 58 43 EE 35 06 40 36  ...Z..p..XC.5.@6
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.062 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B0 67 CB 17 50 51 CE 0A 2C 53 0B 22 DB 6E 3C BA 28 93 F6 C3 12 BC D4 B3 D6 6B 17 34 47 B0 5A 13",
#     "session id"          : "CD 39 D4 89 24 91 E7 96 A2 95 65 3B 4A 84 B8 BC 07 31 14 06 93 2B 12 3C DE BE C1 80 21 1C 74 25",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E6 3F 35 9C 4C 93 9C 7A   7C 22 18 DA D7 BC AB A5  .?5.L..z."......
#             0010: 80 D8 78 B1 18 E1 2C 8D   7A 4B D3 BB AB CF BA 48  ..x...,.zK.....H
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.062 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.062 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.063 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.064 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.066 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:34.068 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:34.068 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.075 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.076 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.077 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.081 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.081 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.081 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:51:34.082 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 23:51:34.083 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 23:52:52.149 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:52:52.196 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:52:52.197 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:52:52.197 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 23:52:52.197 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38282/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28132ms
ok 65 stop command for single port in 31218ms
ok 66 status detects locally running solr in 14435ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2160ms
ok 69 copying files around in 6553ms
ok 70 upconfig in 2598ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1222ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 34s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m57s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5728 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5728/

3 tests failed.
FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.

Stack Trace:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.
	at __randomizedtesting.SeedInfo.seed([6D1AF5A3E8FF1544]:0)
	at org.apache.solr.cloud.MiniSolrCloudCluster.deleteAllCollections(MiniSolrCloudCluster.java:682)
	at org.apache.solr.handler.designer.TestSchemaDesignerAPI.tearDownCluster(TestSchemaDesignerAPI.java:81)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:909)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
java.lang.AssertionError: Too many closes on SolrCore

Stack Trace:
java.lang.AssertionError: Too many closes on SolrCore
	at __randomizedtesting.SeedInfo.seed([6D1AF5A3E8FF1544]:0)
	at org.apache.solr.core.SolrCore.close(SolrCore.java:1753)
	at org.apache.solr.core.SolrCores.lambda$close$0(SolrCores.java:128)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.test

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([6D1AF5A3E8FF1544:E54ECA79460378BC]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractCloudBackupRestoreTestCase.testBackupAndRestore(AbstractCloudBackupRestoreTestCase.java:350)
	at org.apache.solr.cloud.api.collections.AbstractCloudBackupRestoreTestCase.test(AbstractCloudBackupRestoreTestCase.java:175)
	at org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.test(TestHdfsCloudBackupRestore.java:247)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 11673 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.test (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.TestHdfsCloudBackupRestore.test" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6D1AF5A3E8FF1544 -Ptests.file.encoding=US-ASCII

  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6D1AF5A3E8FF1544 -Ptests.file.encoding=US-ASCII

  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6D1AF5A3E8FF1544 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

BUILD FAILED in 6m 52s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m13s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5727 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5727/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42415/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-23 11:03:02.279; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 11:03:02.285; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-23 11:03:03.543; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-23 11:03:03.589; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22586ms
ok 61 start solr with client truststore and security manager in 25759ms
not ok 62 start solr with mTLS needed in 59065ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Gl6x78/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42415.
#
# Started Solr server on port 42415 (pid=199423). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42416.
#
# Started Solr server on port 42416 (pid=199847). Happy searching!
#
# INFO  - 2023-10-23 11:04:26.862; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 11:04:26.868; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 11:04:27.243; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 11:04:27.246; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 11:04:27.246; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:27.280 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 65 75 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:04:03.000 UTC",
#     "not  after"         : "2024-01-21 11:04:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 07 2A B9 67 44 55 9E   A8 78 D2 53 BC 41 68 09  ..*.gDU..x.S.Ah.
#         0010: 52 CE 83 22                                        R.."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:27.285 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 DB 40 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:54.000 UTC",
#     "not  after"         : "2024-01-21 11:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:27.301 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:27.665 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:27.666 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:27.666 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:27.666 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:27.818 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:27.821 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:27.821 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.827 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.839 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.840 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:27.843 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AE D9 C8 5D F4 CE F9 63 3D 8F 8B C5 0A 73 A7 03 76 CB 2D 24 76 5A 95 67 96 47 5E B0 6F E8 9D 8E",
#   "session id"          : "0C 4D 63 EE 4E BB DF D1 64 09 47 EB 26 0C C4 34 B1 89 9B F2 D7 B8 3C A7 AC D0 BB 46 54 BF FC 15",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F0 64 EC 7E 0A 4C 66 A9   D5 DB FA C2 12 3E AD CD  .d...Lf......>..
#             0010: 1B 58 C1 B0 86 BB A4 24   BE 70 7B C1 8C D8 73 21  .X.....$.p....s!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.954 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "39 49 EB 96 42 06 95 F7 0A E6 32 B9 2C E3 CF 7F FF 1B 0F BF 2E ED 78 4F 33 E3 75 B8 DE 20 FA D3",
#   "session id"          : "0C 4D 63 EE 4E BB DF D1 64 09 47 EB 26 0C C4 34 B1 89 9B F2 D7 B8 3C A7 AC D0 BB 46 54 BF FC 15",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 82 AA 34 D3 FE 1E 28   9C 15 96 2D 9A 8C B4 E3  ...4...(...-....
#           0010: 97 4E ED 17 E8 39 FD 11   B7 48 FD 8F 08 63 73 30  .N...9...H...cs0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.954 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.955 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.956 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.956 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.956 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.956 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.957 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.960 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.961 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.970 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.971 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.972 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.976 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.976 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.976 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:27.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.979 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.980 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.982 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.983 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:27.983 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.987 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 35 B4 A3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:59.000 UTC",
#       "not  after"         : "2024-01-21 11:03:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 A0 BC 1D ED 6E D8 DF   6F 82 14 E3 EF 40 F5 17  .....n..o....@..
#           0010: 3D 2F 29 E7                                        =/).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:27.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.076 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.079 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 49 0C 57 21 DD CA 0D   59 6C A1 4A 76 19 66 42  oI.W!...Yl.Jv.fB
#     0010: 8D EE E2 CE 60 97 28 60   D7 AA BB EB E1 F0 2A 1D  ....`.(`......*.
#     0020: 87 24 24 B3 18 4E F9 EF   C4 17 24 E9 D8 83 64 2A  .$$..N....$...d*
#     0030: B2 FA F2 2A 85 BF 8C 1F   1A 66 E1 39 B7 F6 B5 5A  ...*.....f.9...Z
#     0040: C1 0C 13 9A CA 75 77 8F   90 7B E3 F9 7B 9D 89 D6  .....uw.........
#     0050: FD 7B F3 E4 BE F0 45 20   A9 5E 09 E1 F6 2C 0F 0A  ......E .^...,..
#     0060: E1 88 96 A4 6D 2A DD 36   1F 3A 28 1C 7D DC CA 34  ....m*.6.:(....4
#     0070: 56 61 F3 89 E7 5B 9F F2   6C A4 CA 63 F5 B3 56 64  Va...[..l..c..Vd
#     0080: DD 41 B4 D4 86 A8 D9 7C   51 12 9F 42 97 EF 1E 68  .A......Q..B...h
#     0090: 3A 85 EF 65 0D DA BC 35   5A C2 2A 90 B9 C8 BD 86  :..e...5Z.*.....
#     00A0: D9 67 9B 1B 0B 15 E0 DD   7E FE 81 54 18 BE F5 B6  .g.........T....
#     00B0: D1 F1 E1 1A 0E F6 A2 A7   27 45 05 75 7E 63 36 C1  ........'E.u.c6.
#     00C0: D8 A5 BE 11 2F 17 C6 B2   B3 0B 70 54 EA 06 8D 5D  ..../.....pT...]
#     00D0: 7B F3 12 0A 97 C8 8E 8A   77 31 59 01 FD 4D EA 28  ........w1Y..M.(
#     00E0: BD 7E 4F 18 E1 D2 E5 18   DE A6 B8 13 90 42 98 FF  ..O..........B..
#     00F0: 9B 4F D3 D7 63 58 E3 40   D3 4E 0B 4E 50 E1 81 CC  .O..cX.@.N.NP...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.081 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E AA 9D 4B 4E 38 2D 4C   38 8C 08 1D DD 3C FE 5C  ...KN8-L8....<.\
#     0010: AD 0A 9C 41 D9 62 66 EA   28 0D 64 89 FB C6 2D 1B  ...A.bf.(.d...-.
#     0020: BB 3D BD A5 59 C7 E0 F2   F9 D4 D9 72 61 FF 1E 18  .=..Y......ra...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.084 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:28.085 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:28.085 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:28.085 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:28.085 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:28.086 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:28.086 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.086 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.090 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 65 75 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:04:03.000 UTC",
#       "not  after"         : "2024-01-21 11:04:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 07 2A B9 67 44 55 9E   A8 78 D2 53 BC 41 68 09  ..*.gDU..x.S.Ah.
#           0010: 52 CE 83 22                                        R.."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 93 65 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:56.000 UTC",
#       "not  after"         : "2024-01-21 11:03:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#           0010: 70 74 BA E2                                        pt..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.116 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 60 55 0B 3B 5D 19 BA   AF 41 D7 57 72 21 98 51  u`U.;]...A.Wr!.Q
#     0010: 43 7F EE EB B2 39 CD A6   E9 D2 C2 FB E2 88 D9 C5  C....9..........
#     0020: 83 0D 19 97 51 52 0C 04   60 79 62 3A 43 F5 BC 79  ....QR..`yb:C..y
#     0030: 4C 9B E2 C1 FA D9 75 C3   11 2F 68 54 7A D2 01 FD  L.....u../hTz...
#     0040: BD EB F6 DD 40 DD D3 AD   7B B7 97 4E 26 83 10 1D  ....@......N&...
#     0050: 70 16 9D B4 37 03 78 26   E9 7A 90 1F 69 21 D2 40  p...7.x&.z..i!.@
#     0060: B5 52 CE C0 EF 40 CB 2B   75 C2 BC 84 F3 74 FB 36  .R...@.+u....t.6
#     0070: 85 43 4E 49 6B 7F 81 10   12 A0 F3 88 A8 FD 7D 7B  .CNIk...........
#     0080: 63 E7 B8 06 7D 42 23 27   B0 A4 13 D2 0A 07 D2 2C  c....B#'.......,
#     0090: 5D 4D 0E 54 75 32 60 B5   94 4E 32 55 55 D3 DE 1B  ]M.Tu2`..N2UU...
#     00A0: A5 0C C7 83 F6 C4 A6 E9   B6 47 FF 72 6A 52 40 55  .........G.rjR@U
#     00B0: 35 4D CD 2A F6 CC DD 10   E1 D5 1C 6D FE AA A5 2F  5M.*.......m.../
#     00C0: 89 87 E0 E4 EA 56 7E 5E   85 3C CE 51 6E 39 F3 23  .....V.^.<.Qn9.#
#     00D0: 08 53 8E A6 B4 A0 01 EB   66 50 60 2B 6A FB 3B 5C  .S......fP`+j.;\
#     00E0: 21 65 C3 C8 DD 5E F7 57   F8 DB 29 AB 11 A7 EF D9  !e...^.W..).....
#     00F0: 8D E6 D9 39 E0 37 88 31   16 CE 48 46 D6 43 58 7E  ...9.7.1..HF.CX.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.118 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 B9 45 A1 36 E8 DA 0D   7F 69 A7 56 8E 7C 34 23  p.E.6....i.V..4#
#     0010: 56 04 EC 2C 21 27 FD D8   20 6F 26 0F 04 7D 2E 33  V..,!'.. o&....3
#     0020: CC 35 DC 32 FC C1 2B 0A   32 86 A1 EA C5 E4 F1 0F  .5.2..+.2.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.119 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:28.178 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F2 C5 50 2E E4 82 24 F3 96 A1 0A 31 C1 B7 85 AF CE B0 6C 8A 88 01 A6 39 BD BF FB C1 CB 01 37 DD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-23 11:04:28.490 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-23 11:04:28.491 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-23 11:04:29.451; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-23 11:04:29.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-23 11:04:29.825; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 11:04:29.828; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-23 11:04:29.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Gl6x78/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:29.862 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 65 75 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:04:03.000 UTC",
#     "not  after"         : "2024-01-21 11:04:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 07 2A B9 67 44 55 9E   A8 78 D2 53 BC 41 68 09  ..*.gDU..x.S.Ah.
#         0010: 52 CE 83 22                                        R.."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:29.867 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 DB 40 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:54.000 UTC",
#     "not  after"         : "2024-01-21 11:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:29.883 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:30.368 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:30.370 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:30.371 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.388 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.388 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:30.391 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8E 33 99 54 A4 BA F5 D5 E8 B2 11 11 0F C8 0A E3 EF 1E 41 4D 8F DA 98 9E 5E 73 FF 14 A9 24 BC 65",
#   "session id"          : "66 87 F0 46 2D 97 CD 76 3A 8B CA A7 71 84 25 0C 98 B9 BD 2C 80 75 EF AF 3F 76 13 28 36 87 B1 9F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 49 49 AA 79 6B E0 BF F2   F7 66 26 EF C8 71 80 D7  II.yk....f&..q..
#             0010: 8F E3 C2 2C F1 E6 E7 E7   60 F7 2A 9A 18 6C CF 55  ...,....`.*..l.U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.502 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "87 36 64 34 8E 2D C0 26 31 72 75 D9 80 9E 16 39 7A B3 52 1D AB C5 C3 29 B8 88 35 C5 74 2B 4D D1",
#   "session id"          : "66 87 F0 46 2D 97 CD 76 3A 8B CA A7 71 84 25 0C 98 B9 BD 2C 80 75 EF AF 3F 76 13 28 36 87 B1 9F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B4 1E EF 3B AB BD 19 7A   89 4B 5F A2 93 77 54 18  ...;...z.K_..wT.
#           0010: 68 56 7E BB 6B E1 2C AF   6C B3 72 56 B4 80 E5 60  hV..k.,.l.rV...`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.502 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.503 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.505 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.507 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.508 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.509 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.517 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.519 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.520 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.524 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.524 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.524 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.524 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.525 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.525 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.525 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.526 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.527 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.527 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.527 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.528 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.529 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.532 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 35 B4 A3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:59.000 UTC",
#       "not  after"         : "2024-01-21 11:03:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 A0 BC 1D ED 6E D8 DF   6F 82 14 E3 EF 40 F5 17  .....n..o....@..
#           0010: 3D 2F 29 E7                                        =/).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.532 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:30.574 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:30.575 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:30.576 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:04:30.576 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.611 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 93 65 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-23 11:03:56.000 UTC",
#     "not  after"         : "2024-01-21 11:03:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#         0010: 70 74 BA E2                                        pt..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#         0010: 68 19 CD 79                                        h..y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.615 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 F0 21 08 16 3D BC 0E   C3 D0 5E 7A 2A F5 D2 48  q.!..=....^z*..H
#     0010: EF 47 E3 8A 90 15 FB 5B   D7 86 1E 57 4F 4A 40 5A  .G.....[...WOJ@Z
#     0020: 19 B5 42 B5 AF D7 A2 3E   CB 97 3C 12 03 78 55 61  ..B....>..<..xUa
#     0030: A2 6D D3 5D 3B FF 33 65   3F A3 9A 38 D5 DC B1 01  .m.];.3e?..8....
#     0040: F4 53 A4 F1 E4 17 8E 89   DC 77 C4 6B C4 6D 68 80  .S.......w.k.mh.
#     0050: B7 0F C7 B4 46 A6 BA 36   DC D7 1C 18 51 CE A0 D5  ....F..6....Q...
#     0060: 8A 57 EA 85 6D 4C D3 3B   96 AE 84 4C A6 62 0C 78  .W..mL.;...L.b.x
#     0070: C0 9C 53 E3 1A 3E 84 89   DA 60 9A 5F 1D 9E AA DE  ..S..>...`._....
#     0080: A9 D4 6D 3D DF 3B 2D 6F   5A FD 1E C5 39 F1 67 AC  ..m=.;-oZ...9.g.
#     0090: 94 67 87 E0 6C 86 C1 78   4D EF 4F ED 1A CF 7C F4  .g..l..xM.O.....
#     00A0: 7A 46 11 69 CE F2 BA 40   24 44 FB A4 EA D7 85 6B  zF.i...@$D.....k
#     00B0: C5 3E 3F 30 C5 52 0E 05   44 EF 49 52 59 4B 98 72  .>?0.R..D.IRYK.r
#     00C0: 3D D9 B3 2B 55 94 02 7C   34 AF 94 2F 65 AE B2 9F  =..+U...4../e...
#     00D0: 2E D8 C5 53 8C 65 DD BC   98 AD 00 D0 7A 9C CC 86  ...S.e......z...
#     00E0: D1 69 6A D2 93 17 80 41   08 9F 14 16 EA 30 84 97  .ij....A.....0..
#     00F0: D2 BB 9C BB 2C E9 EB 09   5A 6B CA F4 AF 1A 61 0A  ....,...Zk....a.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.617 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C B8 CC D4 DB 70 B6 ED   9E 79 93 6E 9F CB 9A 0A  l....p...y.n....
#     0010: 9A F6 47 6C 32 99 EB 9E   A8 D2 E9 3F 23 06 37 EA  ..Gl2......?#.7.
#     0020: 24 E2 79 90 04 64 E4 8D   92 35 07 D4 86 B7 64 EB  $.y..d...5....d.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.620 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:30.621 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.621 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:30.621 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.621 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-23 11:04:30.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:30.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.622 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.625 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 65 75 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:04:03.000 UTC",
#       "not  after"         : "2024-01-21 11:04:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 07 2A B9 67 44 55 9E   A8 78 D2 53 BC 41 68 09  ..*.gDU..x.S.Ah.
#           0010: 52 CE 83 22                                        R.."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 93 65 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:56.000 UTC",
#       "not  after"         : "2024-01-21 11:03:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#           0010: 70 74 BA E2                                        pt..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.650 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 D0 6B D7 32 8C 49 AA   E3 E1 2D 82 98 64 B9 27  $.k.2.I...-..d.'
#     0010: 6C 67 27 CF F7 B8 10 B9   5F B1 6E 85 35 91 9D 64  lg'....._.n.5..d
#     0020: BF 38 19 A8 EF 8D E5 5C   4A 43 D6 F5 9B F1 19 27  .8.....\JC.....'
#     0030: BE AB 64 A5 CB 4E DE AB   04 65 4D 61 DE 9D A8 20  ..d..N...eMa...
#     0040: FB 24 EE D4 29 60 54 90   EF 44 44 00 87 22 31 2B  .$..)`T..DD.."1+
#     0050: E9 58 78 8D B6 3E E8 7D   84 4C DA BB 4C F1 79 0D  .Xx..>...L..L.y.
#     0060: 49 51 97 DE 87 3E 69 DC   47 4C 13 22 34 4A 45 AE  IQ...>i.GL."4JE.
#     0070: B6 41 F8 5C D3 34 D6 E7   09 BD A1 34 75 07 A1 8D  .A.\.4.....4u...
#     0080: 33 E2 13 F3 54 B0 5F 6A   28 96 9C 5B E8 9F 73 51  3...T._j(..[..sQ
#     0090: 7F C4 18 36 E4 E0 33 77   E4 3A 9A FC 76 CE CE 1A  ...6..3w.:..v...
#     00A0: 0D 8A AA 77 B2 46 7A 81   2B B1 AA 5C 27 64 76 3F  ...w.Fz.+..\'dv?
#     00B0: 47 53 AE 3A 49 E5 A5 54   BE 4E 29 DA 88 23 A9 35  GS.:I..T.N)..#.5
#     00C0: FB 12 ED 1C 39 C7 45 5F   B8 01 BC 00 73 30 83 36  ....9.E_....s0.6
#     00D0: 9C E4 FE 59 D8 41 16 BA   8A 13 C1 BB C9 DE 84 4E  ...Y.A.........N
#     00E0: E5 BD 69 73 45 15 0B C2   33 C4 68 9D 75 EB 6A 25  ..isE...3.h.u.j%
#     00F0: 8A 81 96 E6 D5 E3 AA 06   A5 04 B9 41 E6 A8 DE 54  ...........A...T
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.652 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 57 D5 F5 DF 79 76 D9 7F   66 0A CC 1D 6F 34 9C A8  W...yv..f...o4..
#     0010: 33 F2 89 BE F3 86 AC C0   EA 00 49 7E 49 E1 B0 5B  3.........I.I..[
#     0020: F8 AE D9 60 16 46 D4 93   45 82 12 A5 E9 C2 36 19  ...`.F..E.....6.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.652 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:30.706 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D0 50 5F 7A 14 38 98 D2 A7 7B 3D EA 5C A1 7E 6B 01 C1 C5 C0 C3 89 BD D6 CE 0F 27 57 2D 8A 43 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-23 11:04:31.007 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-23 11:04:31.009 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-23 11:04:42.170; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:42.492 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 93 65 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:56.000 UTC",
#       "not  after"         : "2024-01-21 11:03:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#           0010: 70 74 BA E2                                        pt..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 61 2E 35 17 7F B8 35   FA 8F 42 D2 B9 78 64 CF  .a.5...5..B..xd.
#           0010: 68 19 CD 79                                        h..y
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 DB 40 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-23 11:03:54.000 UTC",
#       "not  after"         : "2024-01-21 11:03:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 3D 91 91 15 63 A7 4B   A4 8F 69 96 9E 58 2C 4E  .=...c.K..i..X,N
#           0010: 70 74 BA E2                                        pt..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-23 11:04:42.507 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:42.742 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:42.744 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-23 11:04:42.744 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.761 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.761 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-23 11:04:42.764 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E B7 0B 72 A9 A3 4F 7B AD 4B E6 13 74 74 2D D2 59 97 6F 47 CB 67 95 C8 95 CC F2 A8 C3 57 75 A5",
#     "session id"          : "87 7D 67 7F B4 4B F6 89 7B A8 65 F9 CF DF 71 8A 2A 3B 4A F9 6C 2F 83 85 D9 77 D4 74 BD B8 2C 58",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B7 BD D0 FF B3 FB 3E 54   41 68 F4 2E 50 CA E0 F4  ......>TAh..P...
#               0010: CE CA 56 F9 E5 4C 07 46   8B 9A DB B9 88 EA D9 39  ..V..L.F.......9
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.786 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "7D B7 A7 6A 2F 07 50 FF D0 B2 53 DC EF 33 79 1C 9A 81 CC D0 65 0A D1 30 F4 76 7E CE ED 7D 54 0D",
#     "session id"          : "87 7D 67 7F B4 4B F6 89 7B A8 65 F9 CF DF 71 8A 2A 3B 4A F9 6C 2F 83 85 D9 77 D4 74 BD B8 2C 58",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BB A7 43 9E 31 B6 B4 1E   74 2E FE AD DB 32 EE FC  ..C.1...t....2..
#             0010: F8 52 D7 9F 3C 2D DD 9D   BB 75 A8 8A A2 4E D5 3B  .R..<-...u...N.;
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.786 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.787 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.788 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.791 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.791 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.793 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.800 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.801 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.803 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.806 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:04:42.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-23 11:04:42.808 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-23 11:06:04.543 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:06:04.582 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:06:04.583 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:06:04.583 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-23 11:06:04.583 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42416/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28180ms
ok 65 stop command for single port in 31366ms
ok 66 status detects locally running solr in 14638ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2177ms
ok 69 copying files around in 6577ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 48s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m13.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5726 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5726/

No tests ran.

Build Log:
[...truncated 115 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5725 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5725/

No tests ran.

Build Log:
[...truncated 111 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5724 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5724/

No tests ran.

Build Log:
[...truncated 115 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5723 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5723/

No tests ran.

Build Log:
[...truncated 115 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5722 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5722/

No tests ran.

Build Log:
[...truncated 111 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5721 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5721/

No tests ran.

Build Log:
[...truncated 114 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5720 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5720/

No tests ran.

Build Log:
[...truncated 112 lines...]
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5719 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5719/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46027/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 22:47:22.519; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 22:47:22.524; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 22:47:23.480; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 22:47:23.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23097ms
ok 61 start solr with client truststore and security manager in 25334ms
not ok 62 start solr with mTLS needed in 58866ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-DFx30I/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46027.
#
# Started Solr server on port 46027 (pid=199082). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46028.
#
# Started Solr server on port 46028 (pid=199532). Happy searching!
#
# INFO  - 2023-10-20 22:48:47.084; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 22:48:47.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 22:48:47.449; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 22:48:47.452; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 22:48:47.452; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:47.484 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 92 80 EA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:23.000 UTC",
#     "not  after"         : "2024-01-18 22:48:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 07 4C 4D 22 8E E4 89   CF 75 D2 4E F8 A0 73 98  4.LM"....u.N..s.
#         0010: 08 63 58 4E                                        .cXN
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:47.488 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 9F F1 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:14.000 UTC",
#     "not  after"         : "2024-01-18 22:48:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:47.503 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:47.590 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:47.590 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:47.591 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:47.591 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:47.728 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:47.730 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:47.731 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.736 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.747 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.747 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.748 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:47.750 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "36 9F 07 33 59 EB 8A BF EE C9 8A F9 AF E1 24 18 3F C3 18 89 8E DA 5D 11 EA 12 9F B9 CA B0 28 D1",
#   "session id"          : "6A 4F 79 9D DA 6A AD D9 85 AF BC 38 25 36 79 D6 92 B3 E3 17 22 B4 82 FF 9E 89 BB F3 93 A3 DF 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8D CA 91 68 C1 46 AA 49   26 83 78 1A F5 A3 6D 27  ...h.F.I&.x...m'
#             0010: BD 3E BB A9 70 45 83 D1   E4 E5 AA 95 13 3F D3 08  .>..pE.......?..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.863 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "ED D3 11 C6 EB 41 74 7E CF 9B CF D5 74 0A F8 30 8E 36 76 C6 F6 97 B6 67 F2 04 9B 21 34 C8 32 F6",
#   "session id"          : "6A 4F 79 9D DA 6A AD D9 85 AF BC 38 25 36 79 D6 92 B3 E3 17 22 B4 82 FF 9E 89 BB F3 93 A3 DF 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A C5 3B BA F5 C5 0B C7   11 07 1E CE 07 D7 9F 0C  :.;.............
#           0010: DC 9C ED 32 22 46 FE F2   95 9B C6 5D B9 99 30 35  ...2"F.....]..05
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.864 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.864 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.866 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.869 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.869 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.878 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.880 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.881 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.886 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.886 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.887 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.888 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.888 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.888 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.889 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.890 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.892 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 2C AD 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:19.000 UTC",
#       "not  after"         : "2024-01-18 22:48:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 91 18 5C 4B 6D F4 77   14 30 C5 9D CE BF 0D E6  (..\Km.w.0......
#           0010: B0 A2 82 F7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.892 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.969 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.973 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 B6 82 2C FE 61 F1 CF   DE FE 4F 1A 95 21 5A D1  3..,.a....O..!Z.
#     0010: 91 46 3F DC DA D7 5F 78   CC EF 54 8F 08 3B 69 0E  .F?..._x..T..;i.
#     0020: 03 80 48 E8 5C 40 F7 07   EC 80 EB CB 48 08 15 5F  ..H.\@......H.._
#     0030: 4D D6 3D DC A2 07 9A CD   D1 CD 6D CF D0 E7 CE 3C  M.=.......m....<
#     0040: 24 55 BD D8 2A 80 82 A2   E4 50 4D C1 EA 55 11 ED  $U..*....PM..U..
#     0050: 60 BA 25 B3 2D 99 80 82   E0 65 F4 6E AD 8B F7 64  `.%.-....e.n...d
#     0060: BE 20 1D FD 7C EC 84 A9   DD 87 91 58 B0 AD 89 DD  . .........X....
#     0070: 07 46 00 5B 88 BB 84 F7   D8 61 65 02 5C 8C 4A F2  .F.[.....ae.\.J.
#     0080: EF FB 7A 53 42 F4 1C D7   22 FF DD 75 1F AB 3B 30  ..zSB..."..u..;0
#     0090: A1 DB 73 1A 1D 03 E8 D3   E1 88 D3 11 5E 75 3E B3  ..s.........^u>.
#     00A0: AF 0F 13 7B 97 25 BB 4B   31 FA D3 BA 3D F2 52 F1  .....%.K1...=.R.
#     00B0: AA 98 A1 7F 9F 1F 75 F4   96 4A 28 06 04 C7 3B 89  ......u..J(...;.
#     00C0: 33 AC 74 64 21 6B 1D 76   FD 49 7D 59 0A 94 10 54  3.td!k.v.I.Y...T
#     00D0: 08 38 F4 B5 6E BB E3 9E   DB 03 91 AD F8 D9 AC B0  .8..n...........
#     00E0: B9 17 D6 5C 5C BA 3F 8E   00 AB 1E DA EF 88 5C 0A  ...\\.?.......\.
#     00F0: A6 C1 16 70 16 5C F8 69   F6 E6 88 3D 10 88 E2 F8  ...p.\.i...=....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.975 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 10 B0 58 BA E3 0B 82   DD A2 F6 2C 70 84 4D D2  ...X.......,p.M.
#     0010: CC B0 3B FD D4 9B BC 16   EF CF DD CD DE 2B 30 64  ..;..........+0d
#     0020: 32 E6 B8 89 D5 00 54 87   34 08 76 94 A1 D0 A6 B7  2.....T.4.v.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.977 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:47.978 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.978 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:47.979 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.979 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:47.979 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:47.979 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.980 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:47.982 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 92 80 EA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:23.000 UTC",
#       "not  after"         : "2024-01-18 22:48:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 07 4C 4D 22 8E E4 89   CF 75 D2 4E F8 A0 73 98  4.LM"....u.N..s.
#           0010: 08 63 58 4E                                        .cXN
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 59 F6 E0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:16.000 UTC",
#       "not  after"         : "2024-01-18 22:48:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#           0010: EA B5 1E 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:48.007 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 01 2A 78 BF 2E 33 FD   1D 7D 7E 57 56 E8 10 CD  3.*x..3....WV...
#     0010: F6 08 54 8B 7A 61 86 2A   79 6B EE 5B 3D 83 C0 82  ..T.za.*yk.[=...
#     0020: 84 23 BA 23 79 E6 6F 26   B1 15 7D F6 4F 82 78 AE  .#.#y.o&....O.x.
#     0030: D9 66 AC A3 20 C1 A3 FF   0B B4 1D 88 72 9B C3 3F  .f.. .......r..?
#     0040: 39 5F BA 90 62 3A C3 69   AC 39 2F 39 51 9E 8A 89  9_..b:.i.9/9Q...
#     0050: D0 CB F6 BB 1C BB 24 99   B1 C9 A1 43 6B 6F A3 50  ......$....Cko.P
#     0060: 70 19 4D 23 41 1F 6A 90   99 70 11 8E 60 08 32 4C  p.M#A.j..p..`.2L
#     0070: A8 EB FF 18 F4 64 57 4E   A0 1B B4 80 77 43 3B 81  .....dWN....wC;.
#     0080: 4C 1D A8 20 54 DB A9 84   71 8D B2 3F EF EC 1E A2  L.. T...q..?....
#     0090: D6 21 73 0C 4A 11 AB E4   B0 F8 68 10 67 29 1E C6  .!s.J.....h.g)..
#     00A0: 36 D6 0B 33 F8 19 F0 15   45 1A 32 74 C8 DC 6C 33  6..3....E.2t..l3
#     00B0: 23 21 3D F6 4B 10 FC 93   DD 5E 77 D1 3C 13 9C 44  #!=.K....^w.<..D
#     00C0: F8 4F 4A F8 85 B4 26 60   1B 66 B0 0A F2 B6 BE FB  .OJ...&`.f......
#     00D0: 5C E6 68 A4 54 FD 2A 2E   2D EC 36 18 42 2C 1B 74  \.h.T.*.-.6.B,.t
#     00E0: FA 42 E4 35 3E D9 13 8D   B1 1A 8A 3C 3B AC CA DF  .B.5>......<;...
#     00F0: A3 00 1E A2 BF FD B9 85   EF 7A 65 25 F8 06 78 66  .........ze%..xf
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:48.008 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 BD DC 25 34 FF F8 1E   2A A9 5D 40 1B 24 CE AE  Y..%4...*.]@.$..
#     0010: FA 57 3F 23 8F 03 03 92   6A 31 30 03 0B F4 2B 3D  .W?#....j10...+=
#     0020: 60 3A EB 74 88 3F A4 B3   08 B8 60 8C FB E5 07 00  `:.t.?....`.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:48.009 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:48.062 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7A 25 8C 3A AB 8A CC D3 71 8B 08 E6 90 CA 86 F8 DF E3 31 01 32 E4 35 EF 0E 9B 66 D4 9E 4B FD A2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 22:48:48.356 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 22:48:48.357 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 22:48:49.312; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 22:48:49.318; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 22:48:49.687; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 22:48:49.690; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 22:48:49.690; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-DFx30I/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:49.723 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 92 80 EA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:23.000 UTC",
#     "not  after"         : "2024-01-18 22:48:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 07 4C 4D 22 8E E4 89   CF 75 D2 4E F8 A0 73 98  4.LM"....u.N..s.
#         0010: 08 63 58 4E                                        .cXN
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:49.727 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 9F F1 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:14.000 UTC",
#     "not  after"         : "2024-01-18 22:48:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 22:48:49.742 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:50.088 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:50.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:50.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:48:50.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:50.232 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.232 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:50.234 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:48:50.234 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.240 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.252 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.252 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.252 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:48:50.255 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E2 A8 59 D4 08 20 FA 90 28 1C D2 E6 E6 79 8F AA 4C 62 3C AF 0C 3A A6 40 39 51 C6 AE E1 A9 D5 6B",
#   "session id"          : "AD BB 0D 90 C0 B0 98 D8 AA 99 AC FE 16 49 C7 05 9C 4E 54 26 6D 8B B8 A9 A6 0B 66 EA 35 29 5F 8D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 A4 7F 73 05 34 BA A2   39 D0 F9 55 83 43 AB 6D  Y..s.4..9..U.C.m
#             0010: 67 11 70 46 37 5E 21 67   DE 42 F7 38 4F 9F E8 3A  g.pF7^!g.B.8O..:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.371 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "64 A8 3B 3B 7A B9 8A 78 9B EA 74 47 F9 46 39 0F 02 D4 8B D0 D6 06 AC 24 95 1A 27 B9 94 5B 52 17",
#   "session id"          : "AD BB 0D 90 C0 B0 98 D8 AA 99 AC FE 16 49 C7 05 9C 4E 54 26 6D 8B B8 A9 A6 0B 66 EA 35 29 5F 8D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 20 06 4F 6E 20 B8 AE 05   DF 8B 01 08 2C 00 0F 15   .On .......,...
#           0010: 4A 76 E1 46 55 16 25 1F   91 0A 7B DC E3 27 84 4C  Jv.FU.%......'.L
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.371 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.371 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.373 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.376 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.386 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.387 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.388 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.392 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.392 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.392 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.393 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.393 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.393 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.393 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.394 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.395 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.396 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.396 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.396 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.397 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.398 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.399 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.402 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 2C AD 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:19.000 UTC",
#       "not  after"         : "2024-01-18 22:48:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 91 18 5C 4B 6D F4 77   14 30 C5 9D CE BF 0D E6  (..\Km.w.0......
#           0010: B0 A2 82 F7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.403 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.492 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 59 F6 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 22:48:16.000 UTC",
#     "not  after"         : "2024-01-18 22:48:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#         0010: EA B5 1E 40                                        ...@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#         0010: DD 13 66 B7                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.495 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C 94 1C 31 8E 03 DB A2   F9 E1 AA 2D 4F 88 21 7C  ...1.......-O.!.
#     0010: 8A 6F 38 F4 D7 A5 BC F7   6B FC F6 E5 BA A8 9D 19  .o8.....k.......
#     0020: 97 04 54 F4 58 41 81 C7   90 57 14 A7 06 78 C2 91  ..T.XA...W...x..
#     0030: D4 F4 2D E0 76 E2 45 63   C2 49 B2 83 6D 8E 75 EA  ..-.v.Ec.I..m.u.
#     0040: C4 E5 66 E5 E6 8F 1E A4   00 9A 5C 05 9E F5 7B 21  ..f.......\....!
#     0050: F5 92 D1 71 9C 73 7B A8   5D 12 88 61 A9 03 D5 46  ...q.s..]..a...F
#     0060: C5 39 0B 48 0E 62 FB 04   76 75 1B CF F4 F8 C7 0F  .9.H.b..vu......
#     0070: 94 DE 55 FC E9 CB 34 31   AB 78 97 82 A9 8F 46 7C  ..U...41.x....F.
#     0080: 71 FE BC 2B 7A E3 16 3C   21 51 00 31 EE D5 5C 30  q..+z..<!Q.1..\0
#     0090: A1 91 51 3D B1 9B 31 6C   46 85 B5 0F 80 F7 B7 9B  ..Q=..1lF.......
#     00A0: 96 C4 A7 1B FE 4D 53 DF   60 DC 1D 7B 0A 45 E7 BA  .....MS.`....E..
#     00B0: 12 02 55 BE DA 2F 2C BF   C2 0B E0 E1 29 7C 3A 5D  ..U../,.....).:]
#     00C0: 79 FF 7A 36 36 23 B0 D1   01 BB 01 01 39 E8 9C A4  y.z66#......9...
#     00D0: DF CF 4D 8E 49 70 ED EB   76 DE E4 4E 0B 9B 8D 97  ..M.Ip..v..N....
#     00E0: 7D 3D A8 5E AB 41 5C 62   EE A2 BE F1 3A 70 6F E4  .=.^.A\b....:po.
#     00F0: 8C F1 33 E5 1E 7C 40 79   F5 D5 73 8B F2 D7 56 D6  ..3...@y..s...V.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.497 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5B 1A 94 57 0F B5 87 26   C4 B9 57 79 B3 C6 E5 AA  [..W...&..Wy....
#     0010: 5C 18 FB 54 EF 8C D7 9A   F3 E4 CF AC 52 A3 A8 BE  \..T........R...
#     0020: BF 0F E1 E3 4F 85 FC 6C   08 17 95 0C 05 15 40 D9  ....O..l......@.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.499 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:50.500 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.501 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:50.501 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.501 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 22:48:50.501 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:48:50.502 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.502 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.505 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 92 80 EA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:23.000 UTC",
#       "not  after"         : "2024-01-18 22:48:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 07 4C 4D 22 8E E4 89   CF 75 D2 4E F8 A0 73 98  4.LM"....u.N..s.
#           0010: 08 63 58 4E                                        .cXN
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 59 F6 E0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:16.000 UTC",
#       "not  after"         : "2024-01-18 22:48:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#           0010: EA B5 1E 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.530 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 61 18 B4 70 8D 1B A1 10   B3 63 ED 10 4E 31 4D BB  a..p.....c..N1M.
#     0010: 4B C7 46 89 46 40 27 01   99 A0 D5 0B 39 AF 4B 8D  K.F.F@'.....9.K.
#     0020: 13 E7 A1 89 FA 51 60 B7   DA F2 11 45 A1 A5 31 26  .....Q`....E..1&
#     0030: 61 1E 28 EE B5 28 31 88   81 D5 6B A8 2B 38 20 BD  a.(..(1...k.+8 .
#     0040: ED D7 BB 29 B1 DC 21 7B   B9 7D 86 3B 91 C6 38 B6  ...)..!....;..8.
#     0050: 7D 3E EB 25 20 A7 EA 8D   EF 8F C1 0C 73 56 52 BB  .>.% .......sVR.
#     0060: BC E6 B4 75 5A DF 92 87   5E 3C 5E 0C 05 C9 EA DE  ...uZ...^<^.....
#     0070: 7C 69 F9 A5 36 A1 06 47   DE 34 0E 58 97 61 D4 8D  .i..6..G.4.X.a..
#     0080: CD C1 2F 12 B8 26 17 06   74 DD B3 2C AA EE 9E 6A  ../..&..t..,...j
#     0090: 2F A8 90 55 CB 1A 7A 77   A1 13 82 E5 A1 DA 61 F4  /..U..zw......a.
#     00A0: 0E EA C7 8D 97 16 7B 37   A0 A8 F2 98 59 A4 9B 70  .......7....Y..p
#     00B0: F4 92 48 4F 0D 91 97 25   D6 95 33 C6 3D 69 7D BA  ..HO...%..3.=i..
#     00C0: 80 0D 72 F7 8B 89 D5 BA   D3 70 43 A0 D9 C2 46 15  ..r......pC...F.
#     00D0: A6 E3 F1 08 AB 47 32 55   35 FA 38 5B 3C DC B3 02  .....G2U5.8[<...
#     00E0: 13 13 38 E7 20 D0 A2 60   B8 5A EA 3D 75 E4 FA C5  ..8. ..`.Z.=u...
#     00F0: AA 36 45 A0 14 FD 40 F3   D2 66 14 E0 36 86 10 4C  .6E...@..f..6..L
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.531 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 F4 4C 22 51 07 67 43   F2 0D A7 3F 13 6B C2 37  ..L"Q.gC...?.k.7
#     0010: 7F BF F9 0D ED 4E 30 83   97 AA F5 73 4F 0D 25 CE  .....N0....sO.%.
#     0020: EF 0F C5 ED F3 A0 A8 5C   E5 74 8A 77 F0 E5 38 51  .......\.t.w..8Q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.532 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:48:50.591 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD E0 2A 0A 66 B1 76 CF ED 8D 40 D4 5B 82 A6 92 F5 27 01 79 DD 1E CB 41 20 9B 4F B4 A3 10 51 35",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 22:48:50.910 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 22:48:50.911 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 22:49:02.093; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 22:49:02.414 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 9F F1 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:14.000 UTC",
#       "not  after"         : "2024-01-18 22:48:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#           0010: EA B5 1E 40                                        ...@
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 59 F6 E0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 22:48:16.000 UTC",
#       "not  after"         : "2024-01-18 22:48:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 9E 2A 53 CD F6 8D C5   6C 7F 3A BF 99 18 5B FD  ..*S....l.:...[.
#           0010: EA B5 1E 40                                        ...@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F E5 07 20 A3 46 45 F9   13 A8 99 ED 89 BB 0B E7  /.. .FE.........
#           0010: DD 13 66 B7                                        ..f.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 22:49:02.429 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:49:02.654 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.654 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:49:02.656 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 22:49:02.656 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.673 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.673 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.673 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 22:49:02.675 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "CF DA E1 76 84 44 4C 50 3C 33 05 B7 B1 C2 4A AD C4 80 3F 29 3B 00 CB 16 78 DF 6B 56 C3 29 96 23",
#     "session id"          : "75 A4 DB 79 15 F4 1E 2F 90 88 7C A8 DE E1 41 CC E2 E5 07 C0 88 A2 BA 36 C1 5C 4F 6C 21 5D 58 D5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 54 69 1C F0 ED 38 27 DA   FB 33 F6 01 FD 95 D3 FD  Ti...8'..3......
#               0010: 47 1C 04 C1 78 42 82 8D   7F 9B 2B 69 6D D1 94 3B  G...xB....+im..;
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.699 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F0 C9 E6 5F AA 70 13 C3 08 E7 B2 2C 10 1B 2A 08 01 74 2F 7E D5 2F CD EB EB D6 80 9E FC EE F7 A4",
#     "session id"          : "75 A4 DB 79 15 F4 1E 2F 90 88 7C A8 DE E1 41 CC E2 E5 07 C0 88 A2 BA 36 C1 5C 4F 6C 21 5D 58 D5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: B0 D4 A0 6D 71 82 19 DE   8F C1 A5 06 F8 8F 26 BD  ...mq.........&.
#             0010: 9A 5E FE 7C 54 E8 59 D8   92 4C C7 80 87 9A 5C 62  .^..T.Y..L....\b
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.699 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.699 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.700 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.700 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.701 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.704 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.704 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.704 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.705 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:49:02.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:49:02.706 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.714 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.716 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.717 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:49:02.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:49:02.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 22:49:02.723 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 22:50:23.703 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:50:23.741 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:50:23.741 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:50:23.741 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 22:50:23.741 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46028/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28340ms
ok 65 stop command for single port in 31339ms
ok 66 status detects locally running solr in 14364ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2154ms
ok 69 copying files around in 6547ms
ok 70 upconfig in 2607ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1212ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 41s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m15s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5718 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5718/

All tests passed

Build Log:
[...truncated 1304 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33553/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 14:48:16.187; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 14:48:16.193; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 14:48:17.124; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 14:48:17.165; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23343ms
ok 61 start solr with client truststore and security manager in 25999ms
not ok 62 start solr with mTLS needed in 59729ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MWbXaK/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33553.
#
# Started Solr server on port 33553 (pid=200480). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33554.
#
# Started Solr server on port 33554 (pid=200932). Happy searching!
#
# INFO  - 2023-10-20 14:49:42.923; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 14:49:42.928; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 14:49:43.315; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 14:49:43.318; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 14:49:43.319; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:43.352 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 5A A5 8F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:18.000 UTC",
#     "not  after"         : "2024-01-18 14:49:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 13 67 66 4D 1B 91 0D 3F   16 AD 76 8E 76 DF B2 6D  .gfM...?..v.v..m
#         0010: F8 17 F2 3B                                        ...;
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:43.357 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 04 11 F9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:09.000 UTC",
#     "not  after"         : "2024-01-18 14:49:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:43.372 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:43.461 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:43.468 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:43.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:43.468 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:43.612 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.613 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:43.614 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:43.615 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.635 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.635 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.635 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:43.638 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "82 53 56 23 15 B1 30 8B BF C1 86 3B E0 CE 89 D7 FC DF 00 80 29 C7 27 EA A6 0D 2E 05 F8 87 04 07",
#   "session id"          : "04 D2 92 B3 4F 86 48 13 0D 8C 20 F2 1E 69 61 22 DA D9 1E 67 C7 44 74 00 78 04 78 89 FC 15 25 80",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F2 45 AD 13 10 4B 0F 14   27 5F F3 E2 36 D9 A8 1E  .E...K..'_..6...
#             0010: 44 55 06 4A 71 F1 47 00   5A 69 CE 10 9C 1A AD 09  DU.Jq.G.Zi......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.773 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5B D9 E8 73 3F 5A BA 03 A5 D4 38 1C 09 FB CF E2 E0 80 3F 48 5A 06 46 67 95 9F 9D 37 70 69 B7 FE",
#   "session id"          : "04 D2 92 B3 4F 86 48 13 0D 8C 20 F2 1E 69 61 22 DA D9 1E 67 C7 44 74 00 78 04 78 89 FC 15 25 80",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 63 0C 78 63 92 60 2A 10   47 87 1A A7 45 78 7B 39  c.xc.`*.G...Ex.9
#           0010: 4D FF 66 BD 91 DC 20 FB   ED BD E4 19 18 48 1B 5A  M.f... ......H.Z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.773 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.774 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.776 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.776 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.776 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.779 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.779 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.781 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.781 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.781 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.781 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.781 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.782 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.792 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.794 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.796 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.805 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.805 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.805 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.808 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.809 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.809 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.809 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.810 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.811 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.811 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.815 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 F8 DA DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:14.000 UTC",
#       "not  after"         : "2024-01-18 14:49:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 7A F5 68 8F DD B0 0E   40 4D C5 55 91 96 9D 28  ,z.h....@M.U...(
#           0010: 6D 37 07 61                                        m7.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.815 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.916 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.923 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 93 33 2B 01 AE 10 37   C4 D3 A1 F8 48 9E 68 28  g.3+...7....H.h(
#     0010: A8 32 87 D7 E2 9B 9E BB   F4 85 CF F2 5B B9 56 38  .2..........[.V8
#     0020: C0 8C 25 93 77 4C 52 68   E4 C1 56 2E E7 52 0D EE  ..%.wLRh..V..R..
#     0030: 03 17 3D A9 FD 51 EA 73   AA D6 41 6C EA 31 A4 F4  ..=..Q.s..Al.1..
#     0040: 8B DF A5 FD A6 B4 B7 5A   11 AC 9B 43 1E 09 DF 02  .......Z...C....
#     0050: ED 6B 04 06 63 E2 EA D1   98 70 97 A7 C9 A2 66 46  .k..c....p....fF
#     0060: 3F 32 FF 5C 69 E8 51 1E   17 AA D1 5A 98 88 8C A8  ?2.\i.Q....Z....
#     0070: 59 2F 42 3E 8A A7 5B EB   E0 BA 20 BC DF 2C 4D B1  Y/B>..[... ..,M.
#     0080: 97 3A 70 C9 EB 6F 8F EE   C9 6E 42 63 F7 68 EF 34  .:p..o...nBc.h.4
#     0090: 4D AA 17 39 BD 47 F8 A9   2B A2 01 7F D0 04 F3 EC  M..9.G..+.......
#     00A0: BF FA 97 6B 68 49 84 12   2A 0E 52 AA B8 F8 2B 38  ...khI..*.R...+8
#     00B0: 31 F1 77 61 1F B8 38 C4   73 AC 47 C2 D8 AA FD 86  1.wa..8.s.G.....
#     00C0: 80 33 F0 EF F3 4F EA AC   CE 4B D8 86 BD 2E 44 22  .3...O...K....D"
#     00D0: C3 6B 5D 2B 59 FC D1 07   81 1E 57 E4 E1 CA 1E E3  .k]+Y.....W.....
#     00E0: CB DD A1 38 BE 77 07 F9   2F 59 2D 04 59 2F CD 75  ...8.w../Y-.Y/.u
#     00F0: 82 A1 84 69 54 ED C1 7A   00 5E 5D E7 F1 59 C6 39  ...iT..z.^]..Y.9
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.925 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1F 88 94 7C E8 86 5B 9B   ED 0A 5D 81 A7 1C B9 60  ......[...]....`
#     0010: 74 8D 9C 58 F0 C3 3F D9   22 DF D0 43 A7 12 99 BD  t..X..?."..C....
#     0020: ED 24 80 8D BF 5A 3A 72   E7 39 87 48 1D A3 65 B5  .$...Z:r.9.H..e.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.930 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:43.931 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.931 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:43.931 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.931 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:43.932 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:43.932 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.933 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.936 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 5A A5 8F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:18.000 UTC",
#       "not  after"         : "2024-01-18 14:49:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 13 67 66 4D 1B 91 0D 3F   16 AD 76 8E 76 DF B2 6D  .gfM...?..v.v..m
#           0010: F8 17 F2 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 03 03 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:11.000 UTC",
#       "not  after"         : "2024-01-18 14:49:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#           0010: 6E 17 3B E2                                        n.;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.982 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5C DE 1F 33 74 F3 79 E3   3D 8A BB 78 FD 1A 8E 27  \..3t.y.=..x...'
#     0010: 30 E4 87 25 31 2E 8A 59   06 17 BE 86 B4 34 70 2C  0..%1..Y.....4p,
#     0020: 5C 71 17 F7 A8 23 C7 AE   D2 D5 47 3B 30 AD D7 A9  \q...#....G;0...
#     0030: 8D 2E F8 8C C5 25 DC 10   11 E2 C2 8B C7 65 95 CE  .....%.......e..
#     0040: 2D 2D E5 EB 81 3B A2 E8   98 39 3F 11 32 2A 0D 7B  --...;...9?.2*..
#     0050: 37 A3 AB BA 8F 61 BC CF   25 75 B4 9E 28 1B D0 AE  7....a..%u..(...
#     0060: 66 47 9C 9A 60 8E 77 80   9A 97 01 9B 69 E8 54 27  fG..`.w.....i.T'
#     0070: A8 E7 DF 50 0C 1A 25 6A   A5 2A 2F E6 55 5A 94 09  ...P..%j.*/.UZ..
#     0080: 15 CB 06 9D 12 B5 63 AE   21 77 45 C9 F4 59 D2 C0  ......c.!wE..Y..
#     0090: 78 0B EA 97 66 6E 20 BD   69 8F 96 62 03 7C 7E 26  x...fn .i..b...&
#     00A0: DD F6 43 5D 56 0D 29 7B   D9 86 27 E5 67 EF 73 58  ..C]V.)...'.g.sX
#     00B0: 99 6B C2 00 B8 0A 2D 41   C6 E0 1B E8 53 12 22 15  .k....-A....S.".
#     00C0: 4B B6 EE 02 97 63 B5 D8   A3 E6 46 FB 67 7B B1 5B  K....c....F.g..[
#     00D0: B6 40 02 06 48 E2 4B F3   3E BE 37 D0 CC 18 88 CF  .@..H.K.>.7.....
#     00E0: 75 D2 0F C4 E6 67 EB 4B   30 E6 33 21 74 0E 14 9F  u....g.K0.3!t...
#     00F0: A1 D7 73 83 52 90 BA D3   BE B5 D3 FE 95 C9 BF 3C  ..s.R..........<
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.983 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FB 6E A4 04 61 9F B5 B1   9C 3C E3 0C 2E D0 3D D2  .n..a....<....=.
#     0010: A9 F0 87 96 C4 2F BF F3   9B BD F6 B2 08 A1 43 CA  ...../........C.
#     0020: 8E 2C D0 B4 F7 93 E9 95   D7 30 86 D7 74 3A 0B 8A  .,.......0..t:..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:43.984 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:44.041 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E7 40 1E B2 AA 13 59 6F C0 6E 35 82 FB 2E 7E 1B DE 92 72 C3 29 67 55 15 9B 3F 4E 6F 3A 72 AB 1F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 14:49:44.331 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 14:49:44.332 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 14:49:45.312; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 14:49:45.318; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 14:49:45.717; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 14:49:45.720; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 14:49:45.720; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(ca,h=[localhost],a=[],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MWbXaK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:45.754 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 5A A5 8F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:18.000 UTC",
#     "not  after"         : "2024-01-18 14:49:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 13 67 66 4D 1B 91 0D 3F   16 AD 76 8E 76 DF B2 6D  .gfM...?..v.v..m
#         0010: F8 17 F2 3B                                        ...;
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:45.759 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 04 11 F9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:09.000 UTC",
#     "not  after"         : "2024-01-18 14:49:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:45.775 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:46.070 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:46.071 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:46.071 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:46.072 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:46.221 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.221 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:46.223 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:46.223 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.229 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.245 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.245 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:46.248 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E1 C0 2C 77 A0 02 EB 7E EB 4B 16 A3 F1 D1 B9 92 5F 56 F1 48 40 08 E3 2C 84 CB D7 CD EB 19 4F E8",
#   "session id"          : "8B FA CA 90 5C EB FA 6A 1C F8 16 CD C4 22 EB 70 F1 7D 8A 77 A6 E8 59 9D 67 EA 60 69 EA 4F 17 19",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 78 EE 39 24 0B 52 B5 65   B8 AE 99 10 76 01 29 54  x.9$.R.e....v.)T
#             0010: 6E 36 4C CC 4D 03 5C 7F   22 DF 7A C9 8B F0 51 13  n6L.M.\.".z...Q.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.352 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "59 E1 F4 A1 3E 59 4F 15 51 0F CB 4C 53 9A 68 FA 9C B2 06 6F CC F2 BF 52 FE F3 36 93 04 5C 76 6B",
#   "session id"          : "8B FA CA 90 5C EB FA 6A 1C F8 16 CD C4 22 EB 70 F1 7D 8A 77 A6 E8 59 9D 67 EA 60 69 EA 4F 17 19",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C0 FE C9 D3 EF 92 BA 1A   09 4E 63 DF 8F 09 DB 07  .........Nc.....
#           0010: E7 B0 F1 EE 02 05 C8 34   59 3A 53 05 12 7D 65 78  .......4Y:S...ex
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.353 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.353 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.355 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.358 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.358 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.359 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.370 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.372 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.373 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.382 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.383 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.383 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.384 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.384 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.384 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.384 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.386 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.387 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.387 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.388 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.389 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.394 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 F8 DA DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:14.000 UTC",
#       "not  after"         : "2024-01-18 14:49:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 7A F5 68 8F DD B0 0E   40 4D C5 55 91 96 9D 28  ,z.h....@M.U...(
#           0010: 6D 37 07 61                                        m7.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.395 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.488 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 03 03 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 14:49:11.000 UTC",
#     "not  after"         : "2024-01-18 14:49:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#         0010: 6E 17 3B E2                                        n.;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#         0010: CD A5 F8 FA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.495 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 84 4A 38 CA F0 84 DE   A9 60 18 B0 A8 DF 00 08  ..J8.....`......
#     0010: 98 95 19 77 64 46 48 01   61 C1 1D C1 54 13 5C C5  ...wdFH.a...T.\.
#     0020: B4 C5 F2 9E 1B B4 F1 AE   35 E8 4D CA 56 04 76 4A  ........5.M.V.vJ
#     0030: 2F C1 D2 38 AC 2A 3E 77   4B F0 F0 3C D1 83 B1 00  /..8.*>wK..<....
#     0040: B5 02 0B E0 3A F6 2C 84   A6 45 51 73 F0 D0 75 38  ....:.,..EQs..u8
#     0050: 2A 52 9D FA 75 3C 48 05   D9 34 A7 BB 20 C2 4D B0  *R..u<H..4.. .M.
#     0060: 04 A3 A0 47 A9 DF DD FF   5F 0A E1 89 E1 32 C0 D9  ...G...._....2..
#     0070: 74 64 17 5C 63 3F 51 4A   D7 B2 E9 BF 1F 73 FC 17  td.\c?QJ.....s..
#     0080: B9 09 DE 01 13 AF 50 DA   F3 0D DA 8C 45 D2 1E 3B  ......P.....E..;
#     0090: 7A 12 D9 9E C9 EF 22 E3   D6 76 B6 E7 56 AA 90 C2  z....."..v..V...
#     00A0: 4C 00 68 30 41 80 7E D0   2C 5C 44 1C 7E 61 B6 FC  L.h0A...,\D..a..
#     00B0: 7E F1 17 F1 2C FC CA CA   85 39 D9 AF C4 A4 3D 9C  ....,....9....=.
#     00C0: 58 76 F8 E7 C0 07 21 4A   DB 08 AD 7E 25 5E DE CE  Xv....!J....%^..
#     00D0: 4D 31 50 A2 42 3C E6 43   28 71 8B 7C 7E A1 67 22  M1P.B<.C(q....g"
#     00E0: 42 2A 96 BC 1D D1 81 F0   5D BE C7 C9 7F CA CC 87  B*......].......
#     00F0: B5 B4 76 36 FF A7 29 11   B5 D6 EF E8 FE D4 42 52  ..v6..).......BR
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.497 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4E 75 7E 78 FB E1 87 3F   0B 4E 25 73 98 5A 0F 5B  Nu.x...?.N%s.Z.[
#     0010: D1 18 74 E9 A7 ED 85 50   DD B6 2D 85 6D 40 F1 2B  ..t....P..-.m@.+
#     0020: 9C 3F 27 75 1D 16 70 31   AE 1D A3 BB 4F A3 44 92  .?'u..p1....O.D.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.500 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:46.501 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.501 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:46.501 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.501 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 14:49:46.501 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:46.502 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.502 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.505 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 5A A5 8F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:18.000 UTC",
#       "not  after"         : "2024-01-18 14:49:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 13 67 66 4D 1B 91 0D 3F   16 AD 76 8E 76 DF B2 6D  .gfM...?..v.v..m
#           0010: F8 17 F2 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 03 03 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:11.000 UTC",
#       "not  after"         : "2024-01-18 14:49:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#           0010: 6E 17 3B E2                                        n.;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.545 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A DC 7E E6 C8 40 9B 9A   E8 6F FE 5E 7F 7A DC FD  j....@...o.^.z..
#     0010: 91 90 DE E9 FE 1B F1 20   68 6E 8A DF 5B A1 21 61  ....... hn..[.!a
#     0020: 15 0C D4 9B 72 93 33 6C   DF 21 DB F4 89 20 32 1C  ....r.3l.!... 2.
#     0030: 2D E1 B7 EF E7 10 42 83   ED 63 8D DE AC FB F9 E9  -.....B..c......
#     0040: 5E 6C 60 52 80 8D AC 9A   BF E1 F7 42 14 16 80 74  ^l`R.......B...t
#     0050: A9 86 E6 FA C2 52 48 44   78 55 77 88 54 C0 C5 34  .....RHDxUw.T..4
#     0060: D3 2C AA C4 9C 52 96 CE   FE 76 A0 99 25 14 60 ED  .,...R...v..%.`.
#     0070: 06 01 FB B4 C3 24 77 D0   43 26 4E 00 FA 81 B6 3E  .....$w.C&N....>
#     0080: 07 10 34 C3 D2 54 59 48   2F F1 EF 9E 1A 9B E6 BD  ..4..TYH/.......
#     0090: 80 47 B3 49 1C 81 C8 90   59 F9 06 F6 0D F6 9A 90  .G.I....Y.......
#     00A0: E8 1F CA 30 22 7C FE 86   0B 35 42 AD B0 0F 02 D0  ...0"....5B.....
#     00B0: 12 25 0B 62 49 FC 7C 9A   2E 6E 4B 37 9B C8 31 C7  .%.bI....nK7..1.
#     00C0: FA C9 10 C6 A2 04 A9 3F   74 E3 E5 D8 26 6B BD DC  .......?t...&k..
#     00D0: A0 5C CB 90 D5 64 A9 7D   04 69 8E 02 2D 5A 27 0E  .\...d...i..-Z'.
#     00E0: 25 57 F4 0B 48 D0 D9 1A   CF 7C BD 39 E0 A5 37 40  %W..H......9..7@
#     00F0: BA A4 A3 07 6A 8C 2E 4C   60 90 CC A1 BE 5A 5D D7  ....j..L`....Z].
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.547 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 72 0E 4F 2C 21 70 D5 00   73 47 39 DD 59 8B 91 E8  r.O,!p..sG9.Y...
#     0010: CE 8F 8E 9E 80 48 A0 D3   A6 D7 1D 41 EE 1B 3A E5  .....H.....A..:.
#     0020: F4 69 C0 E8 81 E5 25 0D   24 3F DA 34 CB C5 75 A4  .i....%.$?.4..u.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.548 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:46.603 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "89 E8 5F 1A 79 0D 3C C4 57 F7 D3 51 8B 72 35 66 2E B6 38 7D 97 54 98 CE 47 3D E0 86 2B 05 C1 17",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 14:49:46.877 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 14:49:46.878 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 14:49:58.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:59.239 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 04 11 F9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:09.000 UTC",
#       "not  after"         : "2024-01-18 14:49:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#           0010: 6E 17 3B E2                                        n.;.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 03 03 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 14:49:11.000 UTC",
#       "not  after"         : "2024-01-18 14:49:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 73 EC F2 B4 66 C1 AB   89 EC 3A E3 C4 9C D7 01  .s...f....:.....
#           0010: 6E 17 3B E2                                        n.;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 69 6B 44 AF 72 F4 35   D8 FD 01 72 99 2C 56 D9  FikD.r.5...r.,V.
#           0010: CD A5 F8 FA                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 14:49:59.257 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:59.635 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:59.639 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:59.639 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:49:59.640 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:59.718 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.718 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:59.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 14:49:59.720 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.727 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.742 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 14:49:59.746 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "73 06 E8 4F 2C 1C B1 B2 F2 C0 75 4A E6 26 93 69 AF 18 8F CE 69 79 FA 1B 6C 3A A0 1E 09 49 B8 38",
#     "session id"          : "D4 5D 67 F9 6F 42 35 93 F7 66 DA A5 65 32 CE 80 C4 B6 C5 86 B5 E5 D8 C1 52 57 99 11 69 C9 05 BA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AD 10 0B 3A 73 E9 BE 7C   39 08 DD 64 84 65 8E 4F  ...:s...9..d.e.O
#               0010: 04 3F 74 BA 2B 75 08 53   02 2E 41 7C 6E F7 92 79  .?t.+u.S..A.n..y
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.772 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "45 AB 90 2D BD 14 9B D5 D0 84 97 D9 F8 42 34 92 35 79 83 AD 1B 0A A4 EF 5C 4C 4E C5 98 DE BA ED",
#     "session id"          : "D4 5D 67 F9 6F 42 35 93 F7 66 DA A5 65 32 CE 80 C4 B6 C5 86 B5 E5 D8 C1 52 57 99 11 69 C9 05 BA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FA D8 72 4B 10 FE 2A 3F   9E 86 47 11 88 9A 73 3E  ..rK..*?..G...s>
#             0010: 09 43 AF 0D 14 B5 C0 BA   59 09 02 5E B8 70 D6 53  .C......Y..^.p.S
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.772 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.773 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.775 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.778 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.778 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.778 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.789 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.791 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.792 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:59.803 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:49:59.803 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 14:49:59.805 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 14:51:22.840 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:51:22.881 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:51:22.881 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:51:22.882 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 14:51:22.882 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33554/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28318ms
ok 65 stop command for single port in 31394ms
ok 66 status detects locally running solr in 14541ms
ok 67 status does not expose cli parameters to end user in 230ms
ok 68 listing out files in 2237ms
ok 69 copying files around in 6862ms
ok 70 upconfig in 2816ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
ok 73 Cleanup in 1239ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 23m 56s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5717 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5717/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37345/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 10:26:48.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 10:26:48.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 10:26:48.918; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 10:26:48.957; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22153ms
ok 61 start solr with client truststore and security manager in 24965ms
not ok 62 start solr with mTLS needed in 61029ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-kME785/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37345.
#
# Started Solr server on port 37345 (pid=200906). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37346.
#
# Started Solr server on port 37346 (pid=201353). Happy searching!
#
# INFO  - 2023-10-20 10:28:10.934; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 10:28:10.941; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 10:28:11.313; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 10:28:11.317; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 10:28:11.317; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:11.351 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 25 FB 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:47.000 UTC",
#     "not  after"         : "2024-01-18 10:27:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 4A 9C A2 8E 67 80 44   06 E8 6D 77 92 EE A5 8E  .J...g.D..mw....
#         0010: 6B 2A 8F C9                                        k*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:11.356 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F BF 3B 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:39.000 UTC",
#     "not  after"         : "2024-01-18 10:27:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:11.371 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:11.713 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:11.714 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:11.715 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:11.715 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:11.866 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:11.868 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:11.868 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.886 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.886 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.886 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:11.888 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B5 E3 F1 5E 2D F7 46 67 D7 8F 4B AA F3 6C 33 6E 19 B1 B1 28 9A 5B 13 57 C2 71 09 BC 8F CE 16 A9",
#   "session id"          : "06 C8 B0 02 A5 E3 A3 F1 13 2C C0 3D D1 17 4E 75 E4 06 E3 92 23 BB E2 41 48 65 CF 88 60 B5 96 17",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 CC 3A FC 1D 42 FD F6   98 42 C5 84 05 F7 46 0F  e.:..B...B....F.
#             0010: B3 CC 34 7F 9E 60 3C 00   15 00 DC 5C 8D 7D 95 7C  ..4..`<....\....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.000 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F0 F7 B6 FF 63 01 F8 52 3F ED BF B6 30 8C 6A EE D0 CD 11 65 7C C9 E2 D7 63 A1 B6 99 00 00 4E 93",
#   "session id"          : "06 C8 B0 02 A5 E3 A3 F1 13 2C C0 3D D1 17 4E 75 E4 06 E3 92 23 BB E2 41 48 65 CF 88 60 B5 96 17",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8F C5 D0 8A 7C 91 04 96   F0 8B BD 1E 87 9B A1 CF  ................
#           0010: 20 CF 1B 8D 6A 38 E1 83   A5 56 04 F9 A7 9B D6 0F   ...j8...V......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.001 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.001 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.003 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.003 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.006 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.006 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.006 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.007 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.008 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.015 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.016 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.017 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.021 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.021 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.021 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.021 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.021 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.022 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.022 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.023 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.024 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.024 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.024 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.025 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.026 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.026 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.029 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 29 53 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:43.000 UTC",
#       "not  after"         : "2024-01-18 10:27:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C FC F2 AD 1E 91 16 02   0A B0 56 23 43 59 E2 C0  ..........V#CY..
#           0010: 83 7A 8B 9B                                        .z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.029 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.111 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.114 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F 9D 7A 1B 94 DA 38 D0   27 A1 AE F8 DA A3 02 11  O.z...8.'.......
#     0010: 7D 10 59 C4 45 8C A3 58   29 24 A2 C8 74 17 C2 98  ..Y.E..X)$..t...
#     0020: 6A 02 D8 F5 7E 08 C1 17   7C 8D 18 AD ED C8 37 05  j.............7.
#     0030: 34 02 3D 18 B0 5C C9 AE   BB 29 45 C6 FA 3D FB 89  4.=..\...)E..=..
#     0040: F6 6D 03 D5 A8 EC CA DF   CB 59 2C BB 72 72 F3 CA  .m.......Y,.rr..
#     0050: 0B 61 1E B2 36 D8 DD F5   87 3D 23 13 45 8B D3 6D  .a..6....=#.E..m
#     0060: E2 0C B0 C1 9C 9B 78 0D   1F 21 88 D0 6A F0 F6 7A  ......x..!..j..z
#     0070: 30 EF 9A 98 98 FE E3 66   44 D4 69 5A 59 36 A8 E1  0......fD.iZY6..
#     0080: E8 69 01 07 3B 1B D7 9E   6F 29 2F E3 F7 93 B6 08  .i..;...o)/.....
#     0090: 57 A8 C8 24 65 F9 AC 04   1E 4B A7 5E CC 96 07 EC  W..$e....K.^....
#     00A0: 3A 7D 4C 7F 51 84 1E 13   A0 3D D7 BE 04 90 A5 A2  :.L.Q....=......
#     00B0: EA E0 B3 13 C2 56 ED 7C   10 E7 12 12 61 E7 70 C3  .....V......a.p.
#     00C0: 54 49 2B 96 3C 6B 68 29   17 1F 8E 3A 8E AF 98 A0  TI+.<kh)...:....
#     00D0: A5 17 90 46 F8 A3 F3 0D   86 5E 5B A4 FF A6 8E E7  ...F.....^[.....
#     00E0: B2 41 47 78 B3 03 A9 CD   F1 B7 2A 0B 26 17 FC B6  .AGx......*.&...
#     00F0: 3F C6 F3 4F 2B 6B C2 DF   38 A1 FF 69 F9 EF 91 35  ?..O+k..8..i...5
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.116 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 71 73 60 FB 2A 73 36 C1   85 C6 83 1A FC D3 09 AF  qs`.*s6.........
#     0010: 35 A0 C1 0A 3A 1A 8D 63   7A 6E 50 41 9F AE 23 6C  5...:..cznPA..#l
#     0020: FA 58 2C 9C 58 18 34 33   B3 86 20 39 15 15 68 32  .X,.X.43.. 9..h2
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:12.119 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.119 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:12.119 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.120 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:12.120 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:12.120 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.121 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.123 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 25 FB 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:47.000 UTC",
#       "not  after"         : "2024-01-18 10:27:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 4A 9C A2 8E 67 80 44   06 E8 6D 77 92 EE A5 8E  .J...g.D..mw....
#           0010: 6B 2A 8F C9                                        k*..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E 0A 2A 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:40.000 UTC",
#       "not  after"         : "2024-01-18 10:27:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#           0010: 75 2A A2 B9                                        u*..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.149 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 85 EF 18 1E 99 18 2C   CA B9 D6 39 23 F2 2B 27  p......,...9#.+'
#     0010: 8E F5 5A BF 56 1A 21 64   9B FB 67 BC AD 05 B8 2F  ..Z.V.!d..g..../
#     0020: C9 46 5F F4 73 7C 51 82   92 E8 59 CE 72 AE 91 E7  .F_.s.Q...Y.r...
#     0030: F5 7E B7 9B B5 1A F4 82   64 87 0B 47 D5 5F AA 28  ........d..G._.(
#     0040: 3E FB F3 16 67 C3 BB D4   CC A7 7D BB 35 65 15 C8  >...g.......5e..
#     0050: 06 80 63 3E EB CB DC 70   84 BC 4A 09 17 92 45 12  ..c>...p..J...E.
#     0060: A8 46 02 73 06 53 BC 20   17 80 7F 4A A8 E8 35 E8  .F.s.S. ...J..5.
#     0070: 35 61 B8 3A 9B DF 19 26   27 22 74 2E B4 BC 1E 2A  5a.:...&'"t....*
#     0080: 22 B3 6A D7 96 30 83 E4   1D 63 16 8E 84 CD 38 65  ".j..0...c....8e
#     0090: F9 8C E1 63 77 09 75 46   53 D2 B8 1C DB A8 CA 6D  ...cw.uFS......m
#     00A0: D3 51 6E B7 61 86 F2 E7   4C 6B 46 FE D6 6A 30 E1  .Qn.a...LkF..j0.
#     00B0: A9 87 A0 AB 40 98 7D 6E   74 AE A2 42 87 C5 78 54  ....@..nt..B..xT
#     00C0: C8 B6 1D 68 D7 BF BD 18   0D F0 31 18 F2 87 92 EF  ...h......1.....
#     00D0: 82 F5 81 AF D7 5F 4D 8D   36 D3 6C 21 60 C8 B9 C4  ....._M.6.l!`...
#     00E0: 87 08 9F 1D 51 F7 2F E9   2E 2B FB FF 2C EB 62 C0  ....Q./..+..,.b.
#     00F0: 44 8E 61 C7 D7 21 35 14   CC 64 87 50 33 BF C7 77  D.a..!5..d.P3..w
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.150 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 7A 8E 37 F5 DB E6 37   CD 98 34 EB C9 BC 46 C4  .z.7...7..4...F.
#     0010: E0 F7 34 AB 92 87 A3 D5   B1 5C 3E DC EE F0 38 A2  ..4......\>...8.
#     0020: 78 FD F5 2E EF 78 29 A8   28 EB 89 57 CA E3 4A 48  x....x).(..W..JH
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.151 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:12.212 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F4 C5 31 2F BC CC 37 80 E6 C4 5A D6 7C 9A 17 1B EF 63 48 37 8D B4 EF 49 A5 05 51 0F 2A 17 1A 2B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 10:28:12.481 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 10:28:12.482 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 10:28:13.413; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 10:28:13.419; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 10:28:13.788; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 10:28:13.791; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 10:28:13.791; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kME785/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:13.822 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 25 FB 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:47.000 UTC",
#     "not  after"         : "2024-01-18 10:27:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 4A 9C A2 8E 67 80 44   06 E8 6D 77 92 EE A5 8E  .J...g.D..mw....
#         0010: 6B 2A 8F C9                                        k*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:13.827 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F BF 3B 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:39.000 UTC",
#     "not  after"         : "2024-01-18 10:27:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:13.841 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:14.077 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.078 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:14.079 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:14.080 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.085 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.097 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.097 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:14.099 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BE 5F E6 0B 81 06 15 6F 77 F0 F0 19 CC 97 BC F6 B4 32 E0 D5 59 AB 32 D0 EC 2A D7 FA E3 DD 4B CB",
#   "session id"          : "A8 31 DA 29 0C 2E CF B0 81 47 AD D6 85 2B 07 5C 8B 25 E9 F2 7E 5C EB BF 2B 31 36 83 85 94 F9 AC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6F 3B 6C 49 6D 84 55 9B   F0 5A 2C A7 7A 85 37 5A  o;lIm.U..Z,.z.7Z
#             0010: A4 BF B3 0E 57 8A F3 5D   A8 27 BE 59 D2 25 5B 03  ....W..].'.Y.%[.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.206 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AB 52 A1 4E C7 8D 3D 24 D6 78 3C F8 42 C8 6F 1C D4 26 B2 47 B4 51 EF 3C 27 2B B5 54 10 0F 18 E5",
#   "session id"          : "A8 31 DA 29 0C 2E CF B0 81 47 AD D6 85 2B 07 5C 8B 25 E9 F2 7E 5C EB BF 2B 31 36 83 85 94 F9 AC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 64 FE 2D 1B 7C 25 99 C3   5E 27 4D 83 5B 0D 70 86  d.-..%..^'M.[.p.
#           0010: A6 9F 00 21 52 21 C7 28   82 87 7F A5 68 16 D2 29  ...!R!.(....h..)
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.206 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.207 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.209 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.209 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.211 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.211 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.220 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.222 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.223 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.227 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.227 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.227 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.227 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.227 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.229 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.230 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.230 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.230 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.231 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.232 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.232 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.235 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 29 53 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:43.000 UTC",
#       "not  after"         : "2024-01-18 10:27:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C FC F2 AD 1E 91 16 02   0A B0 56 23 43 59 E2 C0  ..........V#CY..
#           0010: 83 7A 8B 9B                                        .z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.235 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:14.298 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:14.299 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:14.299 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:14.299 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.320 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 0A 2A 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 10:27:40.000 UTC",
#     "not  after"         : "2024-01-18 10:27:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#         0010: 75 2A A2 B9                                        u*..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#         0010: 44 3A 08 60                                        D:.`
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.324 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 28 99 A3 62 18 23 C0   C7 BA 23 67 4B 7E F7 30  H(..b.#...#gK..0
#     0010: D4 BC 5F E8 ED B8 18 B1   12 7A EB 4E 6E CA 42 ED  .._......z.Nn.B.
#     0020: C7 FC E7 17 23 F3 95 11   E9 CB 61 BB AB 4B 9F 11  ....#.....a..K..
#     0030: B3 C6 8D B2 0D D1 FD 71   11 50 9A 47 BD CA 66 32  .......q.P.G..f2
#     0040: C9 C8 6B C3 0A 21 D4 88   51 DE 91 98 F5 3A A0 E9  ..k..!..Q....:..
#     0050: 35 0F 25 5E C2 8C 64 DE   E3 AB E2 14 11 65 E0 B5  5.%^..d......e..
#     0060: AF 19 98 54 4B BA 3B 85   67 0E 40 85 56 DE BD C0  ...TK.;.g.@.V...
#     0070: 71 8D E8 14 A6 31 D3 B1   BE F9 73 34 D0 6E 9C FE  q....1....s4.n..
#     0080: F9 48 5D 4E 30 2E 8F AD   2A 20 27 38 E4 78 FC EB  .H]N0...* '8.x..
#     0090: 4E F7 8E EF 0F E6 D3 27   C7 BD DE 7F E6 F5 67 EC  N......'......g.
#     00A0: FB 54 6D 0D 26 CF AC 06   D3 AD A5 1D 02 4D FD 54  .Tm.&........M.T
#     00B0: 93 B9 52 CE 76 80 30 D3   75 80 75 DC 9E 0B 2E AA  ..R.v.0.u.u.....
#     00C0: F2 09 40 89 68 C0 33 74   2A 29 A9 5B 7D 6F F5 A4  ..@.h.3t*).[.o..
#     00D0: C7 D0 E0 98 7D 26 ED E0   F1 1D 12 FF 5B 02 F9 EF  .....&......[...
#     00E0: E5 03 4A 9C 76 F1 1C 62   89 00 B2 DD E0 20 AE 6E  ..J.v..b..... .n
#     00F0: 57 C8 85 81 39 CE DB 4A   76 6E 09 B1 6C AC 1A 03  W...9..Jvn..l...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.326 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 27 47 D1 86 C0 CC F0 56   D8 90 82 44 A1 DE C2 93  'G.....V...D....
#     0010: 33 CC AD 87 9C F5 09 37   9C CC BF 46 1E 39 75 F0  3......7...F.9u.
#     0020: 97 82 59 10 EF F5 C3 13   70 AE A6 43 B0 14 94 4F  ..Y.....p..C...O
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.328 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:14.329 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.329 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:14.330 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.330 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 10:28:14.330 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:14.330 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.331 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.333 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 25 FB 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:47.000 UTC",
#       "not  after"         : "2024-01-18 10:27:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 4A 9C A2 8E 67 80 44   06 E8 6D 77 92 EE A5 8E  .J...g.D..mw....
#           0010: 6B 2A 8F C9                                        k*..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E 0A 2A 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:40.000 UTC",
#       "not  after"         : "2024-01-18 10:27:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#           0010: 75 2A A2 B9                                        u*..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.359 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 D3 74 A1 1E 0F 58 76   3E D3 A3 B7 6B 91 E4 D4  w.t...Xv>...k...
#     0010: C0 43 9E 6C 63 18 33 65   76 FF E0 4F 8A 40 FC 6C  .C.lc.3ev..O.@.l
#     0020: 2F F0 2E EA 35 67 DE 44   EB 99 CD D4 C8 53 CE 1B  /...5g.D.....S..
#     0030: 15 7C 57 20 E4 0A 06 41   F1 F5 F2 51 5A 7C 85 3C  ..W ...A...QZ..<
#     0040: 55 5C 33 DF 63 7E 48 2E   08 B9 46 FF 91 03 6D 60  U\3.c.H...F...m`
#     0050: 32 68 58 97 32 EA BE C7   6D B0 C8 52 CA 3B A4 84  2hX.2...m..R.;..
#     0060: F4 46 AC 20 8B 54 9F 6B   3F 8A 09 60 91 BD FF 69  .F. .T.k?..`...i
#     0070: 92 E8 2B B1 B6 E6 12 68   61 F8 7A B2 92 0F 2A D1  ..+....ha.z...*.
#     0080: 33 4A 1F BB 86 4A 32 FF   B7 9A 1C 30 A5 21 28 CB  3J...J2....0.!(.
#     0090: C1 1F DD 50 2E 39 A8 88   36 84 54 95 23 64 26 41  ...P.9..6.T.#d&A
#     00A0: 4F F5 96 20 2E 2E 9D 21   CE 8E D6 F5 FE 20 D0 C0  O.. ...!..... ..
#     00B0: 28 4E EE F5 AD 96 30 27   A8 33 7F 6A 20 3E 93 6B  (N....0'.3.j >.k
#     00C0: E6 CB 83 AD 09 18 27 6E   4C 7D AF 95 1E 75 37 6B  ......'nL....u7k
#     00D0: 1E BA 25 D0 FF C7 D9 02   08 BA 4A 34 4D 61 BB 68  ..%.......J4Ma.h
#     00E0: 84 CE E9 5E A4 5A 87 A8   1E 78 D8 C2 56 63 E8 28  ...^.Z...x..Vc.(
#     00F0: 9E A8 DE 7E E0 3E A2 8F   59 C1 2B 41 DE 43 78 CF  .....>..Y.+A.Cx.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.360 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 D8 BC 40 B7 38 07 48   84 A1 69 1B E0 95 AE 74  y..@.8.H..i....t
#     0010: AF BF B7 61 84 09 E1 9A   A9 D3 DE DE 86 C0 72 34  ...a..........r4
#     0020: AB 3C 95 5C AE 9F 77 A7   A2 DF 34 8A 3C C4 94 25  .<.\..w...4.<..%
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.361 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:14.418 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D6 67 7B E2 A2 59 6A 74 8B 8B 06 0F F1 6F 42 6A 36 9E 83 86 10 62 B1 D9 E9 84 9C 03 F7 78 1A 44",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 10:28:14.693 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 10:28:14.695 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 10:28:26.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:26.392 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F BF 3B 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:39.000 UTC",
#       "not  after"         : "2024-01-18 10:27:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#           0010: 75 2A A2 B9                                        u*..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E 0A 2A 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 10:27:40.000 UTC",
#       "not  after"         : "2024-01-18 10:27:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 7B F1 AA 18 30 0E 0F   5A 7A 70 87 43 AD E1 45  .....0..Zzp.C..E
#           0010: 75 2A A2 B9                                        u*..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 69 81 3E D1 1E EB 62   BF 00 F8 36 A3 D3 E9 A6  .i.>...b...6....
#           0010: 44 3A 08 60                                        D:.`
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 10:28:26.408 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:26.763 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:26.764 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:26.764 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:28:26.764 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:26.902 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.903 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:26.905 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 10:28:26.905 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.923 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.924 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.924 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 10:28:26.927 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E4 21 78 20 CF 06 DE 3E 66 21 7D D2 16 29 59 2B 0C A9 72 36 9F BD A5 1C F3 C4 6A 28 79 D7 07 DF",
#     "session id"          : "FB 5F B4 A5 72 7D D7 7D AB 01 8D 82 10 49 EC EC 39 AA 17 EE 07 4D 67 9C 66 5A A2 D6 D2 E8 56 CE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 53 13 38 D8 91 9F 23 F2   54 AA 51 23 18 03 B5 DD  S.8...#.T.Q#....
#               0010: F2 6D BE 97 68 42 53 85   24 F3 A6 13 7F 81 D6 1C  .m..hBS.$.......
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.946 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D4 0A BD C4 EE EC 4D F4 14 03 57 6F DF 28 02 A2 56 40 5D 09 BB 19 9F 78 DC 67 D2 ED B9 32 68 66",
#     "session id"          : "FB 5F B4 A5 72 7D D7 7D AB 01 8D 82 10 49 EC EC 39 AA 17 EE 07 4D 67 9C 66 5A A2 D6 D2 E8 56 CE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 E2 53 DA 2D 3D E8 05   3A 62 50 B8 DE BD CD 5D  e.S.-=..:bP....]
#             0010: 74 68 E1 82 3E 5C 4B 47   1B 02 50 32 2A 75 EE 73  th..>\KG..P2*u.s
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.946 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.947 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.948 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.949 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.951 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.960 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.962 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.963 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.967 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.967 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.967 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:28:26.968 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 10:28:26.970 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 10:29:50.146 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:29:50.192 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:29:50.192 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:29:50.192 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 10:29:50.193 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37346/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28383ms
ok 65 stop command for single port in 30957ms
ok 66 status detects locally running solr in 14376ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2171ms
ok 69 copying files around in 6567ms
ok 70 upconfig in 2641ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1200ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1199ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 24s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m51s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5716 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5716/

All tests passed

Build Log:
[...truncated 1311 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36047/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 07:32:54.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 07:32:54.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 07:32:55.432; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 07:32:55.470; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23015ms
ok 61 start solr with client truststore and security manager in 24988ms
not ok 62 start solr with mTLS needed in 60565ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eRHSsu/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36047.
#
# Started Solr server on port 36047 (pid=199882). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36048.
#
# Started Solr server on port 36048 (pid=200332). Happy searching!
#
# INFO  - 2023-10-20 07:34:18.363; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 07:34:18.368; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 07:34:18.737; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 07:34:18.740; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 07:34:18.740; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:18.771 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 87 48 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:54.000 UTC",
#     "not  after"         : "2024-01-18 07:33:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 03 B2 83 D8 CF C4 2C   0B 26 6D 50 18 F0 07 D4  .......,.&mP....
#         0010: 7C A5 D5 30                                        ...0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:18.776 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 4C 7F 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:46.000 UTC",
#     "not  after"         : "2024-01-18 07:33:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:18.790 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:18.882 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:18.882 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:18.882 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:18.883 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:19.028 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.028 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:19.030 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:19.030 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.036 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.047 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:19.049 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 80 1F B0 D7 1E 6B 8A 7C 8C FA 61 42 25 1D C0 EE 76 94 73 69 CD 1F 31 D6 C7 0D 23 D8 04 50 61",
#   "session id"          : "FD 82 6D A1 F3 A3 95 05 11 1A 11 74 36 3B B3 FA E8 D1 26 EB 35 50 8F D7 BC 31 8F 28 DB A2 FF AC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BF 45 1E 8A AE 42 86 42   E0 72 B7 43 DD 14 E6 26  .E...B.B.r.C...&
#             0010: 17 94 45 21 F7 63 21 5F   A8 C4 80 A7 E2 9A DA 63  ..E!.c!_.......c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.158 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "40 30 7B 99 BE BF D7 DD 88 AE 75 7F 83 F2 72 C7 D6 47 86 D1 09 9C DF 6D 5D 3E 78 AF 21 06 E4 35",
#   "session id"          : "FD 82 6D A1 F3 A3 95 05 11 1A 11 74 36 3B B3 FA E8 D1 26 EB 35 50 8F D7 BC 31 8F 28 DB A2 FF AC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1F 07 A0 73 E4 37 1D EC   FE 27 59 7F 1D FA 87 CB  ...s.7...'Y.....
#           0010: F3 AE B8 C2 72 A7 E8 14   1D B3 1A 86 DC 41 63 64  ....r........Acd
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.159 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.159 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.161 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.163 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.163 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.164 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.164 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.164 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.164 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.172 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.174 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.175 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.178 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.179 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.179 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.179 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.179 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.181 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.182 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.182 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.182 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.183 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.184 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.184 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.187 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 E7 39 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:50.000 UTC",
#       "not  after"         : "2024-01-18 07:33:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A A6 22 54 74 81 0D F9   66 F7 E3 3B E5 6D 47 71  .."Tt...f..;.mGq
#           0010: 75 8C 68 50                                        u.hP
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.268 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.272 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B E5 C2 93 5C A7 86 9F   01 B6 2B 3F 81 AA 7E 3E  ....\.....+?...>
#     0010: 3E CD 4A D4 4D 66 5F 25   FA 01 AE 51 13 69 DE 08  >.J.Mf_%...Q.i..
#     0020: A1 23 88 48 63 E3 99 C5   DC A8 79 09 2B A0 C2 ED  .#.Hc.....y.+...
#     0030: 61 EE 8B F0 CB 9E 52 0C   F9 CC CC 9A FC F8 0A 94  a.....R.........
#     0040: 30 09 0E FC 63 17 0D 2F   AE 4E 9A AF C5 CE 37 DA  0...c../.N....7.
#     0050: C3 3A DF 2A EE D1 7C 13   83 E6 24 5C AC 12 81 32  .:.*......$\...2
#     0060: F5 CC BC D2 5A B2 BD 85   D9 AC FF BE 52 A8 0E 46  ....Z.......R..F
#     0070: 47 A4 61 F3 BB 00 D0 56   E8 BC 8B 17 F5 23 2B A5  G.a....V.....#+.
#     0080: 06 9A 0D A0 16 03 0D F0   99 B8 2E AA 3B 35 C2 5B  ............;5.[
#     0090: 89 68 DC B6 EE D6 83 96   4A 75 16 40 A0 AF 1F 6D  .h......Ju.@...m
#     00A0: 25 24 15 E8 8D 80 35 00   83 4E 31 1C 35 66 6A C3  %$....5..N1.5fj.
#     00B0: 1E 59 52 E2 D4 56 3A 4E   88 F2 F4 15 0F 32 E0 DE  .YR..V:N.....2..
#     00C0: 58 DE 76 B7 16 C3 8E 9C   9F 1D 51 3C BF E9 77 67  X.v.......Q<..wg
#     00D0: 85 7A FF 7E 6C 11 E5 3B   13 C4 AE 2D 1A F7 22 4E  .z..l..;...-.."N
#     00E0: 6D C3 7F 4A 55 E8 1D 64   19 59 1C 82 C0 49 ED A5  m..JU..d.Y...I..
#     00F0: D7 08 72 92 91 9A 99 BE   30 09 E7 1B 2E 0B 53 33  ..r.....0.....S3
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.274 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 59 C2 33 6E 62 5D 2F   72 DC E9 F3 17 BA 7A 1B  .Y.3nb]/r.....z.
#     0010: BC 1D 88 3F 0B 26 A8 79   62 C4 E0 5F 46 73 E1 03  ...?.&.yb.._Fs..
#     0020: BF 06 E0 42 08 60 20 23   3F BA AF 91 A2 B7 53 2F  ...B.` #?.....S/
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.276 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:19.277 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.277 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:19.278 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.278 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:19.278 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:19.278 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.278 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.281 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 87 48 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:54.000 UTC",
#       "not  after"         : "2024-01-18 07:33:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 03 B2 83 D8 CF C4 2C   0B 26 6D 50 18 F0 07 D4  .......,.&mP....
#           0010: 7C A5 D5 30                                        ...0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 61 0E B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:48.000 UTC",
#       "not  after"         : "2024-01-18 07:33:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#           0010: 82 1F FD D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.306 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 BB B6 12 28 2C 59 03   04 43 29 B8 A1 1B A4 DD  ....(,Y..C).....
#     0010: 14 D7 5B CE 86 AF 4E 0E   76 16 A3 8C 88 AF 96 57  ..[...N.v......W
#     0020: E7 A6 AB 45 E6 15 31 CB   6C 02 D3 1E 1A E4 4E 1D  ...E..1.l.....N.
#     0030: C0 D9 15 4A 31 2E A8 93   16 30 A8 4C BE 6F 93 D4  ...J1....0.L.o..
#     0040: 4B EE 40 31 9F 6F B7 6C   7F F9 B2 84 B3 21 BD 85  K.@1.o.l.....!..
#     0050: 9B 84 10 78 7E 9F A0 F5   B7 B4 16 D6 81 C0 9B ED  ...x............
#     0060: C4 8D 12 49 B3 FC 63 E3   D9 C9 08 3A EF 9C 16 B4  ...I..c....:....
#     0070: DF F7 D4 0B 49 EF 56 CA   75 E3 E8 26 6B D2 85 7E  ....I.V.u..&k...
#     0080: F1 32 34 3A 9C 8C 82 8F   51 7D 75 F4 65 FB AC 37  .24:....Q.u.e..7
#     0090: 7F 5D C4 4A EE AB 2B 23   9F 17 FE 07 36 22 C0 50  .].J..+#....6".P
#     00A0: 48 FB 2C 5C 0C 3E 1D 71   8A 05 91 FC 17 A8 9C 95  H.,\.>.q........
#     00B0: 87 35 7F 51 A2 A1 53 40   D7 72 29 05 53 D8 00 8B  .5.Q..S@.r).S...
#     00C0: 29 EE A3 AF 45 93 DB 2D   D0 03 D0 83 26 AE F1 4F  )...E..-....&..O
#     00D0: 97 F0 9D 68 D8 BE A7 EA   75 D9 A9 10 FC 74 27 5F  ...h....u....t'_
#     00E0: 6A 33 57 8B 21 A0 10 68   40 EE 5F 71 7D A1 5B 07  j3W.!..h@._q..[.
#     00F0: E0 35 68 E2 F6 2A 65 0B   6F 16 07 5E 69 6A 0A 13  .5h..*e.o..^ij..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.307 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B DC 7C 06 7E 92 96 CF   91 95 48 11 EE CD DA 23  ..........H....#
#     0010: 55 1A E2 3C CF C3 30 37   CB 41 60 AF 5D 78 2A B2  U..<..07.A`.]x*.
#     0020: 6A 09 0B 7B 86 94 9F A0   CE 99 75 2D 70 BB 93 CE  j.........u-p...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.307 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:19.362 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "43 12 4F AE F3 EB AF E5 10 05 18 35 1D E5 50 3C 1E 42 E6 87 21 A3 A4 3E 5E 7C E9 9E 2D 3A C5 9F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 07:34:19.665 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 07:34:19.666 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 07:34:20.609; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 07:34:20.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 07:34:20.996; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 07:34:20.999; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 07:34:21.000; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eRHSsu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:21.032 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 87 48 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:54.000 UTC",
#     "not  after"         : "2024-01-18 07:33:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 03 B2 83 D8 CF C4 2C   0B 26 6D 50 18 F0 07 D4  .......,.&mP....
#         0010: 7C A5 D5 30                                        ...0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:21.036 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 4C 7F 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:46.000 UTC",
#     "not  after"         : "2024-01-18 07:33:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:21.051 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:21.367 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:21.368 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:21.368 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:34:21.368 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:21.522 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:21.524 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:21.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.541 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:21.544 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "66 BB DC 0B 91 CC 96 D7 33 37 8C 3C F9 9B D3 0C E6 85 03 F5 50 3E 4D 56 2B 63 60 99 C1 B6 68 5A",
#   "session id"          : "00 E5 65 A4 0F 3B 76 52 5B CE 0C 2E 9C 46 66 B1 88 DD E7 FE BD F5 F8 38 B2 8E 98 17 CB C6 D7 8D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 61 0F 8B 96 1F 50 BE 6C   71 DA BD F3 9A 21 8B A0  a....P.lq....!..
#             0010: 1D 54 C8 13 26 FD 34 AF   CC F3 48 64 24 CB D6 24  .T..&.4...Hd$..$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "71 E3 24 C7 0C 44 70 22 C6 0C 02 92 FA FB 41 98 6C 58 AF 7C DA AD 8D 2D E0 1E 25 45 47 1C 3B EE",
#   "session id"          : "00 E5 65 A4 0F 3B 76 52 5B CE 0C 2E 9C 46 66 B1 88 DD E7 FE BD F5 F8 38 B2 8E 98 17 CB C6 D7 8D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1B 6F D8 9C D2 37 AC 13   D1 F6 F0 CC A7 53 75 85  .o...7.......Su.
#           0010: 63 60 CE 92 BD F8 12 A0   AD 41 75 F6 E5 F6 CD 62  c`.......Au....b
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.648 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.648 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.652 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.662 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.663 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.667 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.667 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.668 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.670 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.670 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.671 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.672 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.675 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 E7 39 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:50.000 UTC",
#       "not  after"         : "2024-01-18 07:33:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A A6 22 54 74 81 0D F9   66 F7 E3 3B E5 6D 47 71  .."Tt...f..;.mGq
#           0010: 75 8C 68 50                                        u.hP
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.675 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.785 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 61 0E B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 07:33:48.000 UTC",
#     "not  after"         : "2024-01-18 07:33:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#         0010: 82 1F FD D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#         0010: 7F AB B3 07                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.789 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: D0 3E 69 08 89 23 70 0B   95 F5 44 EF C6 67 36 A2  .>i..#p...D..g6.
#     0010: 78 A2 F6 1D 05 1B 96 1D   9D D4 E2 12 5A F7 AD 89  x...........Z...
#     0020: CC E5 5C 4B 41 1C 74 C0   A4 84 BB 27 07 75 44 3D  ..\KA.t....'.uD=
#     0030: 91 2E FE 7C E0 BA 14 74   2A 6C 22 15 B4 5B AF B6  .......t*l"..[..
#     0040: 5D 60 84 56 80 C6 DC 0C   8E 3B 47 2A 28 19 CE B7  ]`.V.....;G*(...
#     0050: 1B 7F 6F 0B FD BF 83 91   07 09 51 9A 1C 55 F2 16  ..o.......Q..U..
#     0060: C9 1C 55 61 17 45 6A 64   9D BB 64 21 97 7E E7 3C  ..Ua.Ejd..d!...<
#     0070: 77 AF 18 39 04 60 A2 E9   9B B3 C2 D2 A1 30 4E E0  w..9.`.......0N.
#     0080: 30 A0 4E 4D 1B 3D AD 28   AF DB 48 42 81 03 B9 70  0.NM.=.(..HB...p
#     0090: 42 C9 C7 15 F5 08 6E 6A   99 DA DC FD 75 12 A1 BA  B.....nj....u...
#     00A0: 9A 00 E6 3C 54 79 3F A3   35 DB CD DA 07 35 5A 31  ...<Ty?.5....5Z1
#     00B0: 08 87 FB DC 04 9D 76 20   A5 E7 E3 5F 1C 77 CE 33  ......v ..._.w.3
#     00C0: 85 91 7A 50 4F ED 0C 39   3B E6 C6 60 80 9F 71 E7  ..zPO..9;..`..q.
#     00D0: FA 89 A3 56 D1 7F A5 C5   4D 19 54 B0 EC 41 3F 0D  ...V....M.T..A?.
#     00E0: 61 0F AB E7 5E 59 8D 88   50 F9 41 67 DF 59 DE 53  a...^Y..P.Ag.Y.S
#     00F0: 86 A1 FA DD 13 72 06 75   19 08 C8 58 00 28 C7 7A  .....r.u...X.(.z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.791 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A CE 39 44 03 9E AF DA   A5 07 A9 E5 F4 A7 E8 D2  Z.9D............
#     0010: A2 55 73 8A DC D2 AA D3   F2 9D 88 03 23 83 91 EA  .Us.........#...
#     0020: 0E 44 C7 E3 8D 20 F0 DC   BB 13 3A 14 B1 80 1D D0  .D... ....:.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.793 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:21.794 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.794 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:21.795 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.795 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 07:34:21.795 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:21.795 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.796 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.798 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 87 48 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:54.000 UTC",
#       "not  after"         : "2024-01-18 07:33:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 03 B2 83 D8 CF C4 2C   0B 26 6D 50 18 F0 07 D4  .......,.&mP....
#           0010: 7C A5 D5 30                                        ...0
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 61 0E B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:48.000 UTC",
#       "not  after"         : "2024-01-18 07:33:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#           0010: 82 1F FD D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.824 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 85 8E 43 6B 52 70 9E   3B 79 B6 8A 11 97 AB AD  *..CkRp.;y......
#     0010: EB C8 5D 37 26 71 ED 02   5D 9C D2 2B 89 A2 86 78  ..]7&q..]..+...x
#     0020: 98 AC A8 F2 8A 37 CF F4   C8 93 44 61 F0 94 55 6B  .....7....Da..Uk
#     0030: 1F ED A5 C0 1C B2 57 C6   96 FD 1F 9A B5 06 36 74  ......W.......6t
#     0040: 11 D6 BA BB 2D D9 0E 50   0B 0A 34 89 AF 3E D2 7A  ....-..P..4..>.z
#     0050: A2 31 3F 76 EF 67 78 94   F9 5C 70 D9 64 55 B4 9C  .1?v.gx..\p.dU..
#     0060: E9 27 A1 2A B3 60 3C 37   95 4D 1D 66 E8 E2 77 6B  .'.*.`<7.M.f..wk
#     0070: F6 AB 6A D8 2F 2A 0B 5F   9E F8 1C DA F2 21 E9 C8  ..j./*._.....!..
#     0080: FC B9 FF D6 E9 60 C9 99   EC A2 59 68 0C 46 C2 9D  .....`....Yh.F..
#     0090: 96 B0 82 08 27 1C 6F AA   C0 E2 56 C8 2B 8D 0D C7  ....'.o...V.+...
#     00A0: 9D 6B 3F 10 55 42 31 97   D3 9E 39 27 9C 64 40 20  .k?.UB1...9'.d@
#     00B0: EE FE B8 DA BA FF 6E 32   BA DE 92 66 AF 16 4D 9C  ......n2...f..M.
#     00C0: A1 1F E9 82 D1 98 9F CD   43 DA 80 57 8A 13 08 E2  ........C..W....
#     00D0: CD 2C 48 BE EC 51 E3 96   B2 06 EB F0 54 4D 80 FF  .,H..Q......TM..
#     00E0: 2E F8 95 C9 91 D5 0C F2   4A 42 BE 77 51 3E 2B 08  ........JB.wQ>+.
#     00F0: AC 70 21 8A 79 16 30 94   92 2B A3 F9 33 21 64 68  .p!.y.0..+..3!dh
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.825 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D 8C 06 E0 3B 1A 55 BA   1C F7 1B FD 27 BA 74 F7  ....;.U.....'.t.
#     0010: E7 54 7E C4 71 5C CB 30   71 B0 2F DE CC 35 3D 15  .T..q\.0q./..5=.
#     0020: E5 72 4A C7 67 98 A0 A2   CE D1 1D 91 41 2B 11 81  .rJ.g.......A+..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.826 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:21.880 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4C A4 17 4E 36 4C 26 64 B4 B7 3B B5 19 20 87 55 36 4A E4 CC B7 E4 B8 DC D2 C8 C5 68 A3 95 36 BF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 07:34:22.153 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 07:34:22.154 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 07:34:33.354; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:33.663 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 61 0E B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:48.000 UTC",
#       "not  after"         : "2024-01-18 07:33:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#           0010: 82 1F FD D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 13 9B 0D AA F5 2F 3E   1E AF B3 11 4C 07 E2 CB  ....../>....L...
#           0010: 7F AB B3 07                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 4C 7F 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 07:33:46.000 UTC",
#       "not  after"         : "2024-01-18 07:33:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9F C2 5F 43 38 BB 3A   C6 75 0B A4 B7 3E 9D 53  ..._C8.:.u...>.S
#           0010: 82 1F FD D8                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 07:34:33.678 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:33.907 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.908 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:33.909 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 07:34:33.910 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.929 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.929 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 07:34:33.931 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2E 41 61 AF AA 8D F6 6D FA B0 4A 29 36 A1 FF C7 B8 4E 3E 75 0D 8D A3 E0 8D 04 28 8A A8 14 BD 1F",
#     "session id"          : "02 71 F0 E0 BB 8C EB 4C 6C C0 70 79 37 C5 5A AF C0 D4 DF 81 BA FD BD 46 69 3B F1 B0 E6 22 F3 29",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 97 67 07 A5 A0 7E 1B D7   D9 C5 BE A3 87 DC 7E F1  .g..............
#               0010: 67 95 77 14 CC BF 45 6F   51 83 8E 35 75 EE 56 10  g.w...EoQ..5u.V.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.949 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "01 87 92 87 17 8A 3D 97 39 03 BB 67 49 A6 30 0A 47 96 4A 03 52 4E 6A 65 0D 5D D5 C6 66 B0 FD 9E",
#     "session id"          : "02 71 F0 E0 BB 8C EB 4C 6C C0 70 79 37 C5 5A AF C0 D4 DF 81 BA FD BD 46 69 3B F1 B0 E6 22 F3 29",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD 2B 54 9F C8 51 8C B7   A0 45 C8 B0 BB 2E 90 8A  .+T..Q...E......
#             0010: DB 3B C3 D2 B7 2E F4 ED   FC 1E 9F 99 B6 8E 65 18  .;............e.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.950 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.950 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.952 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.952 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.952 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.954 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.954 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.954 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.962 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.964 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.965 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:33.969 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:34:33.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 07:34:33.971 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certif

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 07:35:56.631 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:35:56.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:35:56.682 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:35:56.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 07:35:56.682 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36048/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28597ms
ok 65 stop command for single port in 31008ms
ok 66 status detects locally running solr in 14595ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2169ms
ok 69 copying files around in 6556ms
ok 70 upconfig in 2616ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1198ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1198ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 21s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m49s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5715 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5715/

All tests passed

Build Log:
[...truncated 1318 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45691/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 04:15:42.287; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 04:15:42.292; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 04:15:43.196; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 04:15:43.237; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22813ms
ok 61 start solr with client truststore and security manager in 25371ms
not ok 62 start solr with mTLS needed in 57156ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-8dqlKF/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45691.
#
# Started Solr server on port 45691 (pid=198888). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45692.
#
# Started Solr server on port 45692 (pid=199343). Happy searching!
#
# INFO  - 2023-10-20 04:17:06.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 04:17:06.542; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 04:17:06.924; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 04:17:06.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 04:17:06.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:06.966 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 4A 17 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:42.000 UTC",
#     "not  after"         : "2024-01-18 04:16:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 EB BB 22 BB 37 1E C6   73 1A 69 4B 9D 1E CF F3  ...".7..s.iK....
#         0010: 10 D2 2C 41                                        ..,A
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:06.970 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 8D 0A 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:34.000 UTC",
#     "not  after"         : "2024-01-18 04:16:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:06.986 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:07.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:07.121 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:07.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:07.123 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:07.278 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.279 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:07.281 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:07.281 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.287 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.299 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.299 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.299 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:07.302 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5D 39 B5 AC 91 FC 39 F6 FF 0C E0 58 B5 A8 01 7F 4A 5D BF F3 52 D8 D6 FA C2 01 E5 52 E0 63 F8 F1",
#   "session id"          : "80 4D 0D 43 39 12 00 C0 C6 05 CE 2E 64 35 4A EA 5C 28 00 05 7A 38 D0 1A 16 0A 1C B5 04 46 60 8A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 A7 85 48 A4 F2 7E 76   92 57 E8 7A 2D EA 3E A9  ...H...v.W.z-.>.
#             0010: 76 F0 06 74 7C 12 F6 B8   22 01 E0 25 6E F3 1B 06  v..t...."..%n...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.423 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1A 24 4F 1C 91 48 6A 8C FA 5C 98 2A 2D 63 ED 12 4C 91 96 51 47 2E 14 B9 3D 5A B6 92 E8 8A C7 4E",
#   "session id"          : "80 4D 0D 43 39 12 00 C0 C6 05 CE 2E 64 35 4A EA 5C 28 00 05 7A 38 D0 1A 16 0A 1C B5 04 46 60 8A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 54 2A 91 19 FC EA 14 E0   1D 58 F5 05 B4 03 75 F9  T*.......X....u.
#           0010: 68 C9 63 B0 5F 3C 60 EB   19 41 73 FC B3 35 91 1B  h.c._<`..As..5..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.423 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.424 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.426 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.429 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.429 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.432 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.439 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.441 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.442 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.446 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.448 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.448 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.450 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.450 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.450 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.451 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.452 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.453 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.453 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.458 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 33 53 65",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:38.000 UTC",
#       "not  after"         : "2024-01-18 04:16:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 C4 E0 64 95 CC 8F A4   E0 E7 B0 6D 01 05 67 22  P..d.......m..g"
#           0010: 4C 60 F5 E0                                        L`..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.458 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.545 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.549 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 9A 52 81 8C 9B C8 85   1B 78 A0 05 96 E8 1C 11  U.R......x......
#     0010: D9 33 6C 73 8A BB 5F 04   24 A2 4F A8 4F D3 E3 C9  .3ls.._.$.O.O...
#     0020: D3 01 92 5C DB 63 E1 71   76 D3 22 5C 3A 3A BE D9  ...\.c.qv."\::..
#     0030: A4 92 78 0C F8 0B F5 6D   3B 82 DC E7 48 95 A7 66  ..x....m;...H..f
#     0040: 84 30 70 5D 66 CC 1F DB   D6 F0 2D 18 F2 8F 4E F3  .0p]f.....-...N.
#     0050: CC ED 19 6D 70 6B 72 44   63 65 BF 49 FE 22 6B A9  ...mpkrDce.I."k.
#     0060: 30 FA EB 91 10 55 5A 1F   59 E7 65 71 EA 4E E0 12  0....UZ.Y.eq.N..
#     0070: D3 F7 1C 18 4B C1 5F 73   6C 57 14 DD 0D AC 7D B3  ....K._slW......
#     0080: 16 64 01 01 79 F0 D2 3A   1A 7E 64 E8 F2 E1 C8 E3  .d..y..:..d.....
#     0090: D7 BF 9F EA 43 00 C4 C2   1F B4 01 C3 BC FC 6C 97  ....C.........l.
#     00A0: 9B 95 B8 0E 49 95 50 D5   A7 54 F8 33 E7 8A 7E C5  ....I.P..T.3....
#     00B0: 4D 41 0E 01 6F 97 E3 1B   DD 16 68 F8 78 E1 EA 59  MA..o.....h.x..Y
#     00C0: AC EA 28 7C BB 56 F2 C5   E1 67 CE 65 65 87 38 31  ..(..V...g.ee.81
#     00D0: 2C B6 C6 2D 5A 95 EF C7   D3 5D F7 AE 86 6A 67 72  ,..-Z....]...jgr
#     00E0: 45 62 7E 8A 13 AF 65 07   A9 35 84 18 DE 71 5E 5B  Eb....e..5...q^[
#     00F0: 3D 5D 82 17 DB 8E 75 28   F7 02 B3 86 5F 0C 5E F4  =]....u(...._.^.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.551 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F 7B CF 4A 49 3E 87 17   19 3D EE 18 BA A4 5B 4B  o..JI>...=....[K
#     0010: DC 95 C8 17 9F E7 FC 44   5A F5 E9 BD 9F 04 92 60  .......DZ......`
#     0020: A1 53 57 F4 FC 07 64 F9   5E 08 58 76 F9 1B E2 07  .SW...d.^.Xv....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.554 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:07.555 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.555 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:07.555 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.555 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:07.556 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:07.556 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.556 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.559 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 4A 17 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:42.000 UTC",
#       "not  after"         : "2024-01-18 04:16:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 EB BB 22 BB 37 1E C6   73 1A 69 4B 9D 1E CF F3  ...".7..s.iK....
#           0010: 10 D2 2C 41                                        ..,A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D E6 81 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:36.000 UTC",
#       "not  after"         : "2024-01-18 04:16:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#           0010: 6D 9D 50 45                                        m.PE
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.583 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 7C 45 33 49 D0 BF CC   E3 83 C7 93 3F 48 8C 11  w.E3I.......?H..
#     0010: FE 03 C6 DD B5 29 25 F1   21 A8 69 31 A0 3A 53 40  .....)%.!.i1.:S@
#     0020: A8 3D AE F4 E4 A4 34 3F   28 14 AC 68 87 9D 8A C0  .=....4?(..h....
#     0030: E5 22 98 A2 9D 3F 52 52   FB F9 06 5A 45 7E D0 D6  ."...?RR...ZE...
#     0040: 86 CF 38 B7 8A 80 FB 8F   BA 52 B2 88 E6 4A DD 70  ..8......R...J.p
#     0050: 18 12 A6 2F 5B 50 E6 F7   02 EF 0E 4C F4 6E AB 84  .../[P.....L.n..
#     0060: 0D E8 88 FF 1F C2 65 9E   97 D6 D6 EE E9 25 6D EA  ......e......%m.
#     0070: 67 AA 61 D7 E9 BE F2 0D   35 58 0D 31 69 AB E4 60  g.a.....5X.1i..`
#     0080: E0 55 B0 9B 36 1C 20 2E   89 58 EA 48 DF B8 40 F5  .U..6. ..X.H..@.
#     0090: BF B4 D5 0A 18 A0 A9 54   A0 63 87 77 D8 F4 A2 0B  .......T.c.w....
#     00A0: F8 3C C9 8B C0 EF 22 F3   49 8F 83 DE 0C D9 00 04  .<....".I.......
#     00B0: B1 3B 45 43 A8 3F DE 29   0C 13 71 4E 65 AF 98 CE  .;EC.?.)..qNe...
#     00C0: DD 25 FE 3A C0 EF A5 30   79 1D 77 1C 05 F5 AD D7  .%.:...0y.w.....
#     00D0: 8E B1 36 FC F1 11 59 BB   76 A7 7D 7D 08 72 25 4A  ..6...Y.v....r%J
#     00E0: 98 D4 E0 3E B7 CE 7B AB   8E 18 E4 76 3B DE 7B 17  ...>.......v;...
#     00F0: AC C1 18 6E D4 C6 EB 38   A1 E2 70 AC 2B 1E 14 87  ...n...8..p.+...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.584 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CE DB CE 0A 73 88 6C 59   7E EB 39 A9 A0 6A FE DE  ....s.lY..9..j..
#     0010: 28 EB E5 87 65 BE 27 E4   8A 02 CB 36 EC 69 53 1C  (...e.'....6.iS.
#     0020: 91 36 4B C2 35 D2 31 EB   9F 0B D1 A5 BA 49 CB 6D  .6K.5.1......I.m
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.585 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:07.645 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "67 23 0E 58 0A EE F8 24 FE 3C 1B E8 3F 43 13 F5 EE F5 D2 C9 76 20 B3 F8 6E 5B 7F DE 84 D4 1E 9A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 04:17:08.010 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 04:17:08.011 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 04:17:08.969; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 04:17:08.975; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 04:17:09.341; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 04:17:09.344; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 04:17:09.345; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8dqlKF/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:09.377 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "17 4A 17 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:42.000 UTC",
#     "not  after"         : "2024-01-18 04:16:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 EB BB 22 BB 37 1E C6   73 1A 69 4B 9D 1E CF F3  ...".7..s.iK....
#         0010: 10 D2 2C 41                                        ..,A
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:09.381 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 8D 0A 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:34.000 UTC",
#     "not  after"         : "2024-01-18 04:16:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:09.396 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:09.485 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:09.487 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:09.487 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:17:09.487 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:09.621 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.622 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:09.623 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:09.624 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.629 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.640 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.641 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:09.643 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A1 B6 7F 2F 24 70 50 71 5D 07 EC 35 D9 4C 35 52 4A 19 DA 27 2B 3C 8A 1D C8 BF 7C 7D 2F E5 38 D4",
#   "session id"          : "19 87 F1 09 51 8D 4E 09 53 6D 68 FD E2 68 A4 DE F0 94 3F 1F 65 4C 79 6B 70 BA 38 73 01 A2 22 77",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 93 5A 8F 04 83 F1 60   B2 B0 2B 7F 55 21 EF A9  ..Z....`..+.U!..
#             0010: 41 93 21 FC 53 DD DF D9   65 27 1A C8 D0 60 93 43  A.!.S...e'...`.C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.742 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C9 58 16 02 1E 81 C0 37 EA 2C 93 13 F8 8A 88 3B 31 E9 7B 62 25 C3 7B 91 81 7F 5B 45 D6 54 CE 52",
#   "session id"          : "19 87 F1 09 51 8D 4E 09 53 6D 68 FD E2 68 A4 DE F0 94 3F 1F 65 4C 79 6B 70 BA 38 73 01 A2 22 77",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DD 5E 2A 4F E0 BD 9B 43   D4 7B F8 B3 27 ED E7 E1  .^*O...C....'...
#           0010: DC D4 75 CF 66 8C B6 C9   3B 59 CD DF F0 90 9C 5C  ..u.f...;Y.....\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.742 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.743 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.748 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.748 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.748 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.749 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.750 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.757 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.759 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.760 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.763 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.764 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.766 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.766 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.767 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.767 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.768 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.768 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.768 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.771 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 33 53 65",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:38.000 UTC",
#       "not  after"         : "2024-01-18 04:16:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 C4 E0 64 95 CC 8F A4   E0 E7 B0 6D 01 05 67 22  P..d.......m..g"
#           0010: 4C 60 F5 E0                                        L`..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.772 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.849 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D E6 81 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 04:16:36.000 UTC",
#     "not  after"         : "2024-01-18 04:16:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#         0010: 6D 9D 50 45                                        m.PE
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#         0010: F2 D9 62 22                                        ..b"
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.852 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 74 5B FA 7A E3 17 9E   96 63 94 AC 44 D5 34 B4  .t[.z....c..D.4.
#     0010: 8F 1F 47 D2 5A DC 6C 58   7F 9B 57 63 C0 3B C7 27  ..G.Z.lX..Wc.;.'
#     0020: 24 57 29 87 FB 93 67 BA   31 40 C9 77 AC 29 AA 35  $W)...g.1@.w.).5
#     0030: A0 D5 69 72 BA A3 A0 0A   1F 8D FA 4E 98 5D DE AF  ..ir.......N.]..
#     0040: C1 96 E2 A1 3F 4D 4A 8D   5E 75 60 5C 2B FD 94 91  ....?MJ.^u`\+...
#     0050: B3 EE BD 1E 88 88 59 AA   A6 6D 04 2F 0C 20 FC A2  ......Y..m./. ..
#     0060: 83 E1 1D FC D1 6A D0 0F   9E 6A F7 A7 5B AC B1 56  .....j...j..[..V
#     0070: 26 10 C3 D9 C2 6F 39 24   AE 2D 9D 20 ED 07 23 8B  &....o9$.-. ..#.
#     0080: 5C F9 AA 73 E8 3D 0C B7   12 B8 FE 67 F8 62 9C 8D  \..s.=.....g.b..
#     0090: 4E 9C F7 1C 88 03 9A 76   D7 44 7C 7E E0 83 E2 37  N......v.D.....7
#     00A0: 21 36 2F D0 06 2C 57 29   E8 01 01 58 05 7E 94 7A  !6/..,W)...X...z
#     00B0: E8 B0 5F 63 F4 09 80 7E   F6 0B 67 D5 70 71 E3 10  .._c......g.pq..
#     00C0: 58 C6 52 9C BB 85 CA 73   D7 5B 57 8D AB C9 0D A5  X.R....s.[W.....
#     00D0: AA C9 75 3F B7 BF BD 5C   8C B0 CB BF 14 22 60 F9  ..u?...\....."`.
#     00E0: 12 65 1C F7 07 54 B1 98   5E AD 48 AA 04 FD 82 F9  .e...T..^.H.....
#     00F0: DE BF 38 E3 90 8E 6A 26   FD 43 3A EC 4E C1 56 41  ..8...j&.C:.N.VA
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.855 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B0 CA 3D 43 FF 30 27 72   5B 74 58 51 F6 E6 4D B8  ..=C.0'r[tXQ..M.
#     0010: 50 E7 B7 0C BD 1C 30 30   5D 8D E1 F5 19 EB F4 3D  P.....00]......=
#     0020: 2E 68 81 D5 E5 76 4E 41   7B 5E 22 05 10 0B DC E2  .h...vNA.^".....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.857 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:09.858 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.858 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:09.858 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.859 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 04:17:09.859 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:09.859 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.860 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.862 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "17 4A 17 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:42.000 UTC",
#       "not  after"         : "2024-01-18 04:16:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 EB BB 22 BB 37 1E C6   73 1A 69 4B 9D 1E CF F3  ...".7..s.iK....
#           0010: 10 D2 2C 41                                        ..,A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D E6 81 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:36.000 UTC",
#       "not  after"         : "2024-01-18 04:16:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#           0010: 6D 9D 50 45                                        m.PE
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.887 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 49 14 8F 8D AA 79 59 2F   E0 7F B3 3F 7E D5 DA C7  I....yY/...?....
#     0010: 93 A9 99 C3 50 AC CD A9   C7 6A 04 77 55 75 CB FC  ....P....j.wUu..
#     0020: 79 A3 94 0A C1 43 26 C3   37 20 7E C9 80 C4 D4 A9  y....C&.7 ......
#     0030: 5A F6 54 3E E2 1E EB F5   B3 AB 4F 09 91 B0 A1 29  Z.T>......O....)
#     0040: 39 B5 56 D2 3B 2F 03 AF   53 7B 68 FB 47 F1 29 26  9.V.;/..S.h.G.)&
#     0050: C8 69 64 96 02 67 EF 26   60 A1 20 8E CA 82 92 74  .id..g.&`. ....t
#     0060: DB 3A 51 23 C8 4B B3 B2   53 83 39 69 1B 91 01 65  .:Q#.K..S.9i...e
#     0070: 7E BC 7A 6C 03 2F 40 8E   91 AA 92 21 32 21 3F 84  ..zl./@....!2!?.
#     0080: AF F7 3B 4F 79 12 C3 38   91 BB EC 9E 68 77 6D 3A  ..;Oy..8....hwm:
#     0090: DA CE F0 95 3E 40 9B B7   E4 FC F6 65 38 CC 6E 19  ....>@.....e8.n.
#     00A0: 9C 7D 3F C3 A9 2C B5 A0   D0 DD 31 3D 5A 91 64 3B  ..?..,....1=Z.d;
#     00B0: 5D 34 70 C2 F5 33 CE DE   0D A7 AE 16 B7 92 CE 71  ]4p..3.........q
#     00C0: 36 87 F1 C4 E9 23 38 B4   DA AA 67 CA 8D A1 C3 66  6....#8...g....f
#     00D0: BC 0B 75 87 77 66 FE 96   E1 0D 22 89 A1 35 05 C0  ..u.wf...."..5..
#     00E0: 67 F9 2E C8 8A CE 4C F4   AE 0B FD AB 3A BE C1 E0  g.....L.....:...
#     00F0: C8 4F 4B B8 BE 7D C5 4B   2E 3F E1 64 49 F9 15 BD  .OK....K.?.dI...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.889 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D A0 79 54 31 27 D4 F5   21 40 C3 BC EA E8 48 71  ..yT1'..!@....Hq
#     0010: 4A 9D B5 C1 CE 4E 28 27   68 05 05 20 68 CD D9 11  J....N('h.. h...
#     0020: C1 C6 7E E9 28 78 EF 7E   E2 61 7E 69 4C 80 57 9B  ....(x...a.iL.W.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.889 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:09.944 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EB FB 0B CD BF 77 8D 22 5A 9D E7 8A F7 88 06 E9 E4 C9 2D F6 57 A6 FC DF D1 23 43 A4 A7 E7 E8 35",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 04:17:10.212 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 04:17:10.213 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 04:17:21.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:22.055 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D E6 81 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:36.000 UTC",
#       "not  after"         : "2024-01-18 04:16:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#           0010: 6D 9D 50 45                                        m.PE
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D7 2D EC 8B B9 EB D6   BD 48 17 27 F9 D4 42 ED  ..-......H.'..B.
#           0010: F2 D9 62 22                                        ..b"
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 8D 0A 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 04:16:34.000 UTC",
#       "not  after"         : "2024-01-18 04:16:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 56 E7 B3 62 60 E9 B5   A7 51 CA C6 7A 52 4A 18  .V..b`...Q..zRJ.
#           0010: 6D 9D 50 45                                        m.PE
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 04:17:22.070 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:22.300 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.300 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:22.302 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 04:17:22.302 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.307 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.320 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 04:17:22.322 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "46 08 28 A1 68 61 71 58 DC 89 08 AC 53 43 15 F1 C0 10 75 08 B7 D6 3D 4C DD 1D 9D 71 93 3B CD B6",
#     "session id"          : "C1 D7 18 85 DD B9 2B 9F FB 15 1D 31 5B FE DE DE 3C B8 17 69 29 DF BD 38 C3 E0 D9 CD 5E 98 A0 31",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A8 C9 2D 31 13 7C AD F7   40 41 0A 73 2A 6A 8F 98  ..-1....@A.s*j..
#               0010: 31 42 C7 20 CF E7 8C 2D   59 C9 B7 64 BD 48 4F 77  1B. ...-Y..d.HOw
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.346 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F6 2C 17 31 24 F9 C1 A8 04 84 BC CB 1D 94 E2 BB 67 1D 5B 7B 4A 62 47 91 8F 6D 4B 2B 51 0A E6 F1",
#     "session id"          : "C1 D7 18 85 DD B9 2B 9F FB 15 1D 31 5B FE DE DE 3C B8 17 69 29 DF BD 38 C3 E0 D9 CD 5E 98 A0 31",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4D 9C 73 AB C0 17 6F CB   F3 19 D0 37 8C 69 AF 12  M.s...o....7.i..
#             0010: BD 31 35 F9 80 38 9D 0D   39 B8 09 B1 B3 2B CA 09  .15..8..9....+..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.346 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.346 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.349 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.351 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.351 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:22.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:22.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.359 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.361 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.362 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.365 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:17:22.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 04:17:22.368 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 04:18:41.143 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:18:41.181 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:18:41.182 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:18:41.182 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 04:18:41.182 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45692/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28406ms
ok 65 stop command for single port in 31443ms
ok 66 status detects locally running solr in 14391ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2230ms
ok 69 copying files around in 6684ms
ok 70 upconfig in 2674ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m42.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5714 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5714/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42939/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-20 00:36:10.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 00:36:10.827; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-20 00:36:12.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 00:36:12.151; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23354ms
ok 61 start solr with client truststore and security manager in 25093ms
not ok 62 start solr with mTLS needed in 61258ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-klspwb/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42939.
#
# Started Solr server on port 42939 (pid=199146). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42940.
#
# Started Solr server on port 42940 (pid=199573). Happy searching!
#
# INFO  - 2023-10-20 00:37:35.731; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 00:37:35.737; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 00:37:36.113; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 00:37:36.116; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 00:37:36.117; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:36.150 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A CA 28 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:11.000 UTC",
#     "not  after"         : "2024-01-18 24:37:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 F7 80 8E 02 AD 1F 82   F5 B1 1D 80 D7 C8 66 67  ..............fg
#         0010: EA 7D D5 DE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:36.155 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 7B D1 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:03.000 UTC",
#     "not  after"         : "2024-01-18 24:37:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:36.170 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:36.514 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:36.515 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:36.515 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:36.515 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:36.686 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.686 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:36.688 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:36.688 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.706 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.706 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.707 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:36.709 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E0 2A D6 69 F2 D1 BE 61 B4 DB 1D B6 6B 03 B1 8A E4 A2 A0 70 B7 CA 0D 8A EA 2E 3F A5 FB 1C 79 3B",
#   "session id"          : "3B 8A 38 28 D6 D6 42 A8 30 8B 9D F3 9F 1C EA EC 8F 96 22 69 1D E9 D2 BC F8 EE 26 7C 10 DF A4 AC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 77 8E 6F 52 72 16 FA B6   27 03 D9 9A 91 0A 6F 71  w.oRr...'.....oq
#             0010: 9C 6B 8C 4B 3C 36 9D 38   A1 D0 FC C4 D3 71 76 7C  .k.K<6.8.....qv.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.818 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "07 ED 62 1E 4E 94 46 D0 D1 17 FD DF 88 49 24 48 09 4A 58 24 94 1C 0D 05 2A 3A F0 9A A2 31 CB 66",
#   "session id"          : "3B 8A 38 28 D6 D6 42 A8 30 8B 9D F3 9F 1C EA EC 8F 96 22 69 1D E9 D2 BC F8 EE 26 7C 10 DF A4 AC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AC 83 80 20 B8 5C 8D F1   F8 2E C5 54 45 E9 59 EA  ... .\.....TE.Y.
#           0010: 51 A5 8D 59 1F 36 F0 B2   42 D3 3D E0 DA A1 5C 39  Q..Y.6..B.=...\9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.818 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.819 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.821 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.824 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.824 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.826 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.826 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.834 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.835 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.837 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.840 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.842 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.842 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.843 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.844 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.844 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.845 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.846 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.846 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.846 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.849 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 A5 53 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:07.000 UTC",
#       "not  after"         : "2024-01-18 24:37:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 01 07 F4 DF 89 31 61   C4 57 02 3C AE 81 FC 16  A.....1a.W.<....
#           0010: 54 F0 8B EF                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.850 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.936 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.940 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AD 91 7B CD 18 56 7B 79   83 E4 90 26 EC B6 DE E0  .....V.y...&....
#     0010: CA 37 AD FD CC 65 20 37   91 C0 CF 04 73 8C 3E BC  .7...e 7....s.>.
#     0020: 0D 8D 02 E0 52 3B CB 28   03 AF E0 13 63 04 08 29  ....R;.(....c..)
#     0030: 23 62 FA 9C 92 76 93 FA   72 32 58 CF 5A 40 DA 8E  #b...v..r2X.Z@..
#     0040: 36 C2 6E BE B9 42 70 69   7B 75 4F 5A 02 64 72 4F  6.n..Bpi.uOZ.drO
#     0050: A4 20 49 75 14 15 37 F4   62 36 85 41 94 96 52 F4  . Iu..7.b6.A..R.
#     0060: ED F2 B3 A0 09 18 2D 49   17 95 E8 59 BC 94 51 D9  ......-I...Y..Q.
#     0070: 7E 67 74 58 69 BB 00 98   E7 79 41 9C 12 C7 2B 4C  .gtXi....yA...+L
#     0080: C7 54 C1 27 E5 30 62 EF   66 69 FB CD FE 23 FB 15  .T.'.0b.fi...#..
#     0090: E9 A7 D9 D7 22 0E B3 07   A0 E3 B5 88 48 B2 ED 62  ....".......H..b
#     00A0: F6 4E EF 21 B1 E0 75 08   3B C1 E4 0D F5 FF 62 1F  .N.!..u.;.....b.
#     00B0: 81 7F FE 01 29 50 49 6E   BE 32 90 B6 F8 B3 31 0C  ....)PIn.2....1.
#     00C0: 36 31 94 A6 56 BA F4 49   E0 EC 95 7E 26 A5 87 64  61..V..I....&..d
#     00D0: 67 70 4E CB FD 94 9A 91   6F 6A B6 43 91 7F E2 47  gpN.....oj.C...G
#     00E0: D1 DF 56 C4 24 F3 1F 08   36 09 F6 D9 2B ED 4C 60  ..V.$...6...+.L`
#     00F0: 80 27 71 97 C5 2E 06 92   37 B7 32 62 AA 32 B8 3C  .'q.....7.2b.2.<
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.941 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 31 D1 33 EA E1 35 55   2F BA 37 95 4E 19 2F A8  .1.3..5U/.7.N./.
#     0010: 08 6F 0D BD AB 36 75 4E   D8 AC 0C 6D 07 46 51 C4  .o...6uN...m.FQ.
#     0020: DF 05 D7 32 31 DB F7 21   5B 0B 61 D6 6D 37 13 69  ...21..![.a.m7.i
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.944 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:36.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.945 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:36.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.945 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:36.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:36.946 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.946 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.949 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A CA 28 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:11.000 UTC",
#       "not  after"         : "2024-01-18 24:37:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 F7 80 8E 02 AD 1F 82   F5 B1 1D 80 D7 C8 66 67  ..............fg
#           0010: EA 7D D5 DE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 B6 1E 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:05.000 UTC",
#       "not  after"         : "2024-01-18 24:37:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#           0010: B4 1E 50 E1                                        ..P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.975 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 C3 56 BF B7 9E 07 9F   2C 4B 37 69 51 8D 26 64  E.V.....,K7iQ.&d
#     0010: C9 21 A1 73 E6 C9 77 B8   BC 6E 91 83 3F 4B C2 58  .!.s..w..n..?K.X
#     0020: 6A 2A 55 51 FC 87 1F E5   DC A5 45 4C DA 25 07 EA  j*UQ......EL.%..
#     0030: 8C D4 ED 16 B2 1C F8 9F   CC 6A C0 A3 91 2B 40 37  .........j...+@7
#     0040: 00 F1 F1 69 F9 0C 77 7D   B1 EE 1A D8 CF 40 4D CB  ...i..w......@M.
#     0050: 4A 6C 60 C5 9B 13 B2 6B   D1 00 11 0F 47 54 21 6B  Jl`....k....GT!k
#     0060: A6 BA D8 E8 E1 1C 13 75   35 A6 CE BD FB 70 2D DD  .......u5....p-.
#     0070: F8 E9 87 7B AF AA F8 40   70 FA 59 29 CC 53 F0 AA  .......@p.Y).S..
#     0080: 52 F6 1F E8 89 A6 FA A2   D5 C3 8C 13 DD B5 43 C4  R.............C.
#     0090: 50 E4 11 91 9D 93 7D 26   87 33 DA 02 24 6E F1 46  P......&.3..$n.F
#     00A0: 60 08 6F 73 5B 1A 6A CE   F5 33 F5 34 85 BA 06 13  `.os[.j..3.4....
#     00B0: 34 B5 43 73 3D A8 21 C2   94 7D 1C 74 4A 6C 8A 89  4.Cs=.!....tJl..
#     00C0: ED AB C7 B8 12 6B BD 82   C0 A1 09 D1 C0 69 E5 9E  .....k.......i..
#     00D0: A6 4C 8E 5D 2F 61 D8 40   4C A7 00 8D 29 D2 75 02  .L.]/a.@L...).u.
#     00E0: EE DA B9 10 57 79 DC 57   A1 41 79 D5 B7 DC 45 17  ....Wy.W.Ay...E.
#     00F0: 76 7C E4 5B 4A 3B 9D 1F   0D 06 30 AE 73 6A AC A5  v..[J;....0.sj..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.976 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC 80 26 47 B3 4D E6 78   90 88 BC FB 9A 2B 11 7F  ..&G.M.x.....+..
#     0010: A1 06 D7 3E 1F 77 B1 A9   B6 77 CF 4D 5A 46 BB E4  ...>.w...w.MZF..
#     0020: 05 0F E6 E0 4F A6 20 90   34 50 BC E2 BC 7D CC D7  ....O. .4P......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:36.977 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:37.036 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DC E1 8F 1E 24 D7 29 7E 07 7B 7B F4 3C 11 35 73 05 1A 2A 4C A1 B4 9C 14 CB A5 31 35 2E AB 9A 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 24:37:37.330 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 24:37:37.331 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 00:37:38.296; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 00:37:38.302; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 00:37:38.685; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 00:37:38.687; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 00:37:38.688; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-klspwb/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:38.720 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A CA 28 82",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:11.000 UTC",
#     "not  after"         : "2024-01-18 24:37:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 F7 80 8E 02 AD 1F 82   F5 B1 1D 80 D7 C8 66 67  ..............fg
#         0010: EA 7D D5 DE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:38.724 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 7B D1 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:03.000 UTC",
#     "not  after"         : "2024-01-18 24:37:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:38.739 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:38.813 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:38.813 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:38.978 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:38.979 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:38.980 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:38.981 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:38.986 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:38.998 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:38.998 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:38.998 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:39.000 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "18 C7 63 8B E9 5F B7 F8 46 E2 F8 05 BF 0A 52 B6 F0 F6 D2 D1 EE 70 7B 8C 94 07 E5 FA 9D 7B B4 15",
#   "session id"          : "C3 7A A0 0A 2E EF F6 FF AD BC 2A B5 52 DD DD C5 C7 B2 83 58 61 C2 40 C8 D4 F9 E0 34 CA E5 EB 26",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6E 6E 61 43 C9 35 DE 16   11 78 D9 8E B5 F1 87 9B  nnaC.5...x......
#             0010: 46 51 82 DD AD 24 11 95   8F 71 40 D5 15 80 F3 2A  FQ...$...q@....*
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.100 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "55 17 FC B7 04 D8 82 AA 69 12 CE 7F 1C FE D3 F4 63 5C 98 45 AB 50 D1 9D FC 1F A8 B5 2A 79 A2 F3",
#   "session id"          : "C3 7A A0 0A 2E EF F6 FF AD BC 2A B5 52 DD DD C5 C7 B2 83 58 61 C2 40 C8 D4 F9 E0 34 CA E5 EB 26",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 F2 16 5B 22 29 64 B5   07 1A 84 8F 51 CC A7 7B  ...[")d.....Q...
#           0010: 70 2D C7 A6 F9 90 FA ED   6E 65 AC 21 3D D5 42 09  p-......ne.!=.B.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.100 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.101 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.103 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.103 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.103 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.103 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.106 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.106 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.116 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.117 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.119 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.123 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.123 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.123 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.123 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.123 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.124 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.124 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.125 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.126 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.126 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.126 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.128 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.128 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.131 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 A5 53 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:07.000 UTC",
#       "not  after"         : "2024-01-18 24:37:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 01 07 F4 DF 89 31 61   C4 57 02 3C AE 81 FC 16  A.....1a.W.<....
#           0010: 54 F0 8B EF                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.132 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.221 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 B6 1E 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 24:37:05.000 UTC",
#     "not  after"         : "2024-01-18 24:37:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#         0010: B4 1E 50 E1                                        ..P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#         0010: 82 96 33 E1                                        ..3.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.225 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A B8 B8 A7 FC DC BC 4C   F9 2C D8 AA F3 B8 4F D4  J......L.,....O.
#     0010: 5B 3A 0D B3 DF D2 75 08   59 D7 8B AF CE 65 EF 53  [:....u.Y....e.S
#     0020: 6E C6 01 E4 D2 D8 8E F4   43 B7 06 8A 33 2A F9 8B  n.......C...3*..
#     0030: 3C 78 57 58 E6 07 A7 89   6C EF 5C 34 56 AB 7B F0  <xWX....l.\4V...
#     0040: 22 D0 80 94 4E 19 67 34   8A 88 CB 07 19 6C ED C7  "...N.g4.....l..
#     0050: 69 78 D2 50 C8 1A CB E9   AD F6 63 98 B2 D9 1F 68  ix.P......c....h
#     0060: FD 92 41 E9 10 1A 3A FF   35 E6 9A 62 0B 68 D5 8A  ..A...:.5..b.h..
#     0070: 18 EA 4C 43 B7 D8 C7 2C   A2 D8 95 F3 7C 42 B7 CF  ..LC...,.....B..
#     0080: 52 9B D6 C9 76 89 C7 1D   64 C2 67 7D 2B 35 33 9E  R...v...d.g.+53.
#     0090: CE C1 81 B3 C7 BB 25 34   0F 99 AE 8A 62 6B 4E CF  ......%4....bkN.
#     00A0: 46 53 1C 84 97 5E 9E C4   81 1D 64 88 D7 AF C3 36  FS...^....d....6
#     00B0: 80 BE 7D 21 A2 17 8B C4   BB 38 75 F9 37 99 A6 5E  ...!.....8u.7..^
#     00C0: 88 3C 8B A1 49 1A C9 A7   37 0B EE F4 9F 9F 87 CB  .<..I...7.......
#     00D0: CB 5F 7E 3F 6A DA FB A2   B2 1F 5F A0 09 7F E8 07  ._.?j....._.....
#     00E0: 25 75 66 B3 EC C1 D8 DC   81 DC 7E 33 96 56 14 ED  %uf........3.V..
#     00F0: 4E B0 0F 57 A7 2F F0 DC   0C 44 1D 5B 0B 9A D9 60  N..W./...D.[...`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.227 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 75 CF 2C C5 18 5C 81 8B   BA 5F DE 1A AE B8 4B ED  u.,..\..._....K.
#     0010: 63 24 E9 8E 7E 54 75 B2   47 23 0D 44 88 58 07 A0  c$...Tu.G#.D.X..
#     0020: C3 A5 B6 2C 15 BB 95 98   38 04 C7 D1 EE A8 FD 9A  ...,....8.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.229 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:39.230 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.230 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:39.231 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.231 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-20 24:37:39.231 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:39.231 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.232 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.235 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A CA 28 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:11.000 UTC",
#       "not  after"         : "2024-01-18 24:37:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 F7 80 8E 02 AD 1F 82   F5 B1 1D 80 D7 C8 66 67  ..............fg
#           0010: EA 7D D5 DE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 B6 1E 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:05.000 UTC",
#       "not  after"         : "2024-01-18 24:37:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#           0010: B4 1E 50 E1                                        ..P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.262 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 3C 3F E6 33 07 6C 9B   25 83 CF 01 9C D4 FA A2  V<?.3.l.%.......
#     0010: A4 2F F9 86 4E FA 72 DF   31 F8 B4 92 E8 18 D1 11  ./..N.r.1.......
#     0020: 63 8A 72 52 11 67 8E C2   37 61 C2 85 A1 CE 1D DE  c.rR.g..7a......
#     0030: D2 C6 4E E8 8A C7 A9 CE   CB 49 47 B2 17 9B 12 E6  ..N......IG.....
#     0040: 68 8C 00 DC C8 04 25 A0   4F BE F2 2B 4F BF 57 25  h.....%.O..+O.W%
#     0050: 2B C9 CF 52 C6 27 58 F7   F7 50 03 01 F8 9F A7 BE  +..R.'X..P......
#     0060: DA 5C 30 D8 BE E5 BA 25   0E 90 0D 3F A4 E0 50 8D  .\0....%...?..P.
#     0070: C2 67 08 1F E0 FE F0 75   55 07 81 98 9B 5A 06 56  .g.....uU....Z.V
#     0080: 27 33 79 E8 DF DA E7 DD   C3 12 92 F5 E4 58 EF 05  '3y..........X..
#     0090: 86 FC 0E 03 30 DD 34 DB   05 6B 36 9E 5F 0F 7B 7E  ....0.4..k6._...
#     00A0: 1D 56 D5 91 41 B4 FA 36   A4 AF 63 E2 8E DC A9 ED  .V..A..6..c.....
#     00B0: 6B 19 5B 93 7A FF 90 3A   9E 9C 01 48 7A 5C A9 FE  k.[.z..:...Hz\..
#     00C0: F6 8E 84 93 F9 DF 3F 09   03 F7 85 F4 C3 FB 16 1C  ......?.........
#     00D0: 56 A0 66 A3 82 AB ED 5B   88 83 4D 0D A4 0A 84 6E  V.f....[..M....n
#     00E0: C4 5A 2F 14 5E 1A F6 61   19 9A AD 2F EE C8 B1 3C  .Z/.^..a.../...<
#     00F0: 6E 37 DE DA F4 EE 0E DA   1F 98 64 C8 56 2B C5 2F  n7........d.V+./
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.263 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B B9 8E A1 F6 B0 C2 ED   0D F7 81 55 1D 2B 27 67  ...........U.+'g
#     0010: AE 5B 1A E6 60 0B DD C9   BB AF 74 C4 FC 8F 0F 46  .[..`.....t....F
#     0020: 28 CB A7 A2 B7 49 9A BC   F1 D7 A7 FC 64 51 33 23  (....I......dQ3#
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.263 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:39.322 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F 69 61 1B 5A 9F 1B DA 63 9B EC B3 5D 5D ED 23 60 E8 4F DE 76 82 02 38 DA 8C B5 3D FE 5D C2 AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 24:37:39.604 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 24:37:39.605 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-20 00:37:50.700; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:51.041 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 B6 1E 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:05.000 UTC",
#       "not  after"         : "2024-01-18 24:37:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#           0010: B4 1E 50 E1                                        ..P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 87 CB 5D 83 DB 51 1B   3A 96 97 92 B3 0C 97 57  ...]..Q.:......W
#           0010: 82 96 33 E1                                        ..3.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 7B D1 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 24:37:03.000 UTC",
#       "not  after"         : "2024-01-18 24:37:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 66 EF FB 35 C4 14 A1   01 FC A0 8F 29 76 F3 68  .f..5.......)v.h
#           0010: B4 1E 50 E1                                        ..P.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 24:37:51.059 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:51.412 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:51.412 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:51.413 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:37:51.413 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:51.550 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.551 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:51.553 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-20 24:37:51.553 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.572 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.573 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-20 24:37:51.576 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "08 05 E4 9E AF A6 36 BE 25 71 92 7A 5F DA E5 13 F4 D6 DD 4B 97 C3 26 FF 92 6D 82 DD E4 3B 82 FE",
#     "session id"          : "0C C3 C1 8B FD AA A8 43 6A 2E 36 4D 65 E5 46 DE 22 9A BF 9C 99 9D F6 74 8A DC F3 CC 60 C8 E7 CB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 53 84 EC 44 A7 1D FA DF   EA 40 18 E8 B2 FA C5 E5  S..D.....@......
#               0010: 84 0D A9 52 C3 71 1C 62   FD 35 28 31 D0 AF C8 68  ...R.q.b.5(1...h
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.599 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "99 94 46 C3 CC 52 B1 E5 54 AB EA CE F8 48 27 68 8A D1 99 01 C7 83 6E C7 4E BA E3 5E EB EA 5F 3A",
#     "session id"          : "0C C3 C1 8B FD AA A8 43 6A 2E 36 4D 65 E5 46 DE 22 9A BF 9C 99 9D F6 74 8A DC F3 CC 60 C8 E7 CB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 14 D6 88 14 8E 0D 3C   4E 32 2C C0 A0 C6 64 05  $......<N2,...d.
#             0010: 8A AC 86 D5 4B 87 81 EF   13 70 C3 FA E6 0C 3C 12  ....K....p....<.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.600 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.602 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.602 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.604 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.605 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.614 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.616 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.617 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.620 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:51.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:37:51.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-20 24:37:51.623 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-20 24:39:15.522 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:39:15.560 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:39:15.560 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:39:15.560 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 24:39:15.560 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42940/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28779ms
ok 65 stop command for single port in 31192ms
ok 66 status detects locally running solr in 14736ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2189ms
ok 69 copying files around in 6640ms
ok 70 upconfig in 2663ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1203ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 28s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m55.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5713 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5713/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43761/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 22:24:54.659; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 22:24:54.664; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 22:24:55.566; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 22:24:55.606; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22733ms
ok 61 start solr with client truststore and security manager in 24484ms
not ok 62 start solr with mTLS needed in 56421ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-JlIAzi/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43761.
#
# Started Solr server on port 43761 (pid=199700). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43762.
#
# Started Solr server on port 43762 (pid=200151). Happy searching!
#
# INFO  - 2023-10-19 22:26:17.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 22:26:17.725; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 22:26:18.093; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 22:26:18.095; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 22:26:18.096; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:18.130 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 D5 64 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:53.000 UTC",
#     "not  after"         : "2024-01-17 22:25:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 15 5E 44 D7 7C EE 4A   4D 29 FD D0 EC 5D DC 14  ..^D...JM)...]..
#         0010: 7E 5A 19 4B                                        .Z.K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:18.134 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F F9 8D F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:45.000 UTC",
#     "not  after"         : "2024-01-17 22:25:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:18.148 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:18.228 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:18.232 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:18.233 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:18.236 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:18.370 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.370 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:18.372 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:18.372 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.388 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.389 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:18.391 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "05 33 80 A1 A2 8F 36 4A BF 26 DA E3 DF 92 17 A4 89 B8 40 35 A2 B4 A5 5A A2 F7 1E DC BC 83 30 2A",
#   "session id"          : "9C 82 F0 95 DF DC 93 1A EF 39 78 08 1C 4E F5 50 4F 5A FB 4C A8 05 FB C6 C6 43 F4 4E 7B 5C F1 46",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 91 B0 F1 EE 1B E2 A2 FD   CF 6C 8F 8B 04 FC 07 52  .........l.....R
#             0010: 60 56 B3 23 1C 17 D5 B0   81 B7 4A F5 32 C4 F4 7C  `V.#......J.2...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.499 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "51 B1 29 4E 68 CA ED DD 99 A8 71 EB 29 3F 18 5E A5 2F BD 3E 5A 18 F7 DE D8 D4 10 5E 6C 2A FB F7",
#   "session id"          : "9C 82 F0 95 DF DC 93 1A EF 39 78 08 1C 4E F5 50 4F 5A FB 4C A8 05 FB C6 C6 43 F4 4E 7B 5C F1 46",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 75 B5 6F ED E8 BB 17 51   1C 85 4B D4 DB C0 C7 31  u.o....Q..K....1
#           0010: F7 50 F6 64 54 21 A2 B9   EA 0C 07 9E 38 FD 08 3F  .P.dT!......8..?
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.499 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.499 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.500 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.500 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.501 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.504 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.504 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.504 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.505 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.513 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.514 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.515 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.519 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.520 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.520 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.521 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.522 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.522 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.522 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.523 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.524 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.524 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.527 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 94 7F 2E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:50.000 UTC",
#       "not  after"         : "2024-01-17 22:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 21 49 A1 F8 CB 02 7D   07 D6 31 06 DE EE DE D6  H!I.......1.....
#           0010: 60 9D 2F 4D                                        `./M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.527 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.602 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.606 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E A0 17 0C E5 A7 85 F7   AD 0C A5 62 66 15 E0 C5  ...........bf...
#     0010: 07 A1 8B D4 42 02 97 19   0F EA 95 98 62 4A BD C7  ....B.......bJ..
#     0020: E1 15 2B C1 28 D1 45 2A   08 A5 53 6B 7C 64 83 D9  ..+.(.E*..Sk.d..
#     0030: B0 B4 AA 7C 41 EC 37 51   FD C0 AC C3 83 28 76 58  ....A.7Q.....(vX
#     0040: C7 60 29 51 EC FC 3A 72   95 DC 35 1C 22 14 A9 81  .`)Q..:r..5."...
#     0050: D5 29 5A B3 81 1A 6C 62   E2 C7 07 04 D5 FA 53 91  .)Z...lb......S.
#     0060: 80 70 0A 19 FA E9 5E D0   3A 55 07 20 02 CA D4 C6  .p....^.:U. ....
#     0070: D5 92 0E 6C D3 D6 2D CB   E3 1F EA AE 0B 03 34 36  ...l..-.......46
#     0080: 18 78 04 17 23 BB 60 60   22 8B 02 7C D3 86 73 63  .x..#.``".....sc
#     0090: DE 7B FE F9 6C 08 94 0A   61 97 B4 E9 5F 4C A7 B9  ....l...a..._L..
#     00A0: E1 88 5E 88 18 C4 18 93   35 3A 82 71 4E 2E 4B 3A  ..^.....5:.qN.K:
#     00B0: 05 2A 71 89 5D BE F8 7F   B9 6C 77 B4 8E 80 D9 B4  .*q.]....lw.....
#     00C0: 36 8A 14 B0 8A 20 1A 69   0C C1 D6 6A CE 5F 9D 52  6.... .i...j._.R
#     00D0: D7 52 29 14 B5 90 7D E4   FD 6E FA 43 6C 77 D6 FE  .R)......n.Clw..
#     00E0: 0B 99 88 23 11 FA B2 75   BE FA 53 D9 7C 85 BE 7C  ...#...u..S.....
#     00F0: 14 1D B6 0D D0 AD 5E C8   3E 72 1C 8B 17 7A B2 CB  ......^.>r...z..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.608 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B8 0E 87 BB BB E3 4E 68   0D F4 6C 75 E2 4E 18 F4  ......Nh..lu.N..
#     0010: CA 95 68 6B 99 D9 74 89   1A 8C 6B 57 DB 0C D0 31  ..hk..t...kW...1
#     0020: 1D E5 A2 99 C4 CC 5A 60   33 C7 A0 BA AA 52 42 43  ......Z`3....RBC
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:18.611 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.612 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:18.612 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.612 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:18.612 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:18.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.613 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.615 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 D5 64 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:53.000 UTC",
#       "not  after"         : "2024-01-17 22:25:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 15 5E 44 D7 7C EE 4A   4D 29 FD D0 EC 5D DC 14  ..^D...JM)...]..
#           0010: 7E 5A 19 4B                                        .Z.K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EB 93 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:47.000 UTC",
#       "not  after"         : "2024-01-17 22:25:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#           0010: E8 18 16 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.642 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 20 60 92 B3 3B 6A 88   A4 CE 30 A7 D0 D4 DD 1A  Q `..;j...0.....
#     0010: F2 B0 12 CB 08 B7 38 D4   F3 64 F1 49 C0 11 93 97  ......8..d.I....
#     0020: AB B5 42 1A 64 C6 B3 78   8A 6E 8F A4 16 82 6B 3E  ..B.d..x.n....k>
#     0030: 3B F8 39 91 18 07 C9 FD   02 7D 20 AD 08 F2 55 B5  ;.9....... ...U.
#     0040: C6 A5 42 26 62 3B 90 E5   FA 41 E3 05 95 65 E6 4B  ..B&b;...A...e.K
#     0050: 61 F0 0A 45 97 B7 41 00   AB 79 C7 F6 79 97 12 61  a..E..A..y..y..a
#     0060: 5A 9D C9 1D FF 09 BA 12   10 4E C1 0F 7F F6 4C 4A  Z........N....LJ
#     0070: 24 19 58 7C 39 F9 E8 ED   DE 63 7E BC 5A D6 2B 34  $.X.9....c..Z.+4
#     0080: DD 42 6D CD 19 25 B1 2F   B0 9F BF 41 C7 0C CD 88  .Bm..%./...A....
#     0090: C5 AD A0 D3 65 00 18 10   DA 54 7F 83 9A C5 8F A5  ....e....T......
#     00A0: 05 E6 8D A5 88 6E 5C 2E   17 65 5B 35 33 0A 84 B4  .....n\..e[53...
#     00B0: 72 0B 9D 5E 75 2C B0 0B   9F 27 86 61 33 67 D1 C6  r..^u,...'.a3g..
#     00C0: 4F 51 F2 55 DA 3C 39 26   53 C6 B8 19 94 42 75 24  OQ.U.<9&S....Bu$
#     00D0: 8C 89 FD 72 F3 86 29 69   07 8B AF 5C 1B 44 4C 7F  ...r..)i...\.DL.
#     00E0: 5B 4B 62 41 CA 97 6C 85   55 76 99 53 0F 92 E3 F5  [KbA..l.Uv.S....
#     00F0: 4A AB 74 EA 6F 2E AD 07   A7 72 06 A5 E4 46 61 2B  J.t.o....r...Fa+
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.643 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 34 67 C4 37 3E FC FE 91   E5 48 6B BB 84 3E ED 21  4g.7>....Hk..>.!
#     0010: 04 D5 D6 DD 7D 68 5A B9   6B A9 D2 EC 7D E5 18 B4  .....hZ.k.......
#     0020: 0E 5C 57 C6 1F 91 8D EF   14 90 F4 DD B1 A8 11 A6  .\W.............
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.644 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:18.699 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7F 79 2F 15 14 08 E5 38 6E FC B9 5B 4F D0 8F 74 81 61 F9 21 0C 42 93 0F EB 36 E5 09 2C 16 37 FD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 22:26:18.965 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 22:26:18.966 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 22:26:19.875; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 22:26:19.881; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 22:26:20.236; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 22:26:20.239; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 22:26:20.239; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JlIAzi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:20.271 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 D5 64 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:53.000 UTC",
#     "not  after"         : "2024-01-17 22:25:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 15 5E 44 D7 7C EE 4A   4D 29 FD D0 EC 5D DC 14  ..^D...JM)...]..
#         0010: 7E 5A 19 4B                                        .Z.K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:20.275 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F F9 8D F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:45.000 UTC",
#     "not  after"         : "2024-01-17 22:25:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:20.289 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:20.516 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.516 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:20.518 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:20.518 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.523 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.536 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:20.539 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "89 80 E5 E4 DC 46 03 02 40 0F 8C 05 B3 79 4D A3 36 63 C0 C7 A2 B9 2E 4B 11 D3 18 86 29 48 0E F9",
#   "session id"          : "13 9B 83 8F 9C 49 79 E3 EF 91 C0 CB 4B E0 3A 44 3E A9 C2 0C B7 9E C1 C9 E8 C7 25 87 61 FF 10 89",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 23 4E A8 3F 90 6D 68 6A   C8 6F 6D D5 2F B9 6B 0E  #N.?.mhj.om./.k.
#             0010: 11 4D D8 86 E1 1B F4 66   00 77 AE A2 15 52 08 0F  .M.....f.w...R..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AA 41 B2 09 E9 B4 29 7F D9 E4 72 6C 9C 33 3E D2 C3 2D A1 C5 12 C6 38 E9 7A 0C 94 4D B1 B8 92 65",
#   "session id"          : "13 9B 83 8F 9C 49 79 E3 EF 91 C0 CB 4B E0 3A 44 3E A9 C2 0C B7 9E C1 C9 E8 C7 25 87 61 FF 10 89",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 F0 53 DF 9B 1D 28 06   D7 D5 93 17 27 4B A4 2F  ..S...(.....'K./
#           0010: 06 7B 6B 66 0D 58 D0 A1   DB AF 3C F0 4A 94 D9 76  ..kf.X....<.J..v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.647 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.648 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.652 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.662 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.663 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.667 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.667 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.668 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.669 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.670 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.671 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.672 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.675 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 94 7F 2E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:50.000 UTC",
#       "not  after"         : "2024-01-17 22:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 21 49 A1 F8 CB 02 7D   07 D6 31 06 DE EE DE D6  H!I.......1.....
#           0010: 60 9D 2F 4D                                        `./M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.675 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:20.721 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:20.722 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:20.722 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:20.722 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.750 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EB 93 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 22:25:47.000 UTC",
#     "not  after"         : "2024-01-17 22:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#         0010: E8 18 16 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#         0010: 2A EC 03 CE                                        *...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.754 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 4B 7D 04 DE CE F3 41   AC 0C B3 22 12 03 E1 B0  wK.....A..."....
#     0010: 76 75 4C 21 D3 62 8A 77   77 A9 B1 B5 5C BE 79 73  vuL!.b.ww...\.ys
#     0020: 56 61 72 00 95 29 23 46   2E 8B 16 F6 18 34 39 61  Var..)#F.....49a
#     0030: A5 22 86 87 17 14 C9 E8   2F B5 60 D2 C6 C0 18 F0  ."....../.`.....
#     0040: 78 49 F7 35 B8 5D BE 12   10 D3 15 E4 DA D7 F7 36  xI.5.].........6
#     0050: EE 3C 9A A0 52 08 E3 EC   44 2F 53 41 91 4D B2 E5  .<..R...D/SA.M..
#     0060: 4F 95 84 FD 4A B8 FB D8   61 2A 25 CB 58 5F 8E 64  O...J...a*%.X_.d
#     0070: A4 08 F5 FB 74 CC 8F 13   7A 0E 04 05 80 82 97 85  ....t...z.......
#     0080: 92 72 B7 79 54 EB 0F 28   08 F3 64 71 73 14 47 51  .r.yT..(..dqs.GQ
#     0090: 4E CC D7 D1 13 BA A3 E7   63 90 C2 03 8C D5 C2 28  N.......c......(
#     00A0: 4E B8 22 9E 76 1A E2 F9   74 D1 B5 AA AE 7D 17 3D  N.".v...t......=
#     00B0: 4A 5A 56 70 C1 17 02 B4   0A F2 11 BF 89 B2 88 C9  JZVp............
#     00C0: F5 26 7F 3A 17 73 E0 EB   76 68 D7 E2 39 AE EB CF  .&.:.s..vh..9...
#     00D0: 17 53 66 53 50 EB 4D F4   94 AE 9E 7B E4 FA 84 66  .SfSP.M........f
#     00E0: 9D D3 0D E1 EC 4A E7 3C   D0 EC D3 FC 42 32 1B AB  .....J.<....B2..
#     00F0: B3 98 79 68 E7 AE FD D2   2E 85 47 B1 7B 86 C4 84  ..yh......G.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.756 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AB A5 DF FF 3C BD 05 79   D5 60 86 D3 26 AD 5E F6  ....<..y.`..&.^.
#     0010: D8 07 0A C1 E3 0F 21 B5   0C F6 A7 3E D3 55 9F E4  ......!....>.U..
#     0020: 1A 47 80 38 06 73 BC 09   EF 3F 86 80 96 0B 31 3D  .G.8.s...?....1=
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.758 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:20.759 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.760 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:20.760 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.760 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 22:26:20.760 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:20.761 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.761 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.763 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 D5 64 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:53.000 UTC",
#       "not  after"         : "2024-01-17 22:25:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 15 5E 44 D7 7C EE 4A   4D 29 FD D0 EC 5D DC 14  ..^D...JM)...]..
#           0010: 7E 5A 19 4B                                        .Z.K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EB 93 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:47.000 UTC",
#       "not  after"         : "2024-01-17 22:25:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#           0010: E8 18 16 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.789 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 79 EA B9 F2 4F F5 C4 E0   C1 40 2D 68 88 D5 36 7E  y...O....@-h..6.
#     0010: F3 62 56 72 8E FD C1 EE   33 54 0E E1 14 D9 6E 5D  .bVr....3T....n]
#     0020: 46 AC 4F 39 22 B8 D3 80   C5 CF A2 34 1E 9D 2A D3  F.O9"......4..*.
#     0030: E2 0F 20 C2 C6 0C 39 5C   67 38 26 91 60 76 F0 2C  .. ...9\g8&.`v.,
#     0040: 4C 4A 2E 9F AC 7F 6D FC   D8 D5 1C 6F 91 E5 80 24  LJ....m....o...$
#     0050: D0 01 52 E9 E7 73 BD 22   64 99 09 EC DE 23 97 3C  ..R..s."d....#.<
#     0060: 3F 1A 76 EF CB 01 48 F9   EC 84 89 3E D3 BF B2 49  ?.v...H....>...I
#     0070: 8C 00 A4 4A 0C 56 71 9F   9E 59 A0 2C 84 22 F7 B8  ...J.Vq..Y.,."..
#     0080: 78 3B 09 5C 1E EF 5F A7   91 C5 CA 90 40 35 1A 21  x;.\.._.....@5.!
#     0090: 97 3B 83 06 02 B8 3D A7   42 16 87 E5 13 C7 D5 CB  .;....=.B.......
#     00A0: 26 C5 35 FD C1 40 B3 D6   E4 D4 D9 C3 74 74 04 EA  &.5..@......tt..
#     00B0: 11 96 D7 26 CE 16 E7 47   B4 79 4D BD 1F B8 F3 54  ...&...G.yM....T
#     00C0: 20 0C 31 2C 89 5A D0 82   24 AB 82 D0 8C 66 39 33   .1,.Z..$....f93
#     00D0: 66 C7 5D D9 3B A1 DD FE   64 FC 8E 26 38 E5 98 F8  f.].;...d..&8...
#     00E0: 9A 1D F4 6F AE 0A 48 2A   25 38 62 6C A9 05 F1 33  ...o..H*%8bl...3
#     00F0: B3 C3 C1 02 39 FD 01 D4   23 EB 7D 08 8F FA 02 93  ....9...#.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.790 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 74 CF 14 1A 75 CA AA F9   43 F6 7E E2 A7 7E 2F EF  t...u...C...../.
#     0010: EE 67 E9 42 47 C8 58 56   BE F4 D7 EC E9 C8 6F 11  .g.BG.XV......o.
#     0020: B5 D9 6F 26 6D 3A 22 0C   D8 FE 3F 30 19 B3 CC 78  ..o&m:"...?0...x
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.791 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:20.843 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A 15 83 89 86 23 4D BF F4 87 B5 13 7E E7 66 AE B3 4C 54 D7 5B 4C 5C 10 AC EB 0C A2 37 A4 E7 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 22:26:21.131 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 22:26:21.133 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 22:26:32.268; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:32.599 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F F9 8D F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:45.000 UTC",
#       "not  after"         : "2024-01-17 22:25:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#           0010: E8 18 16 F4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EB 93 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 22:25:47.000 UTC",
#       "not  after"         : "2024-01-17 22:25:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 77 2C 05 57 AF 8C 65   97 BA 0B 92 54 54 7F 62  Rw,.W..e....TT.b
#           0010: E8 18 16 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 93 1B 56 BF 2F F9 47   3D 6F 06 5D 3B D8 4B A7  1..V./.G=o.];.K.
#           0010: 2A EC 03 CE                                        *...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 22:26:32.616 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:33.031 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:33.032 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:33.032 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:26:33.032 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:33.121 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.121 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:33.123 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 22:26:33.123 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.141 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 22:26:33.144 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2E C9 FD 55 8C 07 FE 2D 0D 2F 4B 79 59 F7 AB 01 20 52 E2 12 D3 6C BC B6 34 72 0D 07 D3 D0 C3 3A",
#     "session id"          : "9E 57 43 23 FA E5 01 65 7D 64 A4 EB 3C 3A BE 46 7C D6 C7 8F 63 C2 32 9A 67 F0 C9 4B CA BC 04 E4",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: FA 0F F6 54 EE 1F 90 DB   E9 22 A7 DD 36 35 0F 42  ...T....."..65.B
#               0010: 9B D5 40 90 EC 3E FB 50   50 9E BE E5 7F AA AD 0B  ..@..>.PP.......
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.164 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DE C1 ED 4A 07 2D 69 9D 2C AD F2 93 35 0C 7C E0 52 BE 9B B5 09 D5 07 22 F8 21 7E 49 37 E3 1F 17",
#     "session id"          : "9E 57 43 23 FA E5 01 65 7D 64 A4 EB 3C 3A BE 46 7C D6 C7 8F 63 C2 32 9A 67 F0 C9 4B CA BC 04 E4",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5F 42 95 D2 C7 92 D4 CB   07 79 38 D7 EF 20 67 11  _B.......y8.. g.
#             0010: 38 A6 32 CC 9B 27 AD FC   9F 30 8C E3 B1 FD 46 0A  8.2..'...0....F.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.165 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.165 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.167 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.169 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.170 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.170 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.179 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.181 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.182 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.186 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.186 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.186 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.186 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.186 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:33.187 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:26:33.187 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 22:26:33.189 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 22:27:51.260 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:27:51.302 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:27:51.302 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:27:51.302 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 22:27:51.302 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43762/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28380ms
ok 65 stop command for single port in 31388ms
ok 66 status detects locally running solr in 14652ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2191ms
ok 69 copying files around in 6551ms
ok 70 upconfig in 2634ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1220ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 20m 58s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m23.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5712 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5712/

All tests passed

Build Log:
[...truncated 1310 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40593/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 19:23:02.199; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 19:23:02.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 19:23:03.450; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 19:23:03.493; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22486ms
ok 61 start solr with client truststore and security manager in 25262ms
not ok 62 start solr with mTLS needed in 57646ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rtoT6o/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40593.
#
# Started Solr server on port 40593 (pid=198509). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40594.
#
# Started Solr server on port 40594 (pid=198955). Happy searching!
#
# INFO  - 2023-10-19 19:24:26.295; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 19:24:26.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 19:24:26.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 19:24:26.681; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 19:24:26.682; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:26.714 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 F5 26 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:24:02.000 UTC",
#     "not  after"         : "2024-01-17 19:24:02.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 91 86 2C E7 14 89 E6   FB 37 87 28 55 58 2B 78  ...,.....7.(UX+x
#         0010: D1 F1 0F 5F                                        ..._
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:26.719 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 8E DD B4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:54.000 UTC",
#     "not  after"         : "2024-01-17 19:23:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:26.733 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:26.836 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:26.837 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:26.837 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:26.837 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:26.989 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:26.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:26.992 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:26.992 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:26.997 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:27.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:27.009 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:27.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:27.011 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DA 2A 37 83 E2 53 61 8E 7E CD 72 9B 4F 4D 2B 59 8C 1C 3C CD AA CD 44 02 A4 BB AF 14 89 3A 51 14",
#   "session id"          : "36 20 E3 24 08 B4 79 F4 13 36 66 F6 54 A2 18 7E FB D8 3C A5 26 AA EE 7F 3A A9 F8 12 65 9D 01 FF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A2 61 9C E6 E6 EC F7 9A   C3 E4 EC D6 AB 20 B5 18  .a........... ..
#             0010: 34 9B 47 E0 13 C5 89 7C   A5 C0 48 EE 7B A1 66 29  4.G.......H...f)
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.118 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9F 85 FF 0C 60 AB C6 3F 70 35 E8 D7 CA E0 92 60 3A D5 A8 ED 2A D0 F4 C4 DE 51 AE CA 01 09 6D 57",
#   "session id"          : "36 20 E3 24 08 B4 79 F4 13 36 66 F6 54 A2 18 7E FB D8 3C A5 26 AA EE 7F 3A A9 F8 12 65 9D 01 FF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D8 52 BA A0 C7 39 57 D4   8B 02 2E 79 16 06 BD 5C  .R...9W....y...\
#           0010: 61 93 FC C4 2E 11 40 D1   FF 0C 0B 66 98 68 18 72  a.....@....f.h.r
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.118 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.119 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.121 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.121 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.123 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.123 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.125 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.125 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.132 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.134 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.135 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.139 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.139 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.139 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.139 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.140 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.142 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.142 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.142 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.143 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.143 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.144 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.147 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D8 DA B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:58.000 UTC",
#       "not  after"         : "2024-01-17 19:23:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 1E 23 CB 91 13 4B F1   B7 95 0C FC 4B F2 B1 AA  ..#...K.....K...
#           0010: 1A 68 6C 1B                                        .hl.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.147 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.228 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.232 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BD E4 3B C4 1B 87 AF C2   CA 94 3B 5E 8A AA A1 57  ..;.......;^...W
#     0010: 0C 8C 9B 75 83 2F F6 4E   53 FD FC 7A 74 AD DF E8  ...u./.NS..zt...
#     0020: 85 07 1A 7B 23 76 E3 89   70 FE EA 71 4A 6B EA 36  ....#v..p..qJk.6
#     0030: 4B DC 52 E5 5A 15 DE 27   14 49 CD 94 13 E3 BB D6  K.R.Z..'.I......
#     0040: 44 2E CC E8 40 4A DC 66   3A 67 C8 A8 94 23 36 FF  D...@J.f:g...#6.
#     0050: D3 EB 9F F8 9F D5 A6 92   41 C6 EB 4C DC 8C B9 9A  ........A..L....
#     0060: 7C B9 15 DD BD 50 30 56   E1 A3 FD 8D DF AC D4 9D  .....P0V........
#     0070: 51 31 29 3B 46 0F 81 C6   B2 CE 9B 90 5E B1 95 DB  Q1);F.......^...
#     0080: BE A3 24 EC 36 17 97 F5   EA D2 94 EB 72 4E CE 96  ..$.6.......rN..
#     0090: B2 42 8E AE C8 B1 24 8F   91 73 30 74 95 E3 70 46  .B....$..s0t..pF
#     00A0: 61 BF 86 92 D7 6D 37 7D   2E E9 DC 84 59 25 35 44  a....m7.....Y%5D
#     00B0: 04 02 54 09 A6 8A 3C 70   E6 DE DB 9E DD C5 AA E0  ..T...<p........
#     00C0: 29 28 7E D8 94 5E FC 74   25 EF 4B 42 D5 FD 4E E1  )(...^.t%.KB..N.
#     00D0: C1 04 74 91 C4 23 C6 F2   65 23 70 C7 A5 A9 EB BE  ..t..#..e#p.....
#     00E0: 85 79 65 AB EF A3 87 37   27 B7 C2 76 15 74 95 E2  .ye....7'..v.t..
#     00F0: 00 38 D2 1F 93 06 58 33   65 C8 B3 3D 65 22 E5 2F  .8....X3e..=e"./
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.233 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FA 34 9D 08 0B BD A3 9B   D3 A0 02 BA 7C 57 35 CA  .4...........W5.
#     0010: B8 7D 25 5E AB 70 D6 63   F6 53 47 C6 05 9F A5 A4  ..%^.p.c.SG.....
#     0020: 57 1D E1 77 07 61 71 F1   6F D2 06 ED FF CA 44 2A  W..w.aq.o.....D*
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.236 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:27.236 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.237 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:27.237 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.237 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:27.237 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:27.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.238 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.241 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 F5 26 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:24:02.000 UTC",
#       "not  after"         : "2024-01-17 19:24:02.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 91 86 2C E7 14 89 E6   FB 37 87 28 55 58 2B 78  ...,.....7.(UX+x
#           0010: D1 F1 0F 5F                                        ..._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 51 50 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:56.000 UTC",
#       "not  after"         : "2024-01-17 19:23:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#           0010: 66 FD 10 80                                        f...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.267 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 17 C4 0C 6D 2E F3 51   AF 0A 92 CD 28 BB 0B EC  0...m..Q....(...
#     0010: 36 64 9F 86 B8 B7 6C F7   A7 7E 62 F9 75 93 1A E0  6d....l...b.u...
#     0020: 3F 4F 46 2C 65 2C 85 E9   E9 3F 60 97 88 8F C0 E5  ?OF,e,...?`.....
#     0030: 86 66 9D 92 26 65 DB AB   A5 00 BA 02 AC 28 88 81  .f..&e.......(..
#     0040: D0 B9 CA 47 8F 78 30 90   A9 56 6B 18 F7 9F E0 FB  ...G.x0..Vk.....
#     0050: DB D2 33 7B C8 10 8C 8B   1B 97 C5 EE 1E 77 25 29  ..3..........w%)
#     0060: 42 E3 AC 40 D7 0E 46 DF   AF 69 85 22 65 01 31 6A  B..@..F..i."e.1j
#     0070: CE F5 62 43 10 42 48 08   CD D2 72 0A B1 A6 EC 38  ..bC.BH...r....8
#     0080: E7 CB C3 57 C0 FE AF 87   AF C8 5C 42 F1 54 D9 1D  ...W......\B.T..
#     0090: E5 DC 08 22 BA D0 5F C3   EF 34 37 CD 4B 19 4D 6E  ...".._..47.K.Mn
#     00A0: B1 5C 05 F6 18 87 FE 2C   64 D1 2F 89 6F 83 FE 75  .\.....,d./.o..u
#     00B0: A9 92 75 22 16 7C 87 29   41 9E FA F1 00 82 45 D7  ..u"...)A.....E.
#     00C0: 30 2F 62 4C 5B 8D 1D 74   CD 94 9B A3 2D 1E 97 B5  0/bL[..t....-...
#     00D0: 06 5C A9 E8 B9 63 C3 C5   49 B8 D7 FD F9 F8 6C 24  .\...c..I.....l$
#     00E0: AB 1F 94 70 4D 60 50 99   97 58 C2 7C 1E A1 A8 80  ...pM`P..X......
#     00F0: E9 1D 19 A6 DF E9 3B 4B   76 17 26 A0 33 C2 09 AB  ......;Kv.&.3...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.268 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 8F 96 00 C7 DE F6 F0   2D 4F 1A 1F 8D 35 26 9A  9.......-O...5&.
#     0010: BA 24 F1 0F 65 56 51 C7   B3 1D 87 69 4B BB 94 CD  .$..eVQ....iK...
#     0020: 16 83 AB 0B FA 56 FF A1   D8 C5 B3 4C E1 5D CD 2D  .....V.....L.].-
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.269 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:27.327 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E 07 4F 41 C9 C4 67 56 D3 69 4B 99 30 92 AA 68 F1 97 FF 23 D8 3B D0 D5 C7 E3 EC 29 C1 0C 56 2C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 19:24:27.638 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 19:24:27.639 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 19:24:28.595; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 19:24:28.600; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 19:24:28.986; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 19:24:28.990; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 19:24:28.990; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rtoT6o/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:29.024 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 F5 26 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:24:02.000 UTC",
#     "not  after"         : "2024-01-17 19:24:02.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 91 86 2C E7 14 89 E6   FB 37 87 28 55 58 2B 78  ...,.....7.(UX+x
#         0010: D1 F1 0F 5F                                        ..._
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:29.029 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 8E DD B4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:54.000 UTC",
#     "not  after"         : "2024-01-17 19:23:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:29.043 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:29.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:29.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:29.134 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:29.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:29.271 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.271 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:29.273 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:29.273 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.279 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.290 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.291 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.291 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:29.293 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E0 ED F8 5D 7B 04 79 FC 70 60 11 DB E4 7A 74 10 52 9F A7 49 F0 A7 E6 4C 59 74 65 96 B5 7A 70 4A",
#   "session id"          : "28 F0 9A B0 2A E1 10 E0 6D E7 C2 89 52 56 95 20 44 AF 80 7E 20 34 05 4E AA C0 94 50 87 6B 79 79",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 92 B7 69 34 79 09 67 84   02 EF 6C B4 5B 1D 08 61  ..i4y.g...l.[..a
#             0010: DE CD CE 96 4E 10 7F D9   9C 16 AC CF 95 4C 20 0E  ....N........L .
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.405 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "11 D3 39 BB 1D 2B AE 6E A3 23 C8 7B 8E 35 18 15 7D 9D 32 1B 3C C4 92 83 0D 61 F5 EB 7B 1B EA C1",
#   "session id"          : "28 F0 9A B0 2A E1 10 E0 6D E7 C2 89 52 56 95 20 44 AF 80 7E 20 34 05 4E AA C0 94 50 87 6B 79 79",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 D1 38 FE 85 67 51 A7   FA 06 52 FC 37 1D 84 3C  C.8..gQ...R.7..<
#           0010: 9B 94 32 D9 8A D6 04 C3   75 4D 67 8D 3D 40 1E 23  ..2.....uMg.=@.#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.406 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.406 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.407 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.409 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.409 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.411 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.420 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.422 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.423 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.426 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.428 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.429 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.429 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.430 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.430 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.431 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.431 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.432 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.435 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D8 DA B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:58.000 UTC",
#       "not  after"         : "2024-01-17 19:23:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 1E 23 CB 91 13 4B F1   B7 95 0C FC 4B F2 B1 AA  ..#...K.....K...
#           0010: 1A 68 6C 1B                                        .hl.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.435 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.514 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 51 50 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 19:23:56.000 UTC",
#     "not  after"         : "2024-01-17 19:23:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#         0010: 66 FD 10 80                                        f...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#         0010: 96 35 5E AD                                        .5^.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.518 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 36 1F 97 5C 1E 26 41   26 A5 7B D0 AA AF 68 C5  .6..\.&A&.....h.
#     0010: 2D EC C7 C8 59 F6 AC FE   C8 6E 5B 26 76 2A A9 AE  -...Y....n[&v*..
#     0020: 0B F3 67 1C 28 FE C4 EF   11 62 3E 9E 48 23 C1 51  ..g.(....b>.H#.Q
#     0030: EF FE FF 89 99 D3 C2 B0   13 1E AB 7B FB 46 FD AA  .............F..
#     0040: 88 92 BC 78 38 C4 60 E6   00 A4 1A B6 D2 07 2E 1C  ...x8.`.........
#     0050: FD 07 E1 1E D4 FF 5E 5E   BF 09 52 A4 6D 17 A9 8F  ......^^..R.m...
#     0060: 64 20 76 38 11 87 5A 2B   66 6C BA D3 1C 86 3E 41  d v8..Z+fl....>A
#     0070: 3E 55 8A CE 2F B9 1C E3   68 3E 75 DA 6C CE 2C 86  >U../...h>u.l.,.
#     0080: AD 1D FB 88 D7 5C 7E B6   00 6D E8 BE 0A B3 83 02  .....\...m......
#     0090: FF 61 3E 79 70 03 1C 56   CA D8 76 8D EE 63 2C 3E  .a>yp..V..v..c,>
#     00A0: 31 C5 AE 64 BC D4 BF 54   05 83 C6 1E 64 9A FB 55  1..d...T....d..U
#     00B0: 93 03 86 A7 12 09 72 AA   F4 64 24 5B 24 1B 29 76  ......r..d$[$.)v
#     00C0: AB 0D DF C0 FD E8 72 DF   AD D1 5D 2E 0F 4B 7A 66  ......r...]..Kzf
#     00D0: 63 8F 16 9E E6 AD D3 C5   FA 7E 5F 03 31 08 0C 26  c........._.1..&
#     00E0: 78 25 47 28 9D CA 64 50   A2 9D 2C 6A 94 4E 01 46  x%G(..dP..,j.N.F
#     00F0: 30 43 0D 4D 99 58 4C 06   0D 75 8C 2A EC 2D 25 E7  0C.M.XL..u.*.-%.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.519 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B F0 9A A8 0D 5B 31 E8   F8 CC FD 73 CB 18 EF 45  .....[1....s...E
#     0010: 14 F2 07 05 80 BC CD 58   12 D9 24 B1 7F AA E1 D2  .......X..$.....
#     0020: 6B 6B FA B3 C6 F7 DC 81   58 C3 81 9D 59 DF E1 8F  kk......X...Y...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.522 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:29.523 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.523 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:29.523 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.523 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 19:24:29.524 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:29.524 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.524 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.527 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 F5 26 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:24:02.000 UTC",
#       "not  after"         : "2024-01-17 19:24:02.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 91 86 2C E7 14 89 E6   FB 37 87 28 55 58 2B 78  ...,.....7.(UX+x
#           0010: D1 F1 0F 5F                                        ..._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 51 50 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:56.000 UTC",
#       "not  after"         : "2024-01-17 19:23:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#           0010: 66 FD 10 80                                        f...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.553 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7F 58 EA 57 FE 0D 47 59   5F 68 91 47 E1 81 97 91  .X.W..GY_h.G....
#     0010: 0D 7C 4B 54 A6 A4 AD BC   C8 FD 41 91 CF 1C 5D 43  ..KT......A...]C
#     0020: B9 1C 1B 48 1D B7 15 3D   A3 89 4B B4 E0 D2 9C 2F  ...H...=..K..../
#     0030: DA 53 F0 F3 FF 7D 6C 01   D5 3F 80 E9 D6 C5 FA E7  .S....l..?......
#     0040: 85 2E 47 84 BB 9C A0 DC   8B 75 90 45 39 D0 6A 1C  ..G......u.E9.j.
#     0050: BC C1 46 77 0F 86 38 3A   42 E8 A0 53 3B 3D 95 D5  ..Fw..8:B..S;=..
#     0060: 3C 11 1A DE F4 E5 23 A0   8B 25 2D E6 82 13 8D 89  <.....#..%-.....
#     0070: FB 34 8A 92 B2 A2 4E 03   5D C9 4C C0 88 D9 94 44  .4....N.].L....D
#     0080: 8F FE 32 73 15 D3 9E 4B   07 FF C6 7D 82 C3 85 BF  ..2s...K........
#     0090: A2 43 45 1B 34 03 72 58   56 5B 88 B3 A8 7F 69 24  .CE.4.rXV[....i$
#     00A0: C5 15 43 EC 0D A5 63 7D   B9 CB 6A 5B D8 71 F3 79  ..C...c...j[.q.y
#     00B0: 09 61 39 6B 2F 21 46 DE   5C 68 7E E2 77 5A C4 E4  .a9k/!F.\h..wZ..
#     00C0: 7D 66 A0 5F 90 A5 7E 0A   19 D0 BB 8E 9E 8F 35 56  .f._..........5V
#     00D0: 62 F1 B8 D3 FC BA 04 0E   B9 E3 1D DC D0 29 A6 CF  b............)..
#     00E0: ED 43 E7 D5 B0 30 95 E8   8A 8E FD B1 02 1A 45 F4  .C...0........E.
#     00F0: 5C A9 A9 85 78 73 55 A8   03 DF 5E CA A4 77 C7 4A  \...xsU...^..w.J
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.554 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FD 73 AD 42 E5 79 C3 B6   D0 67 96 FF F5 FD EB 06  .s.B.y...g......
#     0010: 84 D5 90 E6 D5 58 D6 32   32 57 DA 72 88 AF 9B 0B  .....X.22W.r....
#     0020: 12 2E BB A7 DC A4 6B 5D   CF AB BC 60 B4 A1 BF 91  ......k]...`....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.555 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:29.611 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "05 AA E4 17 19 C6 69 FC D4 C7 3A 73 9C 76 2E 1A D9 D9 FC B1 B0 A3 6D 8A EC D0 35 BF 3A 6F 0F 33",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 19:24:29.921 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 19:24:29.922 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 19:24:41.774; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:42.098 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 51 50 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:56.000 UTC",
#       "not  after"         : "2024-01-17 19:23:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#           0010: 66 FD 10 80                                        f...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 4A 41 26 50 A6 9F 16   E6 46 E3 4F 10 E9 1F 34  .JA&P....F.O...4
#           0010: 96 35 5E AD                                        .5^.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 8E DD B4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 19:23:54.000 UTC",
#       "not  after"         : "2024-01-17 19:23:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 8C EB 54 6C 83 35 AB   69 85 29 35 55 BB 99 E6  ...Tl.5.i.)5U...
#           0010: 66 FD 10 80                                        f...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 19:24:42.113 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:42.274 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:42.275 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:42.275 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:24:42.275 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:42.353 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.353 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:42.355 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 19:24:42.355 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.360 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.372 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.372 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.372 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 19:24:42.375 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AE 47 46 99 21 90 3F C0 6C 74 26 B2 15 2A E3 3B E0 5F 32 3A 1C FB 2F 5D B4 E7 45 03 86 EA 0F 90",
#     "session id"          : "65 A3 6B C6 09 05 67 0A 13 15 DD 74 09 96 70 B7 52 F2 A8 85 7B F8 A9 67 53 FB 78 62 F9 19 B7 58",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 1B 42 87 68 FB 9E F5 AE   31 33 40 AE 01 FB EB 0B  .B.h....13@.....
#               0010: 37 F7 D0 7E E4 4B 10 42   72 1A 74 5D 32 14 C3 1E  7....K.Br.t]2...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.395 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "10 F1 01 65 7D 6F 2F E8 AE 1D A3 D0 E6 CB EF 91 C6 1A AD C5 9F 8B FD 6D 4D 7C 17 23 98 97 7D 6A",
#     "session id"          : "65 A3 6B C6 09 05 67 0A 13 15 DD 74 09 96 70 B7 52 F2 A8 85 7B F8 A9 67 53 FB 78 62 F9 19 B7 58",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 76 A9 74 25 B1 80 CB D4   08 CF 64 3C 95 CC D4 15  v.t%......d<....
#             0010: A2 D2 55 A3 01 A8 A7 21   4B 3C A2 E4 D5 21 BB 2B  ..U....!K<...!.+
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.395 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.396 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.398 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.400 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:42.402 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:42.402 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.411 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.412 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.413 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.417 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.417 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.417 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.417 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.418 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:42.418 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:24:42.418 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 19:24:42.420 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 19:26:02.573 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:26:02.613 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:26:02.613 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:26:02.613 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 19:26:02.613 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40594/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28176ms
ok 65 stop command for single port in 31473ms
ok 66 status detects locally running solr in 14377ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2192ms
ok 69 copying files around in 6677ms
ok 70 upconfig in 2693ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 13s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m4.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5711 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5711/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([F0980FF778C6B955:C56CE4AC931A8F0B]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6158 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F0980FF778C6B955 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 48s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m11.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5710 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5710/

All tests passed

Build Log:
[...truncated 1311 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42485/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 14:01:22.767; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:01:22.772; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 14:01:23.669; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 14:01:23.709; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22568ms
ok 61 start solr with client truststore and security manager in 24771ms
not ok 62 start solr with mTLS needed in 59043ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PA4n87/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42485.
#
# Started Solr server on port 42485 (pid=197277). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42486.
#
# Started Solr server on port 42486 (pid=197705). Happy searching!
#
# INFO  - 2023-10-19 14:02:46.046; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:02:46.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:02:46.414; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:02:46.417; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:02:46.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:46.449 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 B8 A5 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:22.000 UTC",
#     "not  after"         : "2024-01-17 14:02:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C D8 1F 73 A4 02 DB DF   4C F5 53 E7 50 A9 B6 1E  <..s....L.S.P...
#         0010: A7 16 6E 80                                        ..n.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:46.453 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 10 2B AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:14.000 UTC",
#     "not  after"         : "2024-01-17 14:02:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:46.467 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:46.558 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:46.559 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:46.559 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:46.559 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:46.692 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.693 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:46.694 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:46.695 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.711 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:46.713 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DD E6 D0 E9 2D BC 39 F7 98 D8 E0 9D D3 E9 AA 01 85 A9 51 52 95 AA EF 2E 21 44 DA AA A5 C9 CB 6E",
#   "session id"          : "80 54 85 CD A8 65 3A 59 E3 FE D6 0C 94 49 F4 27 5B 78 D0 FD 6F 41 21 4C 05 47 46 ED 88 FC 3E 07",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 EF 7A 04 88 BB D1 92   BE 23 9A 9D 68 88 1B 64  ..z......#..h..d
#             0010: 9B 16 5C 36 2F 39 33 6C   BC AE 2D DF 30 D6 F6 5C  ..\6/93l..-.0..\
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.817 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C2 3A 14 07 27 94 CE EC DA 16 A9 E6 20 BF 7F 01 05 4C F3 E7 47 03 F8 5C 58 15 89 18 E5 D6 EB AA",
#   "session id"          : "80 54 85 CD A8 65 3A 59 E3 FE D6 0C 94 49 F4 27 5B 78 D0 FD 6F 41 21 4C 05 47 46 ED 88 FC 3E 07",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3C 54 A5 05 73 77 E3 3F   FF A0 A3 C1 AA 89 0B 6D  <T..sw.?.......m
#           0010: 6C F0 EA EA 66 60 0B 7B   FC D6 BA A8 8E 8A BF 29  l...f`.........)
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.818 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.818 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.819 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.819 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.819 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.820 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.822 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.824 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.832 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.833 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.834 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.838 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.838 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.838 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.839 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.841 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.841 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.841 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.842 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.842 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.843 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.846 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 30 5F 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:18.000 UTC",
#       "not  after"         : "2024-01-17 14:02:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 43 F2 F2 24 27 F8 FD   C5 BB E1 91 13 12 9A F4  .C..$'..........
#           0010: 5F 1C 87 CF                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.846 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.927 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.931 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F D3 3B 6B 73 79 B8 5F   15 41 4B 7A 55 A8 45 73  /.;ksy._.AKzU.Es
#     0010: E5 0F E3 69 FE D4 48 50   64 FF 3E 2B E8 EA E8 D4  ...i..HPd.>+....
#     0020: 53 61 27 A0 66 DA 1F 1A   AE F9 97 BF A4 C7 23 69  Sa'.f.........#i
#     0030: 92 96 4B 09 7D BB 27 95   CB 19 27 E7 CA CE 95 D8  ..K...'...'.....
#     0040: CB 6C 29 DD 0A 26 AD 96   B6 D7 37 F0 9C FF 0B 7F  .l)..&....7.....
#     0050: DA A2 85 B6 93 49 21 BA   E8 07 68 F1 C3 B9 76 1D  .....I!...h...v.
#     0060: 86 28 7F A7 CF 6C 10 A8   42 FD B4 34 30 18 F1 59  .(...l..B..40..Y
#     0070: DE 96 5E 4B D8 59 F6 C5   08 90 80 9C 00 1B E9 58  ..^K.Y.........X
#     0080: 1A 50 80 84 D3 54 C5 0B   EB DA E3 6A 2D 12 8D 06  .P...T.....j-...
#     0090: 06 AC E1 92 5A A1 97 93   75 A7 43 6A BA 42 A8 BD  ....Z...u.Cj.B..
#     00A0: E2 D0 85 27 D9 56 40 12   7D 39 74 58 4F 60 A5 2A  ...'.V@..9tXO`.*
#     00B0: C6 22 E1 22 65 CE 19 FC   A9 37 53 1B 93 35 D0 19  ."."e....7S..5..
#     00C0: 86 15 B8 05 D9 4F 65 D6   41 4B 06 B9 6B 9C F1 EA  .....Oe.AK..k...
#     00D0: 7C 24 E3 5F 77 4E 6C E5   6D FD CF 48 86 2B 4D 81  .$._wNl.m..H.+M.
#     00E0: 8A CA 96 58 E0 C4 71 D2   72 77 51 14 A6 E4 C8 FA  ...X..q.rwQ.....
#     00F0: 86 59 36 F6 09 73 B1 54   91 7D 98 5E C5 87 D7 51  .Y6..s.T...^...Q
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.933 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 37 C9 25 11 A2 2B 9A 07   73 2D 14 2F FE 85 46 47  7.%..+..s-./..FG
#     0010: 25 C6 79 62 AA FE E5 2D   5A 91 58 8B 2F 8D E1 25  %.yb...-Z.X./..%
#     0020: D3 0A D3 10 93 00 C9 53   D5 FC 7F 53 98 51 2A EE  .......S...S.Q*.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.935 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:46.936 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.936 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:46.936 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.937 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:46.937 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:46.937 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.938 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.940 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 B8 A5 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:22.000 UTC",
#       "not  after"         : "2024-01-17 14:02:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C D8 1F 73 A4 02 DB DF   4C F5 53 E7 50 A9 B6 1E  <..s....L.S.P...
#           0010: A7 16 6E 80                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 8C C8 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:16.000 UTC",
#       "not  after"         : "2024-01-17 14:02:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#           0010: 0C CC 11 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.966 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 84 C0 55 7F D9 52 9D 70   6A D2 83 60 19 65 8E 3A  ..U..R.pj..`.e.:
#     0010: 5F 5F D4 71 54 73 43 29   AD 8B AC A6 55 C4 C2 F5  __.qTsC)....U...
#     0020: 3B 8C 07 71 1E 71 96 EC   B7 FA D4 2B 63 CC CF B1  ;..q.q.....+c...
#     0030: 19 AB 66 D2 11 51 DD 2F   2F 7F 57 88 46 48 66 F2  ..f..Q.//.W.FHf.
#     0040: 9E C7 50 23 27 EB BA 0A   39 7D BA C0 70 EC 0B 5A  ..P#'...9...p..Z
#     0050: 65 F8 0C 6A 87 06 B9 0F   EE 22 3B D9 45 C0 B5 AF  e..j.....";.E...
#     0060: CD 20 57 8E FE 62 B9 81   97 6E 67 EB 70 EF 92 26  . W..b...ng.p..&
#     0070: 71 6E F8 2C 65 75 BB AD   FF 89 54 50 B8 3E 06 A0  qn.,eu....TP.>..
#     0080: EB C6 73 18 1A 06 80 4F   26 61 BC 76 89 F1 D8 36  ..s....O&a.v...6
#     0090: 45 E3 B3 4E E3 8C 20 9B   2B D1 1D AA 34 33 C9 31  E..N.. .+...43.1
#     00A0: BE 2E EB 5B 0B 27 96 3A   D8 DE 92 C3 4C 0C D6 35  ...[.'.:....L..5
#     00B0: DB D4 1E 21 D4 2E A2 A8   B1 4B B3 F0 8A E2 41 D1  ...!.....K....A.
#     00C0: CB D5 FB D1 41 8B 41 F0   F8 F8 50 2F 4D A9 A6 AF  ....A.A...P/M...
#     00D0: 87 38 E2 C9 03 E2 17 EE   33 24 D6 6F 10 E0 0F D8  .8......3$.o....
#     00E0: A6 15 05 BF 48 0D 8F D8   36 BD 3A 76 5D BD 29 C2  ....H...6.:v].).
#     00F0: 78 99 58 B1 6B 51 05 CB   F7 2B 04 F8 72 36 D4 E1  x.X.kQ...+..r6..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.967 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 80 04 2A A2 51 E9 40 62   E1 5A AA 0C D6 EC 09 8F  ..*.Q.@b.Z......
#     0010: D1 0A 5E D0 C0 16 CC 78   A4 9F 79 E2 F1 92 0F 65  ..^....x..y....e
#     0020: 1B F9 FB 3A F0 B7 26 BC   FA 0C A0 71 BD 40 6D A5  ...:..&....q.@m.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:46.968 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:47.028 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6D C9 E3 A3 8F 62 B1 59 3E 20 82 EC 81 6C 8A F9 E9 38 A9 E4 FB 63 20 79 E9 84 CB 1B B7 4F 5B 3A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 14:02:47.330 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 14:02:47.331 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 14:02:48.271; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 14:02:48.277; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 14:02:48.639; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:02:48.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 14:02:48.643; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PA4n87/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:48.675 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 B8 A5 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:22.000 UTC",
#     "not  after"         : "2024-01-17 14:02:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C D8 1F 73 A4 02 DB DF   4C F5 53 E7 50 A9 B6 1E  <..s....L.S.P...
#         0010: A7 16 6E 80                                        ..n.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:48.679 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 10 2B AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:14.000 UTC",
#     "not  after"         : "2024-01-17 14:02:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 14:02:48.694 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:49.020 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:49.021 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:49.021 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:02:49.022 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:49.170 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:49.172 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:02:49.172 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.177 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.189 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.189 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.190 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:02:49.193 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B8 EF C3 C8 87 F7 FF C6 F7 CD CB 8C 5D 6D 4D 06 20 8F CE 64 93 E9 C8 29 2D 9F 58 74 CB E8 91 40",
#   "session id"          : "5E 3A 6F 51 8B D2 05 98 76 0F C4 E3 D1 80 D1 A2 65 FF C7 45 52 9B 40 EE 8F 13 A5 D2 30 D5 92 C1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FF 7C 54 C8 1A 51 2F 2F   D2 17 59 49 EE C6 EC 44  ..T..Q//..YI...D
#             0010: 30 90 C2 71 3C 2F B0 58   13 EC 61 C0 83 38 E4 50  0..q</.X..a..8.P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.292 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6B A3 81 C8 40 DD F1 12 81 AF F0 14 FD FB 22 4F 69 FA DB 7C B4 01 B6 12 C9 2A 6B B0 A6 B0 E0 4C",
#   "session id"          : "5E 3A 6F 51 8B D2 05 98 76 0F C4 E3 D1 80 D1 A2 65 FF C7 45 52 9B 40 EE 8F 13 A5 D2 30 D5 92 C1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 64 D3 91 4B FE 79 D6 32   33 E1 FF 22 DB EB FB C1  d..K.y.23.."....
#           0010: 38 B8 49 C2 3C 2D 8D 2E   68 05 0B 60 21 E6 C1 24  8.I.<-..h..`!..$
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.293 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.293 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.295 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.298 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.298 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.307 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.308 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.309 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.313 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.313 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.313 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.315 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.316 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.316 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.316 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.317 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.318 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.318 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.321 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 30 5F 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:18.000 UTC",
#       "not  after"         : "2024-01-17 14:02:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 43 F2 F2 24 27 F8 FD   C5 BB E1 91 13 12 9A F4  .C..$'..........
#           0010: 5F 1C 87 CF                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.321 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.421 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 8C C8 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 14:02:16.000 UTC",
#     "not  after"         : "2024-01-17 14:02:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#         0010: 0C CC 11 E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#         0010: 50 1C 1D B5                                        P...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.424 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 46 38 20 85 A5 10 AF   86 8D 11 92 D4 89 F7 99  ^F8 ............
#     0010: 20 06 66 F5 B5 D6 B7 BA   EB 85 78 AF 02 08 24 13   .f.......x...$.
#     0020: 42 B5 6D 56 86 1D 07 D4   2A 54 5A 7A FD BB 24 0C  B.mV....*TZz..$.
#     0030: AD AA 9B 5A 5F 16 0D 83   A5 7D AE B6 80 0A 73 CC  ...Z_.........s.
#     0040: F8 E5 3E 33 12 43 4E 5B   F7 9D 34 2F 61 F3 7F 5D  ..>3.CN[..4/a..]
#     0050: 0E 6B F1 A3 6E 6E 6C 4B   B4 3B DB 43 86 5F 17 28  .k..nnlK.;.C._.(
#     0060: BE 8C 27 23 9B 4C 2E 46   CA 6C 89 81 C7 A9 90 50  ..'#.L.F.l.....P
#     0070: 1A 1D 04 68 07 FD 05 BB   CD AF 9C 51 F0 14 D6 0A  ...h.......Q....
#     0080: 0D 69 BD 2F 34 B9 43 1B   36 78 2C 41 EE F7 47 DC  .i./4.C.6x,A..G.
#     0090: C2 57 8B 78 23 63 A9 2C   8D 2F 06 48 27 3B 46 D2  .W.x#c.,./.H';F.
#     00A0: 15 17 F7 A2 C8 B7 F9 5E   99 B4 BC CE 00 86 59 3F  .......^......Y?
#     00B0: E1 6B D8 13 8D 2E EE 3F   3C 02 86 D2 AD 23 A7 BF  .k.....?<....#..
#     00C0: 2F 94 C9 73 92 CB 11 52   AF EA 62 1E 65 98 51 4E  /..s...R..b.e.QN
#     00D0: A2 0A CD A7 72 DE 6D 2D   30 06 F6 FC 33 3B 02 A8  ....r.m-0...3;..
#     00E0: 1D D5 6C 8C 4E 78 00 14   0B 97 D3 AE DE 63 72 EA  ..l.Nx.......cr.
#     00F0: E4 4F 17 79 DD D5 95 AA   7B 95 FB 66 76 58 B8 CB  .O.y.......fvX..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.426 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A 96 EF 2F BE C3 0C 70   5F A5 89 3F FC 29 A0 E5  .../...p_..?.)..
#     0010: 5E E1 DA D3 6E 99 0A 95   C5 CD C4 1C 93 6A C3 B2  ^...n........j..
#     0020: C9 5F 67 A3 4A 12 A6 3E   7A 59 26 0A 34 0C CC AA  ._g.J..>zY&.4...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.428 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:49.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:49.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 14:02:49.430 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:02:49.430 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.430 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.433 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 B8 A5 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:22.000 UTC",
#       "not  after"         : "2024-01-17 14:02:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C D8 1F 73 A4 02 DB DF   4C F5 53 E7 50 A9 B6 1E  <..s....L.S.P...
#           0010: A7 16 6E 80                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 8C C8 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:16.000 UTC",
#       "not  after"         : "2024-01-17 14:02:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#           0010: 0C CC 11 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.459 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 10 7E 1C 4F 34 F1 BF 88   CD 8B 36 4B 66 69 8A 2E  ...O4.....6Kfi..
#     0010: 28 A4 54 FF 6F 93 F1 EE   AC 27 F6 0E 15 74 68 78  (.T.o....'...thx
#     0020: 2E FE D2 45 D0 D6 02 43   DE C2 25 06 F2 FE 63 AC  ...E...C..%...c.
#     0030: 08 35 80 5D B7 7A 61 E8   85 07 EF 06 03 5F CA 21  .5.].za......_.!
#     0040: B5 DA DD F5 7A C1 70 A0   26 54 9E 83 1A 59 6A 8E  ....z.p.&T...Yj.
#     0050: BC 73 7C F4 21 A5 F3 F9   B5 B0 12 1E 52 23 2F 46  .s..!.......R#/F
#     0060: 35 B2 6B 32 49 06 CD 91   F1 19 65 8A E5 65 CA 79  5.k2I.....e..e.y
#     0070: 23 BA EB 91 9B 9D 50 79   79 F7 01 E4 CE 4D 40 F7  #.....Pyy....M@.
#     0080: E3 2D 7B 0C 6F 56 0D DA   CD 2A B8 5C 13 B0 27 0A  .-..oV...*.\..'.
#     0090: 7A A9 C2 A8 15 94 56 10   1F F9 4D 87 8D 86 96 05  z.....V...M.....
#     00A0: 2E 67 2E 28 F1 23 D8 6F   88 DD 73 0E 4D 46 B9 F2  .g.(.#.o..s.MF..
#     00B0: 91 F1 EA B0 15 B6 14 68   23 9B 98 1B BB C9 C3 AF  .......h#.......
#     00C0: CB 73 5C 74 93 0C 3E 3A   6E 00 38 BF 26 68 CA C5  .s\t..>:n.8.&h..
#     00D0: 94 1D 5B DD 93 61 9D 34   4A 52 11 F2 30 84 85 F7  ..[..a.4JR..0...
#     00E0: 30 B4 5C F0 88 BB 37 BE   89 76 AF 3E E7 D9 E2 C6  0.\...7..v.>....
#     00F0: 3D 2B EB E9 73 24 59 5F   6F 26 2A F7 83 0A 7A 37  =+..s$Y_o&*...z7
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.460 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD 0F 6F CC 4B 9D E0 78   D7 17 D3 AD EF BF E4 E0  ..o.K..x........
#     0010: A2 5E 35 81 B1 BF C3 F8   3C 86 7B 17 71 30 24 ED  .^5.....<...q0$.
#     0020: 36 7B DD E0 B9 A7 7A D1   FC CE 8D 7B 74 6D A1 3E  6.....z.....tm.>
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.461 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:02:49.515 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5D 5E AF F5 23 4E B2 74 67 7B EC 91 24 35 16 02 8F D8 88 72 F5 A3 A0 10 5A FD 04 80 25 B2 C0 F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 14:02:49.784 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 14:02:49.785 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 14:03:01.133; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 14:03:01.476 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 10 2B AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:14.000 UTC",
#       "not  after"         : "2024-01-17 14:02:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#           0010: 0C CC 11 E4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 8C C8 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 14:02:16.000 UTC",
#       "not  after"         : "2024-01-17 14:02:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 03 69 F2 34 DA 0B 88   12 51 48 97 65 A0 7C 29  ..i.4....QH.e..)
#           0010: 0C CC 11 E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 A0 69 42 3A E4 63 9C   98 49 58 49 41 2F E7 5A  Q.iB:.c..IXIA/.Z
#           0010: 50 1C 1D B5                                        P...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 14:03:01.491 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:03:01.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:03:01.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:03:01.647 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:03:01.647 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:03:01.725 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.725 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:03:01.727 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 14:03:01.727 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.732 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.744 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.745 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.745 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 14:03:01.747 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "FD 11 E6 D5 EB C7 02 B4 96 0F 75 5E 67 F4 69 76 76 77 69 E3 8F 1C 54 A8 13 A4 C1 43 66 95 DF 7F",
#     "session id"          : "52 2B 7A FA A1 06 93 10 F2 90 C6 86 36 05 8D BA 20 4C 53 67 E2 5B 0D D7 DC D0 BE 68 A1 C5 AA CE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A5 D4 6A B7 3A 93 AC 89   22 60 A0 F4 8C 37 97 09  ..j.:..."`...7..
#               0010: BB 33 28 AC E7 7C 0C CD   8B AD 2D 5F DD 0B CF 21  .3(.......-_...!
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.764 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D8 D8 CC 16 9F DA 9C 66 0B B0 87 73 A8 8F 9F 0E F5 73 A8 40 21 8E 4D AE C7 DD EA D0 6F BD 7A A4",
#     "session id"          : "52 2B 7A FA A1 06 93 10 F2 90 C6 86 36 05 8D BA 20 4C 53 67 E2 5B 0D D7 DC D0 BE 68 A1 C5 AA CE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C0 02 5D 03 55 CD DD BA   71 7C C5 0B F3 F6 9B 15  ..].U...q.......
#             0010: 98 11 BE 4B 9A E5 F3 91   06 30 2C EC F1 3E 19 16  ...K.....0,..>..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.765 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.765 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.767 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.769 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.769 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.769 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.778 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.779 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.780 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:03:01.785 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:03:01.785 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 14:03:01.786 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 14:04:22.893 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:04:22.936 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:04:22.937 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:04:22.937 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 14:04:22.937 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42486/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28041ms
ok 65 stop command for single port in 31023ms
ok 66 status detects locally running solr in 14620ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2174ms
ok 69 copying files around in 6564ms
ok 70 upconfig in 2623ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1202ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1212ms
ok 73 Cleanup in 1216ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 14s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m37s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5709 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5709/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([A8DD026667145C64:9D29E93D8CC86A3A]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5916 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=A8DD026667145C64 -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 40s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m4.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5708 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5708/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38763/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 10:00:05.374; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:00:05.380; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 10:00:06.292; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 10:00:06.334; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22501ms
ok 61 start solr with client truststore and security manager in 25687ms
not ok 62 start solr with mTLS needed in 57762ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2JVQ1v/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38763.
#
# Started Solr server on port 38763 (pid=198931). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38764.
#
# Started Solr server on port 38764 (pid=199379). Happy searching!
#
# INFO  - 2023-10-19 10:01:29.711; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:01:29.717; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:01:30.083; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:01:30.086; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:01:30.086; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:30.123 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EC 0D 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:01:05.000 UTC",
#     "not  after"         : "2024-01-17 10:01:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D9 21 15 22 2A 72 81   9C 3A D6 3A 7D BD 7E 26  ..!."*r..:.:...&
#         0010: 34 CF 30 BD                                        4.0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:30.128 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A FE 73 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:57.000 UTC",
#     "not  after"         : "2024-01-17 10:00:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:30.144 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:30.250 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:30.251 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:30.251 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:30.251 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:30.406 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.407 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:30.409 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:30.409 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.427 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.428 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:30.431 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F6 AD 07 8D E6 6F 94 7E 76 D0 73 BD 4F 3E 8E C1 76 42 C5 B6 EE BF CA 0F DD D3 49 6D 8C AF 37 F8",
#   "session id"          : "17 B7 32 01 C6 42 40 8D 07 0E 10 DB 50 62 EB 33 80 75 CE 48 A2 86 7B A4 AA 7E 92 A2 93 96 2C C3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A9 B7 58 30 FB 22 A7 49   B2 05 C4 39 FD B1 79 F5  ..X0.".I...9..y.
#             0010: EB 7F 71 21 D4 F9 8C D7   AC D3 B0 BD 5A 02 72 5F  ..q!........Z.r_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.552 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 9A 6C C7 4F 4C 2B 98 46 12 AF DE C7 BC 5A 8F 11 B8 4E 39 C0 52 D0 68 2B 19 33 9C F1 DA A0 AF",
#   "session id"          : "17 B7 32 01 C6 42 40 8D 07 0E 10 DB 50 62 EB 33 80 75 CE 48 A2 86 7B A4 AA 7E 92 A2 93 96 2C C3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E6 7A 73 FE 3D B0 81 C1   35 BA 86 7B 20 C3 53 7D  .zs.=...5... .S.
#           0010: 37 64 71 2E 84 26 B4 1C   D5 53 C6 20 AB C4 C8 2E  7dq..&...S. ....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.552 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.552 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.553 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.554 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.554 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.554 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.554 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.554 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.555 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.555 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.557 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.558 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.558 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.558 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.558 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.567 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.569 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.570 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.574 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.574 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.575 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.576 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.578 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.578 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.579 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.579 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.580 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.581 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.586 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 F9 68 7D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:01:01.000 UTC",
#       "not  after"         : "2024-01-17 10:01:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 13 AC 2B 70 CB 3A 76   82 F6 FB CA 26 80 2E 3C  ...+p.:v....&..<
#           0010: B3 F3 2F 7A                                        ../z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.586 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.676 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.680 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E B6 7C 6F 14 40 2D 1F   DA DF FF 93 4A 12 0F BD  >..o.@-.....J...
#     0010: EB 42 4F 27 D8 0F D9 07   0A D3 5D 71 42 4C CD BE  .BO'......]qBL..
#     0020: B6 98 98 FE 39 44 9F A8   92 15 CF DC 90 13 8B B1  ....9D..........
#     0030: CB 71 91 26 D6 00 9D 23   EC EA 1D 92 99 EE 09 9B  .q.&...#........
#     0040: 31 FB C3 00 F6 AE 87 AC   5B 49 B7 13 F9 FA F9 6D  1.......[I.....m
#     0050: 3B 10 2F 71 9A F2 D0 A2   F6 1C 9C B8 3A 7B F2 60  ;./q........:..`
#     0060: 9E 60 0F 7A EB 5B F5 07   6B 6F FE F3 7B 00 7A FC  .`.z.[..ko....z.
#     0070: 76 06 45 4F FE 9C 8F 30   50 37 C4 79 51 E2 CA 22  v.EO...0P7.yQ.."
#     0080: DB C3 1D 21 12 F2 A7 92   9A 46 89 10 22 E0 AD 9F  ...!.....F.."...
#     0090: EB D9 7F 5B 42 73 1B 18   54 01 2D 31 D9 63 3A E1  ...[Bs..T.-1.c:.
#     00A0: 24 34 E2 3F C9 EB 17 EF   1C 08 83 DF 35 80 E7 A1  $4.?........5...
#     00B0: 6B 7B 03 96 53 47 38 8C   C7 64 C3 99 ED 58 23 84  k...SG8..d...X#.
#     00C0: F1 F2 33 B9 E4 5B 02 A9   A7 53 A7 4D 51 EB B9 6A  ..3..[...S.MQ..j
#     00D0: D3 38 87 F2 E2 24 27 DC   07 0C C6 6A 4D E1 35 8E  .8...$'....jM.5.
#     00E0: 93 DD 0C 97 0F B9 6B B1   F7 36 40 28 26 A0 CC 19  ......k..6@(&...
#     00F0: DB 14 AB 67 7E 4B 12 DC   40 EF 17 DF 07 72 52 28  ...g.K..@....rR(
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.681 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 0C 60 34 61 08 F9 5C   EE 67 BD 14 D5 0A 97 3F  ..`4a..\.g.....?
#     0010: E5 68 25 22 BA E7 A2 4E   90 D6 C7 EF DE E7 D9 0B  .h%"...N........
#     0020: C8 8B 28 F5 88 70 EA E5   42 F6 E6 FD 33 C8 D5 53  ..(..p..B...3..S
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.684 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:30.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:30.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:30.686 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:30.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.686 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.689 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EC 0D 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:01:05.000 UTC",
#       "not  after"         : "2024-01-17 10:01:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D9 21 15 22 2A 72 81   9C 3A D6 3A 7D BD 7E 26  ..!."*r..:.:...&
#           0010: 34 CF 30 BD                                        4.0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 37 77 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:00:59.000 UTC",
#       "not  after"         : "2024-01-17 10:00:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#           0010: E0 9B AF 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.716 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 46 6E B7 AF E0 8E FB   F3 6A 77 A2 1D 00 0B D4  GFn......jw.....
#     0010: BB 1A 7D 27 02 5F EF C2   08 87 6E 31 1F B1 87 29  ...'._....n1...)
#     0020: 6B 66 58 18 7A DC 01 CC   0B 4E C6 26 CA 9D E1 59  kfX.z....N.&...Y
#     0030: 9A C6 16 97 CC A5 EB C0   01 09 0C 4A 48 5A 8E 79  ...........JHZ.y
#     0040: 51 73 13 18 0A 81 5E D4   E4 EC A9 BB D1 9D 58 FF  Qs....^.......X.
#     0050: C4 1A 45 67 E5 34 A0 AE   A0 8A 04 4E 04 C2 F0 7B  ..Eg.4.....N....
#     0060: 4E 98 1E 91 D5 6C 7E CE   7B 60 FC F3 58 FA 99 2A  N....l...`..X..*
#     0070: E9 26 E8 BC 8D C7 93 FD   F0 C7 52 92 CF 8B FE A9  .&........R.....
#     0080: CE 4F E8 D4 57 EF F9 0B   3F 72 1E 71 03 0E 62 AC  .O..W...?r.q..b.
#     0090: FB D1 21 6A 84 37 1C 04   79 7B E9 8D 25 03 E0 42  ..!j.7..y...%..B
#     00A0: 34 51 BF 70 32 D6 D1 EA   64 0C 22 47 71 2B 46 B5  4Q.p2...d."Gq+F.
#     00B0: D8 5B 31 B1 B5 55 90 78   11 FA F1 28 5D E0 DB 0B  .[1..U.x...(]...
#     00C0: 3B D8 A4 33 3C A7 8B 58   B5 F1 82 FB 88 12 57 19  ;..3<..X......W.
#     00D0: E2 5B 1A 35 CE A2 26 2B   38 70 1C 05 92 A6 51 39  .[.5..&+8p....Q9
#     00E0: 8A 66 EB 2D 7E 50 BE F3   B9 71 05 85 8E D7 CC 98  .f.-.P...q......
#     00F0: 8A 1D DB 1C AB 84 22 33   A7 D9 20 6B 6D F0 A2 5E  ......"3.. km..^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.717 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D 4A B4 97 9C BF BD 69   01 9B D3 98 23 DF 6C C3  .J.....i....#.l.
#     0010: DC AD 93 23 AC F6 63 6B   1D 0D 0C D9 85 D8 A4 18  ...#..ck........
#     0020: 49 D1 3B 51 35 D0 95 D4   A4 AE 9B 8A 03 AC 63 1C  I.;Q5.........c.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.718 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:30.779 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E4 BA BD 03 4E 54 DD 51 0B D0 71 F1 DC EA 47 EC C0 30 69 46 0D 4B 05 F4 88 97 5D 81 0E 3A 4D F2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:01:31.072 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:01:31.074 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 10:01:32.041; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:01:32.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:01:32.451; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:01:32.454; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:01:32.455; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2JVQ1v/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:32.490 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C EC 0D 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:01:05.000 UTC",
#     "not  after"         : "2024-01-17 10:01:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E D9 21 15 22 2A 72 81   9C 3A D6 3A 7D BD 7E 26  ..!."*r..:.:...&
#         0010: 34 CF 30 BD                                        4.0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:32.495 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A FE 73 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:57.000 UTC",
#     "not  after"         : "2024-01-17 10:00:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:32.512 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:32.844 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:32.853 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:32.853 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:32.854 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:33.016 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:33.019 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:33.019 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.038 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.038 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.039 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:33.042 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "41 6E 3D 18 97 26 16 FB ED FE 3E 32 23 DF 55 7D 5A 73 F9 32 86 F3 EE CC 6F 73 C9 CA 29 DF 2F EE",
#   "session id"          : "9C 93 6E 01 F1 34 40 CE 34 F0 8E 35 E4 25 48 86 AA 7E 3D 9E C0 33 31 C6 C8 C9 90 36 BE 5A B4 97",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C E6 BE BD 37 8B D0 3C   36 5D 90 5F 91 6A 15 CD  \...7..<6]._.j..
#             0010: 2B 99 33 D1 A4 0C B5 86   C0 F1 5D C3 E2 07 78 52  +.3.......]...xR
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.157 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0B E5 FF D0 DA 8C EB E7 C7 08 4E 76 6F BB 0B 21 17 97 2E 69 01 50 AB B3 EE 87 AD 1B 6C D3 56 97",
#   "session id"          : "9C 93 6E 01 F1 34 40 CE 34 F0 8E 35 E4 25 48 86 AA 7E 3D 9E C0 33 31 C6 C8 C9 90 36 BE 5A B4 97",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB 75 15 65 B9 E9 C8 2F   F7 2D 90 BC 3D CD 4A 8A  .u.e.../.-..=.J.
#           0010: 93 42 D5 86 94 87 0F 51   5F 6F B8 66 EA 62 EB 58  .B.....Q_o.f.b.X
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.158 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.158 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.161 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.164 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.164 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.165 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.175 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.177 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.178 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.182 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.183 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.183 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.183 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.184 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.184 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.184 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.186 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.187 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.187 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.187 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.189 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.190 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.194 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 F9 68 7D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:01:01.000 UTC",
#       "not  after"         : "2024-01-17 10:01:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 13 AC 2B 70 CB 3A 76   82 F6 FB CA 26 80 2E 3C  ...+p.:v....&..<
#           0010: B3 F3 2F 7A                                        ../z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.195 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.286 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 37 77 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:00:59.000 UTC",
#     "not  after"         : "2024-01-17 10:00:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#         0010: E0 9B AF 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#         0010: C9 37 40 F9                                        .7@.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.290 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8B 8C EB 2D 0F 19 B3 1D   AB 1E 8A EE 21 4A D0 46  ...-........!J.F
#     0010: 64 04 44 07 29 62 2D 39   08 F4 EA F1 7E D7 D6 E5  d.D.)b-9........
#     0020: 65 D2 4A 38 85 05 D3 D3   CB 4F D6 5F B2 58 97 A1  e.J8.....O._.X..
#     0030: 9F ED 28 91 AF 3C A2 32   49 F7 B6 A9 B8 6F F0 73  ..(..<.2I....o.s
#     0040: 41 2A A6 B0 04 8A 42 25   B3 16 86 10 4A 99 B2 EB  A*....B%....J...
#     0050: 4C 1F F6 F5 75 7B 55 AC   C4 0C 42 0D EC CD 0B FE  L...u.U...B.....
#     0060: D0 E7 76 B6 8A 3B 39 5A   E1 9A 10 45 F1 58 E1 C7  ..v..;9Z...E.X..
#     0070: DF A3 EF A9 83 F5 5D 08   52 9E 25 51 3B B6 9D F1  ......].R.%Q;...
#     0080: 23 DC A0 40 FD 95 B4 4F   69 22 04 4D EA 72 25 1D  #..@...Oi".M.r%.
#     0090: 28 4F 73 D5 FE A2 A6 4D   96 CB DF 3E 28 97 D5 CD  (Os....M...>(...
#     00A0: 2E B2 0B 97 40 C8 2E 05   80 EF 57 67 A5 00 C7 B8  ....@.....Wg....
#     00B0: 85 E9 A8 58 B0 B0 B7 01   7C B8 CC 0B D9 0E 21 EA  ...X..........!.
#     00C0: 2D 39 93 25 52 8A 09 3D   1B BD 35 98 42 69 C3 58  -9.%R..=..5.Bi.X
#     00D0: D2 CB F9 00 94 2A 3C F0   6D 1F F8 7E 69 C6 21 17  .....*<.m...i.!.
#     00E0: B2 B8 2E 5B AB CE BA ED   9E E6 36 6E 68 6B DE 67  ...[......6nhk.g
#     00F0: 35 C1 7E D8 B9 EC AB 50   4E C2 BF D5 17 CD 1E C2  5......PN.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.292 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF D5 D1 1B F7 2C D1 19   88 F5 97 33 6B E0 32 C4  .....,.....3k.2.
#     0010: 77 98 1F BE 1C 61 5C 1B   63 D0 96 EB 08 7B 8D 70  w....a\.c......p
#     0020: 76 24 37 3C 04 48 80 40   A0 30 2E 9D 2E 9C 98 BA  v$7<.H.@.0......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.294 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:33.295 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.295 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:33.296 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.296 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 10:01:33.296 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:33.296 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.297 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.299 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C EC 0D 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:01:05.000 UTC",
#       "not  after"         : "2024-01-17 10:01:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E D9 21 15 22 2A 72 81   9C 3A D6 3A 7D BD 7E 26  ..!."*r..:.:...&
#           0010: 34 CF 30 BD                                        4.0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 37 77 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:00:59.000 UTC",
#       "not  after"         : "2024-01-17 10:00:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#           0010: E0 9B AF 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.326 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D C1 14 EA 84 0F 98 19   1B DB 5C F9 9F 19 77 BC  ..........\...w.
#     0010: 12 B7 56 DE E7 2F 92 79   68 EE 9C E1 93 FE AB 52  ..V../.yh......R
#     0020: 24 60 A9 60 9A 4D 77 96   09 5C 81 7E A3 25 B4 F2  $`.`.Mw..\...%..
#     0030: 0E 03 88 98 8B C6 F4 53   57 66 5C FF 40 13 09 59  .......SWf\.@..Y
#     0040: 7F 90 FA BB 92 FF 8A B3   B8 AA 9A 33 6F 2C AC C1  ...........3o,..
#     0050: 6B 83 05 F9 9F 0E F5 F1   94 CE 5D E1 0F 7D 0F 2B  k.........]....+
#     0060: 49 E9 70 61 84 B2 B8 FC   1C 34 F0 B0 74 AF 0A D6  I.pa.....4..t...
#     0070: F9 91 4F FD D9 E0 20 1A   51 F7 E8 B9 46 24 3D 79  ..O... .Q...F$=y
#     0080: B4 DA EA DB 1A DC EC FC   1F E6 5B F2 30 AC 54 A2  ..........[.0.T.
#     0090: 3C 0D 62 F7 06 1E B3 87   F1 1F 61 72 6E 2D 78 BA  <.b.......arn-x.
#     00A0: 4A E6 C7 39 3B B6 AA 92   F3 B8 96 FB 47 45 0E D3  J..9;.......GE..
#     00B0: DE E1 04 C8 CC 20 2E 63   50 A2 FE DF CA 05 F9 05  ..... .cP.......
#     00C0: 4E 87 2F 46 10 20 FE CA   49 43 00 39 0D F8 51 5D  N./F. ..IC.9..Q]
#     00D0: 53 88 80 A4 B6 15 DE 3F   C6 5C 0F 81 83 CF 28 4B  S......?.\....(K
#     00E0: 98 13 C6 3F 07 01 6E FD   DB 1D 71 B0 37 B1 74 42  ...?..n...q.7.tB
#     00F0: 66 74 30 EC E4 48 25 1E   04 42 01 3C 8D 7D 88 A2  ft0..H%..B.<....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.328 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE 04 41 C7 BA E5 FB EA   7F 83 82 7F 6A 96 3B 3B  ..A.........j.;;
#     0010: 7C 82 E7 2F FD E4 80 05   71 52 28 B1 D8 91 2F E3  .../....qR(.../.
#     0020: C5 37 1B 29 17 D1 86 2E   54 51 3B 00 03 8F 0A 55  .7.)....TQ;....U
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.328 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:33.393 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D6 AD 30 1D DC 32 20 19 AF 71 9F 04 36 40 0E DE FB 5F 25 FD 12 02 9B 89 9D 49 07 22 37 90 DC FD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:01:33.707 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:01:33.708 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 10:01:45.468; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:45.798 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 37 77 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:00:59.000 UTC",
#       "not  after"         : "2024-01-17 10:00:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#           0010: E0 9B AF 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 36 AD 5B DD 3C BC 6C   08 E8 D9 E5 70 F3 36 61  .6.[.<.l....p.6a
#           0010: C9 37 40 F9                                        .7@.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A FE 73 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:00:57.000 UTC",
#       "not  after"         : "2024-01-17 10:00:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 FA D2 29 6E CE 3F 85   5C 20 7B 49 AC 2D 04 F6  ...)n.?.\ .I.-..
#           0010: E0 9B AF 06                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:01:45.813 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:45.921 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:45.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:45.922 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:01:45.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:46.053 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:46.055 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 10:01:46.055 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.061 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.073 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 10:01:46.075 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B6 33 21 4D 59 F2 F7 10 A2 80 F2 08 63 3A AA 39 BA 6A 4F AF BB BD EB 71 3D 11 09 A1 46 F9 1F 51",
#     "session id"          : "75 30 F5 6B 2E 94 9A 30 3A 6B C6 E3 83 3A C8 68 E7 FB 0F 71 A1 C2 28 B9 A1 FA 55 DC 3A 1D 22 13",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 77 EF 31 5F 06 C8 CF DC   E3 ED 10 26 FC 1F 9B 0F  w.1_.......&....
#               0010: F1 17 BA C4 AF 16 25 C8   A2 F9 7A 57 83 9B 1B 04  ......%...zW....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.097 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E4 DD 5C AA ED 9C 6C AB B6 B3 64 1E 4E 43 F2 37 EA 62 15 B5 B9 A9 76 99 3E C6 F5 DD DE 32 E4 6E",
#     "session id"          : "75 30 F5 6B 2E 94 9A 30 3A 6B C6 E3 83 3A C8 68 E7 FB 0F 71 A1 C2 28 B9 A1 FA 55 DC 3A 1D 22 13",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7E 64 AE F4 11 8C 22 60   8F 00 10 3C 62 C2 54 CA  .d...."`...<b.T.
#             0010: C3 0C 0D B7 D6 74 64 79   CE E1 E4 EC 71 2D 1E 3B  .....tdy....q-.;
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.097 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.097 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.099 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.110 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.112 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.113 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.117 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:46.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:01:46.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 10:01:46.119 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 10:03:05.898 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:03:05.933 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:03:05.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:03:05.935 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:03:05.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38764/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28591ms
ok 65 stop command for single port in 31633ms
ok 66 status detects locally running solr in 14745ms
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2222ms
ok 69 copying files around in 6653ms
ok 70 upconfig in 2705ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 29s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m51.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5707 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5707/

1 tests failed.
FAILED:  org.apache.solr.bench.DockMakerTest.testRealisticUnicode

Error Message:
java.lang.AssertionError: expected:<6> but was:<7>

Stack Trace:
java.lang.AssertionError: expected:<6> but was:<7>
	at __randomizedtesting.SeedInfo.seed([88547F3CFC43DD3F:D8B8FBEF2FF88A96]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.bench.DockMakerTest.testRealisticUnicode(DockMakerTest.java:189)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2234 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.bench.DockMakerTest.testRealisticUnicode (:solr:benchmark)
    Test output: /tmp/src/solr/solr/benchmark/build/test-results/test/outputs/OUTPUT-org.apache.solr.bench.DockMakerTest.txt
    Reproduce with: gradlew :solr:benchmark:test --tests "org.apache.solr.bench.DockMakerTest.testRealisticUnicode" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=88547F3CFC43DD3F -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:benchmark:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/benchmark/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 5m 51s
623 actionable tasks: 606 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m19.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5706 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5706/

All tests passed

Build Log:
[...truncated 1307 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40457/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 03:57:43.713; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:57:43.718; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 03:57:44.656; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 03:57:44.698; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23133ms
ok 61 start solr with client truststore and security manager in 25446ms
not ok 62 start solr with mTLS needed in 58839ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-VpO4it/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40457.
#
# Started Solr server on port 40457 (pid=200111). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40458.
#
# Started Solr server on port 40458 (pid=200567). Happy searching!
#
# INFO  - 2023-10-19 03:59:08.479; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:59:08.485; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:59:08.876; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:59:08.879; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:59:08.880; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:08.916 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 0D 9D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:44.000 UTC",
#     "not  after"         : "2024-01-17 03:58:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 D1 E9 D0 3E 9D F3 83   2D ED 55 B5 52 3E 92 AD  ....>...-.U.R>..
#         0010: 86 36 13 48                                        .6.H
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:08.921 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D BB 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:36.000 UTC",
#     "not  after"         : "2024-01-17 03:58:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:08.936 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:09.040 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:09.042 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:09.042 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:09.042 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:09.207 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.207 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:09.209 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:09.210 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.227 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:09.230 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C6 63 79 92 AC FC AA AA AD 0A 4F 4A 57 E3 24 EE ED 52 44 BA AE EA A7 A2 52 02 40 D7 50 8F 25 2D",
#   "session id"          : "E2 8F A4 EE 3D 55 D2 60 B5 5A 9F E4 EE 1B F1 48 02 40 C6 0D D2 EB 93 D6 F8 BF 37 C6 3C AB 7A 43",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F2 B0 79 C8 66 E6 B8 3D   5E D2 EA D7 21 DA 73 39  ..y.f..=^...!.s9
#             0010: BC 46 75 A0 1B 8C 65 C3   42 C3 B7 DC 06 77 4F 41  .Fu...e.B....wOA
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.350 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "88 F5 39 87 70 92 7F 3E FB 9F 87 C5 26 B4 5E 17 D0 80 C7 C5 66 40 A4 D8 FC E6 21 1F 8B 39 A0 9B",
#   "session id"          : "E2 8F A4 EE 3D 55 D2 60 B5 5A 9F E4 EE 1B F1 48 02 40 C6 0D D2 EB 93 D6 F8 BF 37 C6 3C AB 7A 43",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F5 DA 1A A0 84 0D E6 AB   62 1D F4 AB AA 09 77 89  ........b.....w.
#           0010: FF F2 2B 67 2B C1 51 B7   B2 11 52 2D 70 C5 77 18  ..+g+.Q...R-p.w.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.350 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.351 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.352 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.353 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.353 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.353 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.355 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.356 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.356 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.365 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.367 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.368 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.372 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.372 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.375 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.376 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.376 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.377 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.378 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.379 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.383 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 F6 66 AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:40.000 UTC",
#       "not  after"         : "2024-01-17 03:58:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 75 E7 3E 30 7C 3D 92   DF EB C2 C4 51 78 59 93  ru.>0.=.....QxY.
#           0010: 8F 18 C4 44                                        ...D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.471 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.475 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 63 CE E3 83 77 4B F0   03 CF B3 C7 C3 F3 AF 97  .c...wK.........
#     0010: E8 22 46 24 70 34 F0 3A   C1 A1 F8 29 3D 64 E9 7E  ."F$p4.:...)=d..
#     0020: A5 E9 E0 A8 59 2C 68 60   01 2C 46 B7 4E 86 C2 57  ....Y,h`.,F.N..W
#     0030: 72 2E B3 65 10 8B 2F 86   24 B8 6E 7F 36 71 3C 87  r..e../.$.n.6q<.
#     0040: 2D D2 9E 3D AA 37 A9 75   A3 23 70 C8 56 33 69 FD  -..=.7.u.#p.V3i.
#     0050: CA C7 13 05 1C C9 03 93   C8 FD 07 03 F1 D2 08 16  ................
#     0060: A5 95 72 AF AD 57 19 7C   0C 72 DF C2 A3 86 E3 88  ..r..W...r......
#     0070: 03 77 AA F8 9C 1D D6 54   CF E1 AC 7B 1F 5E 0D C9  .w.....T.....^..
#     0080: 57 BD 28 C9 E8 C5 89 55   32 6C AE 87 62 11 5F 59  W.(....U2l..b._Y
#     0090: F4 50 A1 BF DF 76 2F 1A   7C 85 86 1E 75 17 5B D6  .P...v/.....u.[.
#     00A0: E9 2A 95 A8 80 46 2B 89   11 5A 89 D2 9B 3E DA 71  .*...F+..Z...>.q
#     00B0: 65 62 01 B3 F5 88 2C F6   44 BF C5 BB 7A E5 B5 D9  eb....,.D...z...
#     00C0: CE 59 E3 63 5A 0C DF 62   61 68 77 C9 40 F5 80 C3  .Y.cZ..bahw.@...
#     00D0: E3 6E 3C 84 82 A8 BC 80   77 89 47 30 E3 3E F8 AA  .n<.....w.G0.>..
#     00E0: AC 73 6E 9F D4 FE 52 BD   1F 2B 55 64 50 89 2E D0  .sn...R..+UdP...
#     00F0: F0 68 C0 44 45 7A D3 67   9B 97 79 6B 21 2C A8 B4  .h.DEz.g..yk!,..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.476 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6D 8F D1 07 6C 58 63 C1   33 1D 85 7B A4 C1 35 72  m...lXc.3.....5r
#     0010: A4 BF 14 EE DC 33 FC B7   FC 3A 77 51 AD 60 CE 12  .....3...:wQ.`..
#     0020: DE 68 10 7C 26 BD A1 8A   9C 6A F8 1B 00 25 39 5D  .h..&....j...%9]
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.479 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:09.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.480 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:09.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:09.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:09.482 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.482 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.486 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 0D 9D AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:44.000 UTC",
#       "not  after"         : "2024-01-17 03:58:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 D1 E9 D0 3E 9D F3 83   2D ED 55 B5 52 3E 92 AD  ....>...-.U.R>..
#           0010: 86 36 13 48                                        .6.H
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 87 99 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:38.000 UTC",
#       "not  after"         : "2024-01-17 03:58:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#           0010: F7 BE 7E 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.513 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 98 18 8B B5 7F 81 17   DE 81 6E 16 13 B9 52 1F  x.........n...R.
#     0010: B6 64 32 FA ED BB F3 33   F5 BB B6 1A B9 40 24 DB  .d2....3.....@$.
#     0020: 08 52 98 57 5F 2B 5C D8   31 F4 CA 98 8E 31 49 29  .R.W_+\.1....1I)
#     0030: 2A 25 0E 64 20 59 F3 35   B9 2B 23 5A 45 EE C6 24  *%.d Y.5.+#ZE..$
#     0040: D9 EC FE 45 0D 64 B9 2F   B0 2E AC 72 1F 74 3E CB  ...E.d./...r.t>.
#     0050: 9C CD 59 E3 D3 8B EB AF   76 F1 C5 B6 17 B5 C9 EA  ..Y.....v.......
#     0060: 8E 52 49 E8 14 D2 89 AD   7F FC B2 98 8D EC 81 33  .RI............3
#     0070: E6 83 7B 25 C0 0E 2C 0D   25 C3 59 B9 A6 FE FB 92  ...%..,.%.Y.....
#     0080: D1 1C DE 2B 93 25 A7 86   3E 15 C6 E0 B2 F1 AA D9  ...+.%..>.......
#     0090: 5E CC FE AA 6E 24 89 81   64 6C 5B D5 C8 14 AD 4A  ^...n$..dl[....J
#     00A0: 69 50 C5 63 76 D5 04 5B   1D 5A E9 D8 89 26 54 62  iP.cv..[.Z...&Tb
#     00B0: EF 97 37 BD CA F1 91 32   29 1F 3F 1B 02 CC 27 74  ..7....2).?...'t
#     00C0: 7E CE 1D 06 A3 31 2A BC   3B DE 44 C9 9E B8 F0 7B  .....1*.;.D.....
#     00D0: B1 15 CC 30 15 97 01 AC   90 3D 0A 64 1C 33 2E 2C  ...0.....=.d.3.,
#     00E0: 8B C0 9B 68 CA FB 46 CD   D3 E9 20 2E F1 A2 3A EF  ...h..F... ...:.
#     00F0: 21 83 93 63 33 49 31 8C   40 40 97 0E 29 87 39 81  !..c3I1.@@..).9.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.514 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 4A 9D 68 37 D1 0E A3   05 C2 52 82 24 CB 55 4D  .J.h7.....R.$.UM
#     0010: 95 3D 8B 38 09 9D 61 C1   48 A2 6A 07 A2 7A 20 8E  .=.8..a.H.j..z .
#     0020: 68 EB 95 8E 86 3F A4 4E   70 23 4D BD C1 CB FC 0B  h....?.Np#M.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.514 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:09.575 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "03 B9 13 D2 1D 64 0D 88 4B A9 8C 91 CE 9B 11 A6 6C 74 54 5E 4A 69 1D BD 9B 0F A6 99 BC 25 D5 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 03:59:09.938 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 03:59:09.939 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 03:59:10.878; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 03:59:10.884; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 03:59:11.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:59:11.259; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 03:59:11.260; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VpO4it/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:11.291 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 0D 9D AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:44.000 UTC",
#     "not  after"         : "2024-01-17 03:58:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 D1 E9 D0 3E 9D F3 83   2D ED 55 B5 52 3E 92 AD  ....>...-.U.R>..
#         0010: 86 36 13 48                                        .6.H
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:11.295 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D BB 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:36.000 UTC",
#     "not  after"         : "2024-01-17 03:58:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:11.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:11.400 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:11.400 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:11.401 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 03:59:11.401 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:11.535 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:11.537 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:11.538 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.543 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.555 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.555 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:11.557 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 13 D2 27 77 BC 57 54 31 D4 47 8E 4E 08 D1 F0 05 60 DA 53 45 35 A9 B4 C9 34 A5 40 76 4C 8A 07",
#   "session id"          : "F1 60 D9 C9 53 11 40 EC 16 49 40 6E 1B BF 32 88 BB F8 A2 A9 8F BC F3 64 60 3E 25 6C 90 17 25 59",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BC A2 A3 E0 1C FB 8D C5   71 EC 47 5E 62 51 C5 A5  ........q.G^bQ..
#             0010: 90 83 C6 DB C8 EE A7 1F   57 D9 C5 8B A6 B9 0C 4A  ........W......J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.676 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EF F5 EC 64 8D 83 77 3C A2 19 6D BB 53 BA 9D C6 BF 0B 5F B6 77 B2 37 85 2C 70 5A F3 58 AF 1F 36",
#   "session id"          : "F1 60 D9 C9 53 11 40 EC 16 49 40 6E 1B BF 32 88 BB F8 A2 A9 8F BC F3 64 60 3E 25 6C 90 17 25 59",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1D 21 AD A8 7A 80 FC 8E   FD 06 E2 8B C6 DA 1F 5D  .!..z..........]
#           0010: 2F DD 4A 7C 1D 1D 02 63   BB D3 0A 48 20 65 EE 00  /.J....c...H e..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.677 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.680 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.682 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.682 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.683 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.685 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.685 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.685 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.693 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.694 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.695 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.699 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.699 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.700 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.702 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.703 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.703 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.703 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.704 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.705 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.705 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.709 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 F6 66 AC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:40.000 UTC",
#       "not  after"         : "2024-01-17 03:58:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 75 E7 3E 30 7C 3D 92   DF EB C2 C4 51 78 59 93  ru.>0.=.....QxY.
#           0010: 8F 18 C4 44                                        ...D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.709 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.796 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 87 99 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 03:58:38.000 UTC",
#     "not  after"         : "2024-01-17 03:58:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#         0010: F7 BE 7E 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#         0010: 4F 64 74 BF                                        Odt.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.800 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 B2 20 C0 07 D4 4D 7A   76 AA 94 CE 79 A1 63 EE  e. ...Mzv...y.c.
#     0010: 45 DF 72 03 6A 60 0B DB   E2 14 DD F4 0A 69 CF 5B  E.r.j`.......i.[
#     0020: 3E 60 22 A7 93 03 63 91   CE 2A 7F 7A 39 22 86 8A  >`"...c..*.z9"..
#     0030: 05 60 6D 37 9C 12 A9 D5   7B 71 BA DB A7 93 D3 33  .`m7.....q.....3
#     0040: 0F B5 20 32 8D 04 CB 17   A9 7C 2C D4 FE 80 F8 DE  .. 2......,.....
#     0050: 9A 5B FC 1B 95 38 12 C6   C7 7C A2 4D 14 08 46 43  .[...8.....M..FC
#     0060: 45 E8 BD AE FC CB 59 89   FA 71 6E E3 BA 11 39 70  E.....Y..qn...9p
#     0070: 86 98 C9 A1 AF 34 F3 21   91 01 70 37 3C 5B F3 F6  .....4.!..p7<[..
#     0080: 98 0B 78 8B 35 59 D0 1D   58 1B DB ED 2A 3B 90 4F  ..x.5Y..X...*;.O
#     0090: AC 74 5D A7 53 04 8F 25   6B 3A 8F 25 C7 AB 89 AD  .t].S..%k:.%....
#     00A0: D7 E1 81 89 D0 EC EF B9   D8 61 DB A5 7E EA 3C 44  .........a....<D
#     00B0: 6C AA CD DA 3A B1 B4 F7   3B DA 30 C3 28 9C 28 D1  l...:...;.0.(.(.
#     00C0: 1B B0 EA 4C 7A EA 00 5B   9C FA 3D 63 5D 05 53 35  ...Lz..[..=c].S5
#     00D0: C6 E4 5B 8F 0E C7 8E 83   27 43 3B C5 7E F0 EB 8A  ..[.....'C;.....
#     00E0: AD 8F 8D D3 5C F0 0F CA   64 E5 0F 9C CA 78 3C 88  ....\...d....x<.
#     00F0: 1E 70 C2 33 62 50 8C DB   17 EE CA 4B 2B CE B4 8F  .p.3bP.....K+...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.801 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 4B 96 AC 0F B4 D4 E3   04 C2 10 20 34 68 42 0A  wK......... 4hB.
#     0010: 95 AE FE 27 0F 27 DB 8D   73 AA A6 A9 B7 B0 C3 76  ...'.'..s......v
#     0020: 5E 32 FB 3E A9 88 6D 60   C4 93 2D B7 F2 A1 26 27  ^2.>..m`..-...&'
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.804 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:11.805 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.805 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:11.806 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.806 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 03:59:11.806 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:11.807 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.807 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.810 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 0D 9D AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:44.000 UTC",
#       "not  after"         : "2024-01-17 03:58:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 D1 E9 D0 3E 9D F3 83   2D ED 55 B5 52 3E 92 AD  ....>...-.U.R>..
#           0010: 86 36 13 48                                        .6.H
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 87 99 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:38.000 UTC",
#       "not  after"         : "2024-01-17 03:58:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#           0010: F7 BE 7E 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.838 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 59 EB 68 87 AF E1 96 A2   48 24 4C BA EE 1D 83 B1  Y.h.....H$L.....
#     0010: 4D BA F1 EE 9D 64 8C C0   FE 3D 09 D3 04 77 92 66  M....d...=...w.f
#     0020: 37 B5 3A C9 92 9F E2 1B   94 44 C2 07 C2 23 F4 C0  7.:......D...#..
#     0030: AD FF D7 64 FC 5C 79 1E   A8 9F AD CF 21 BE FB 0E  ...d.\y.....!...
#     0040: 66 F3 6C 93 97 55 D1 7D   90 14 26 B7 18 AF 5B F2  f.l..U....&...[.
#     0050: E3 55 31 D2 D0 7F C2 8D   ED CC 17 47 1F 07 77 DD  .U1........G..w.
#     0060: 5E BB B4 8E 70 B2 78 FE   EC 19 AE B0 59 FD 08 7E  ^...p.x.....Y...
#     0070: 02 B8 A0 14 5C 39 91 94   60 CC 5D C8 30 85 7C A4  ....\9..`.].0...
#     0080: 62 EE 3C 83 6D 35 72 C7   23 95 DC 77 B0 9C 72 F3  b.<.m5r.#..w..r.
#     0090: 03 7F 3C C8 BD 79 CE CB   9A D0 3B 0B 8C 24 01 CA  ..<..y....;..$..
#     00A0: D9 17 CA 4E 3E 74 6D 67   D2 5E A1 E1 C2 CF C2 9C  ...N>tmg.^......
#     00B0: 3F CC 0A 54 1C BA E8 02   2B F2 D6 1A C1 44 71 5A  ?..T....+....DqZ
#     00C0: F3 CD 44 D9 6A 75 50 E1   7A 5B 1E 14 36 9A BA FD  ..D.juP.z[..6...
#     00D0: 28 3A AA 3D CC 0B E9 57   56 2E 0E A3 71 67 CC 2C  (:.=...WV...qg.,
#     00E0: 11 23 8A 9C 0D FA 93 81   8F E4 19 45 EF 2F 9D D1  .#.........E./..
#     00F0: DD 13 41 FD 24 24 B8 A4   6C CA 0B 5C 92 D2 12 8F  ..A.$$..l..\....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.839 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 6C 38 ED C0 B6 A8 9F   28 72 E4 9C 1B A4 30 BC  9l8.....(r....0.
#     0010: 97 D9 C6 2B F2 F0 65 D7   C2 99 E7 8B 65 1D 5E 00  ...+..e.....e.^.
#     0020: 27 C2 51 DC 3B 4A CC 09   EE BB 95 A8 F0 4A B4 BF  '.Q.;J.......J..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.840 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:11.899 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 DC E7 2C BE BF 1A 2C C5 9E 3B B7 75 9F 82 AC B0 A0 F9 36 4A BA 4C 3B FE E4 BD 7B B9 17 78 A4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 03:59:12.163 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 03:59:12.164 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 03:59:23.269; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:23.611 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 87 99 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:38.000 UTC",
#       "not  after"         : "2024-01-17 03:58:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#           0010: F7 BE 7E 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E 41 EF 4B 5C F9 B2 FD   6E EE 19 89 C0 B2 D4 3A  .A.K\...n......:
#           0010: 4F 64 74 BF                                        Odt.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D BB 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 03:58:36.000 UTC",
#       "not  after"         : "2024-01-17 03:58:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F7 5E 2C 15 B0 19 34 DE   66 04 F6 FD EC ED 45 3B  .^,...4.f.....E;
#           0010: F7 BE 7E 56                                        ...V
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 03:59:23.626 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:23.864 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.865 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:23.866 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 03:59:23.867 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.883 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.884 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.884 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 03:59:23.886 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "EF 3C B5 2E 09 03 47 07 68 84 8F 9A 1D 43 A3 BE D4 D5 FD 4A 0B 4D 90 D6 EC AD A7 38 97 17 B0 44",
#     "session id"          : "07 86 83 50 D4 E7 32 CF 49 07 57 DE FD 86 D7 E6 D5 82 55 F5 47 6A E1 0F A0 2F 84 E1 7A 2D 21 7A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 12 A6 17 B1 70 FD C6 3A   7C 29 B2 4B 38 60 8E EC  ....p..:.).K8`..
#               0010: 47 52 A0 DB 06 16 A7 5B   C7 D4 32 DC 0D 41 5D 75  GR.....[..2..A]u
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.911 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "63 B3 39 CA C2 E1 12 C8 B6 35 CF 4A F0 31 7B F0 5A EC CF AC 82 C7 47 ED 87 1F 7C ED B0 8C 88 CC",
#     "session id"          : "07 86 83 50 D4 E7 32 CF 49 07 57 DE FD 86 D7 E6 D5 82 55 F5 47 6A E1 0F A0 2F 84 E1 7A 2D 21 7A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD 8A DF 2E 30 27 B5 A7   8C 8A CB A3 F5 9C 8B 44  ....0'.........D
#             0010: 39 14 15 44 86 7E 6D 06   89 82 9F 36 C6 0D 70 3A  9..D..m....6..p:
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.911 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.911 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.912 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.915 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.915 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.916 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:23.917 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:23.917 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.924 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.926 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.927 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.930 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 03:59:23.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 03:59:23.933 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_a

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 04:00:45.638 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:00:45.678 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:00:45.678 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:00:45.678 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:00:45.678 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40458/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28465ms
ok 65 stop command for single port in 31235ms
ok 66 status detects locally running solr in 14431ms
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2205ms
ok 69 copying files around in 6721ms
ok 70 upconfig in 2677ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1206ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 43s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m6s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5705 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5705/

All tests passed

Build Log:
[...truncated 1309 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43405/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-19 01:08:03.770; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 01:08:03.775; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-19 01:08:04.672; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 01:08:04.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22866ms
ok 61 start solr with client truststore and security manager in 25366ms
not ok 62 start solr with mTLS needed in 61019ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-dviig3/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43405.
#
# Started Solr server on port 43405 (pid=201826). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43406.
#
# Started Solr server on port 43406 (pid=202277). Happy searching!
#
# INFO  - 2023-10-19 01:09:27.978; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 01:09:27.984; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 01:09:28.362; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 01:09:28.364; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 01:09:28.365; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:28.397 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 06 47 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:09:04.000 UTC",
#     "not  after"         : "2024-01-17 01:09:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 02 66 FF A4 22 B7 C3 2A   94 71 B9 5D 99 E5 20 B9  .f.."..*.q.].. .
#         0010: 5A BD 69 4B                                        Z.iK
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:28.401 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 3C 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:56.000 UTC",
#     "not  after"         : "2024-01-17 01:08:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:28.415 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:28.504 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:28.505 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:28.505 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:28.505 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:28.645 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:28.647 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:28.648 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.653 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.664 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.665 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.665 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:28.667 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D8 35 17 D5 D3 CD C1 C0 01 27 28 7C 27 DB 0A B1 1B 9A D9 29 50 A2 4C BC 40 45 04 AF D9 CC 60 D1",
#   "session id"          : "B3 0E 96 D2 08 4B F7 98 D5 F8 32 51 F1 40 C1 9E C9 B3 78 E4 7C 3B 54 0C 32 F4 FD E6 9E BD 85 FD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2B 41 0B 3A 3D 57 BB E9   7B D7 9F DD 9A 4C DF E0  +A.:=W.......L..
#             0010: 70 7D DA 3A 6C AD 74 DB   60 13 B0 08 42 24 70 2D  p..:l.t.`...B$p-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.783 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "60 24 81 FA E8 F5 50 E6 38 55 6E 41 EF 27 0A 22 A1 60 86 36 57 3B 88 7A D1 59 19 81 FD 15 A0 41",
#   "session id"          : "B3 0E 96 D2 08 4B F7 98 D5 F8 32 51 F1 40 C1 9E C9 B3 78 E4 7C 3B 54 0C 32 F4 FD E6 9E BD 85 FD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D2 B2 5C C0 B4 81 AA 14   EB BE D2 09 49 AE F8 76  ..\.........I..v
#           0010: 8D BB B1 8F DB 0D 05 0F   05 79 26 DF 5C 3E 88 5A  .........y&.\>.Z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.783 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.783 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.786 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.786 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.789 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.789 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.789 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.789 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.790 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.798 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.800 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.801 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.805 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.805 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.805 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.805 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.806 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.808 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.808 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.808 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.809 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.809 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.810 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.813 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 43 E7 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:09:00.000 UTC",
#       "not  after"         : "2024-01-17 01:09:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 5A 1D 82 A4 DE E5 72   D2 B3 30 92 B5 B8 7A E3  .Z.....r..0...z.
#           0010: 91 89 A6 E3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.813 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.890 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.894 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A EE A9 26 25 AD 4C 3A   A0 0D 70 DB 88 D6 62 81  j..&%.L:..p...b.
#     0010: A7 7A 1B F4 0D B4 ED 92   97 B1 95 7E D9 0F F3 48  .z.............H
#     0020: 83 92 18 83 03 74 35 2A   E3 FE F8 CB E6 2F 62 B3  .....t5*...../b.
#     0030: C8 5D 02 6D 56 3D 35 40   9D 0B B0 69 02 DC 95 98  .].mV=5@...i....
#     0040: A8 5F B2 3D 98 D9 6D 1D   D6 45 E3 E0 C0 BE B9 85  ._.=..m..E......
#     0050: A5 04 18 A0 AB 29 E1 B2   91 DB 05 D6 BE AB 25 F0  .....)........%.
#     0060: E2 73 2D 43 79 2C E1 F1   8C A8 46 D4 A4 64 63 35  .s-Cy,....F..dc5
#     0070: 5F 2C 69 85 A6 6F 9F 78   31 6C D2 08 EA 29 86 CF  _,i..o.x1l...)..
#     0080: 6E 7C E8 A6 7C 55 FF 30   7F 09 9E 76 8F 29 A5 2E  n....U.0...v.)..
#     0090: A1 21 91 F1 B4 BF 07 27   3B 4E D5 DA CF 2B 56 03  .!.....';N...+V.
#     00A0: 80 48 C9 7D 22 85 3E 6F   18 C8 E2 8B 12 EC 37 E8  .H..".>o......7.
#     00B0: 3D EA BF B5 39 34 BF F9   AD 08 74 EC F6 17 7D 2E  =...94....t.....
#     00C0: 76 62 54 00 5C 64 DA 3E   09 F1 7F DC D6 F8 15 D6  vbT.\d.>........
#     00D0: 7F B6 0F CE E8 E9 21 13   E6 A0 12 71 78 D6 26 FC  ......!....qx.&.
#     00E0: 70 8F 95 49 AD 82 88 8C   1E 06 B3 63 8C 67 D0 A2  p..I.......c.g..
#     00F0: 0A 55 41 EE 58 B4 C2 33   F4 14 D3 2A 48 AD 6A A7  .UA.X..3...*H.j.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.896 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC 70 62 BA 1A 3C 81 A7   FA 29 4C F6 2A 23 67 D9  .pb..<...)L.*#g.
#     0010: B5 3C 6D AB 99 6E 6F 18   8E EB C5 9D 60 1B 93 DB  .<m..no.....`...
#     0020: 9C E5 B5 EC 6D 13 60 93   E1 D2 3F C8 4C 98 C4 9F  ....m.`...?.L...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.898 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:28.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:28.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:28.900 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:28.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.900 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.903 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 06 47 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:09:04.000 UTC",
#       "not  after"         : "2024-01-17 01:09:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 02 66 FF A4 22 B7 C3 2A   94 71 B9 5D 99 E5 20 B9  .f.."..*.q.].. .
#           0010: 5A BD 69 4B                                        Z.iK
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 07 7D 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:08:58.000 UTC",
#       "not  after"         : "2024-01-17 01:08:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#           0010: 7A C9 5C 2E                                        z.\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.928 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 98 A8 B4 1C 89 18 DD   47 CE 79 EC E4 BB DD F8  ).......G.y.....
#     0010: 8F D0 AB F7 45 F4 1D 01   CE 96 53 F3 27 DA 63 0C  ....E.....S.'.c.
#     0020: F8 64 1E 11 1F 64 35 FD   29 8A 04 7E 73 C0 D5 72  .d...d5.)...s..r
#     0030: 49 0D 4F 22 2E 04 2E FF   50 CE FF B9 A8 69 2D 4D  I.O"....P....i-M
#     0040: 7F EB 5A 60 50 5B 43 D2   C2 54 42 BB 39 86 11 5E  ..Z`P[C..TB.9..^
#     0050: 5F 3C 5E 4B 97 3E BA C5   06 2F 3C 50 8B 61 56 49  _<^K.>.../<P.aVI
#     0060: 40 27 D1 71 41 FF 71 0D   49 56 1B 17 A9 59 76 48  @'.qA.q.IV...YvH
#     0070: 69 7A BE 71 CB 04 0F 26   CD 73 9B 4C 2C 03 B8 69  iz.q...&.s.L,..i
#     0080: 39 29 85 76 FE 9D C6 09   73 EE 5C 9B 29 CB E3 BF  9).v....s.\.)...
#     0090: 3B C2 81 19 78 50 71 74   7B 64 B6 FE 16 1C B5 03  ;...xPqt.d......
#     00A0: E0 5C 18 AA 43 2B 4C BE   05 68 40 1F 56 37 95 B0  .\..C+L..h@.V7..
#     00B0: 91 08 A1 04 8E E7 4F FD   BA C0 10 66 D3 A4 4E AA  ......O....f..N.
#     00C0: 18 53 0B A3 AE 5A 7E 1F   5A C8 76 35 57 D0 6B C6  .S...Z..Z.v5W.k.
#     00D0: 31 8C 58 1B 94 4B B7 8B   E7 2D 88 C2 C3 E9 6C 6C  1.X..K...-....ll
#     00E0: 79 12 C0 14 3D B7 D0 8C   EF A7 E1 F6 1C 55 1C F1  y...=........U..
#     00F0: CA C6 F2 A5 16 0F 68 5D   62 FC 24 C4 D0 B5 4D DC  ......h]b.$...M.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.930 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AA 36 26 8B 6A 13 09 50   B2 58 C4 22 82 70 53 26  .6&.j..P.X.".pS&
#     0010: 51 C5 33 74 AD FF 34 58   77 38 D5 41 B0 5C 8A 2D  Q.3t..4Xw8.A.\.-
#     0020: FA F9 1F E1 C3 4E E2 56   B8 43 E7 A0 52 46 1F C3  .....N.V.C..RF..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.930 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:28.987 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "03 FE 09 14 4D CB 42 C0 A7 BF D6 CA D1 F1 F5 88 DA E9 5F 1B B5 F8 40 19 C0 95 90 BD D7 D9 B8 4E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 01:09:29.263 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 01:09:29.265 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 01:09:30.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 01:09:30.210; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 01:09:30.583; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 01:09:30.587; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 01:09:30.587; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dviig3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:30.623 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 06 47 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:09:04.000 UTC",
#     "not  after"         : "2024-01-17 01:09:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 02 66 FF A4 22 B7 C3 2A   94 71 B9 5D 99 E5 20 B9  .f.."..*.q.].. .
#         0010: 5A BD 69 4B                                        Z.iK
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:30.629 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 3C 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:56.000 UTC",
#     "not  after"         : "2024-01-17 01:08:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:30.645 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:30.940 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.941 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:30.943 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:30.943 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.950 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.963 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.963 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.963 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:30.966 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "93 6B 1E E3 FB D7 74 48 44 31 3A 76 F0 59 39 8B 51 93 4D E3 A0 B0 BB A0 43 33 04 A1 FE D4 9B D4",
#   "session id"          : "31 49 7C D1 6E 37 FF 36 45 6E BB 60 CB 20 A5 B7 DE 4E 67 C2 C3 61 72 2B 67 A4 50 A3 5A 72 57 5A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0D 77 1C 31 91 9C 2A 0B   7F 64 28 85 AC 5C EE 6C  .w.1..*..d(..\.l
#             0010: 2E A3 16 5D AA ED DA 79   E3 88 92 EF 59 0D CD 57  ...]...y....Y..W
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.075 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "04 99 32 6A 67 6C 80 33 32 83 1B 25 E4 7B 85 2F 54 16 3B 46 BD 2A 33 1E 03 07 12 E7 6C AE F6 4C",
#   "session id"          : "31 49 7C D1 6E 37 FF 36 45 6E BB 60 CB 20 A5 B7 DE 4E 67 C2 C3 61 72 2B 67 A4 50 A3 5A 72 57 5A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B1 54 44 4F D2 F0 3E 7C   BA E8 43 4E D1 30 5A 38  .TDO..>...CN.0Z8
#           0010: BA 3C D1 CD 60 44 27 5F   29 C0 3A 2D C6 55 5E 57  .<..`D'_).:-.U^W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.076 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.076 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.078 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.081 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.082 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.092 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.093 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.095 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.098 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.099 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.099 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.099 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.099 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.102 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.102 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.103 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.103 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.104 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.105 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.106 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.109 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 43 E7 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:09:00.000 UTC",
#       "not  after"         : "2024-01-17 01:09:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 5A 1D 82 A4 DE E5 72   D2 B3 30 92 B5 B8 7A E3  .Z.....r..0...z.
#           0010: 91 89 A6 E3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.110 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:31.158 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:31.158 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:31.159 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:31.159 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.202 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 07 7D 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 01:08:58.000 UTC",
#     "not  after"         : "2024-01-17 01:08:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#         0010: 7A C9 5C 2E                                        z.\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#         0010: 0B C7 E8 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 2F BE BB 2C 7A DF C0   6A 2D 7D 3E 2E 91 F4 83  */..,z..j-.>....
#     0010: C7 09 6E CC 4D F7 04 A8   97 5F 55 81 BA 9B 0F 23  ..n.M...._U....#
#     0020: 0F EA 6D 6F 29 70 DB B3   F2 83 66 12 3C 69 D9 8E  ..mo)p....f.<i..
#     0030: F6 63 F2 87 8B 6A 57 2C   37 06 74 73 0D 34 20 30  .c...jW,7.ts.4 0
#     0040: 48 D2 BC 9B 4B A6 8C F5   A8 E1 4D 73 6D C4 C4 B3  H...K.....Msm...
#     0050: 8E 88 02 4D 96 09 82 9F   D6 57 0F 21 FC 8F 84 24  ...M.....W.!...$
#     0060: D4 0E 87 E6 B0 1A 0B 3C   F0 58 25 32 A9 74 95 96  .......<.X%2.t..
#     0070: 20 94 4C 9D 15 F8 A0 61   B2 61 33 EB 4B 79 A8 A6   .L....a.a3.Ky..
#     0080: F5 AE 5B 09 A1 58 E1 CF   61 1E B6 70 BA D3 C6 16  ..[..X..a..p....
#     0090: B9 9F 22 0F 96 64 57 D2   46 AD AC 7D 19 E9 53 36  .."..dW.F.....S6
#     00A0: C9 63 26 43 40 AA 91 B8   67 F0 D6 43 AF E8 C4 57  .c&C@...g..C...W
#     00B0: 8E 30 54 E1 0A BA E9 62   1C F5 E8 5C AB E7 90 3B  .0T....b...\...;
#     00C0: D9 9C 00 55 71 EB 75 F7   A1 2A 33 B6 6C B1 07 BC  ...Uq.u..*3.l...
#     00D0: 7F 7D 79 DF 08 E0 C1 87   CB 26 80 A0 70 33 DA 77  ..y......&..p3.w
#     00E0: 6A FB 5D 86 1D 6D B6 0E   4C AC A9 AA 6D ED CA 50  j.]..m..L...m..P
#     00F0: 40 70 0E DE F7 DA E9 16   2D 01 25 DE 53 0F 06 8E  @p......-.%.S...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.207 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 69 DE E5 AC 42 B2 B3 F2   CD 3A 55 DC B9 7A 40 F3  i...B....:U..z@.
#     0010: 88 7F F2 1A 59 83 1A 56   32 6A AC CC FC 95 F2 30  ....Y..V2j.....0
#     0020: 72 AA A3 8F FF 47 EF 12   37 DB 39 CF F4 8A C7 96  r....G..7.9.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.210 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:31.211 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.211 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:31.211 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.211 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-19 01:09:31.211 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:31.212 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.212 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.215 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 06 47 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:09:04.000 UTC",
#       "not  after"         : "2024-01-17 01:09:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 02 66 FF A4 22 B7 C3 2A   94 71 B9 5D 99 E5 20 B9  .f.."..*.q.].. .
#           0010: 5A BD 69 4B                                        Z.iK
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 07 7D 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:08:58.000 UTC",
#       "not  after"         : "2024-01-17 01:08:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#           0010: 7A C9 5C 2E                                        z.\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.241 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 91 A5 6D 78 A7 48 3F   EE 6E DA F7 F9 89 D5 41  ...mx.H?.n.....A
#     0010: 69 F3 9A 91 1D 00 DC B2   C9 99 D1 1C 82 FE 33 87  i.............3.
#     0020: E1 78 2A 86 09 45 C7 54   F4 9C 97 52 1C 36 74 88  .x*..E.T...R.6t.
#     0030: 29 B1 6E 44 38 68 AA DD   D2 81 3C 60 5C C0 E2 48  ).nD8h....<`\..H
#     0040: 1B 27 2D 26 47 98 88 4C   48 8D F3 89 EF 00 52 1D  .'-&G..LH.....R.
#     0050: F0 E3 24 98 34 E6 75 A7   D1 F5 BB 6D 6F 82 82 31  ..$.4.u....mo..1
#     0060: 08 06 6A 1C EE 04 0B 71   D8 07 89 B8 AD 15 87 E7  ..j....q........
#     0070: 40 92 25 AD 4F 42 55 86   8F 8F 72 1C 5D 77 93 51  @.%.OBU...r.]w.Q
#     0080: 6B 29 69 13 23 1B 55 FF   29 5A FA B9 8D 39 9E 3B  k)i.#.U.)Z...9.;
#     0090: 79 32 7C EF DC 88 C7 DD   AA 93 61 4D 04 D5 5C 91  y2........aM..\.
#     00A0: E2 57 E4 8C D6 5B 80 EE   0B 80 F6 76 87 8C 4A D7  .W...[.....v..J.
#     00B0: 94 40 04 3B 5B 69 3D 7D   D1 84 43 EE 07 25 37 26  .@.;[i=...C..%7&
#     00C0: 36 B2 5D C3 5E F2 B9 A2   DF F3 D8 D2 80 0A E9 D1  6.].^...........
#     00D0: FD C0 8B 4E 72 D2 4A 92   58 41 D1 D4 9E 72 26 F0  ...Nr.J.XA...r&.
#     00E0: EB F0 21 F3 60 CF 20 4D   B9 82 7D 3D 53 30 ED 9F  ..!.`. M...=S0..
#     00F0: 0A 52 CC 74 F7 25 52 49   3A 00 61 A6 DE FD 66 C1  .R.t.%RI:.a...f.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.243 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF 28 4E 32 B3 1D 46 74   B0 4B DA FE EE DA 38 1C  .(N2..Ft.K....8.
#     0010: 35 59 CC FF 81 16 56 43   A0 64 00 DE 86 E4 00 2C  5Y....VC.d.....,
#     0020: 97 EB 81 4A DA 50 E1 4D   82 45 6C 36 86 89 54 79  ...J.P.M.El6..Ty
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:31.308 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CF D3 76 B2 0A 87 01 2A F4 9B 2C 4D 6D DC 11 DF DD 5E A2 0C 6A BB 22 34 58 53 97 B6 E6 A5 06 4F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 01:09:31.637 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 01:09:31.640 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 01:09:42.512; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:42.870 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 07 7D 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:08:58.000 UTC",
#       "not  after"         : "2024-01-17 01:08:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#           0010: 7A C9 5C 2E                                        z.\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 B5 8B 8F E5 F7 35 AE   4D D6 9A 1B 67 8B F1 EE  ......5.M...g...
#           0010: 0B C7 E8 6A                                        ...j
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 26 3C 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 01:08:56.000 UTC",
#       "not  after"         : "2024-01-17 01:08:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 04 62 4C 54 8B E3 DD   3B BC 88 FA 4A 66 13 A3  ..bLT...;...Jf..
#           0010: 7A C9 5C 2E                                        z.\.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 01:09:42.887 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:43.241 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:43.241 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:43.242 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:09:43.242 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:43.382 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.382 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:43.384 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-19 01:09:43.384 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.391 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.403 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.403 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-19 01:09:43.407 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "4F 25 BD E0 1C 65 1B 6A 7E 26 3F C6 B3 7F CA CB A3 D8 CA EE B6 6C E8 6D 32 4E F8 55 66 7C FA 65",
#     "session id"          : "EC E7 FF 61 32 85 78 39 AD 05 4B 1D DF 0C A3 AA 19 18 42 E0 49 70 E3 BD 8E AA 15 F7 83 2B 55 6E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 94 8F F3 7B F9 11 CB 6C   6E F0 61 40 CA 4E B0 CC  .......ln.a@.N..
#               0010: E0 BC 6D FA 7E C6 CB 6D   B1 F1 66 1D A1 DF 2F 42  ..m....m..f.../B
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.428 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3B 13 83 68 82 69 FC 74 76 E5 8A D5 47 43 D2 D7 40 08 CC 72 CB B7 4A CB 30 BB D7 4D E3 14 9D 87",
#     "session id"          : "EC E7 FF 61 32 85 78 39 AD 05 4B 1D DF 0C A3 AA 19 18 42 E0 49 70 E3 BD 8E AA 15 F7 83 2B 55 6E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 96 6F 20 51 55 4E EB AB   58 8B D2 93 98 21 A9 8C  .o QUN..X....!..
#             0010: D2 9F F3 B1 6F 68 49 D0   05 50 7C 4E EF 61 14 14  ....ohI..P.N.a..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.428 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.428 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.431 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.433 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.435 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.442 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.444 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.445 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.449 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.449 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.449 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.449 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.449 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:43.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:09:43.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-19 01:09:43.452 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-19 01:11:07.527 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:11:07.568 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:11:07.568 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:11:07.569 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 01:11:07.569 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43406/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28159ms
ok 65 stop command for single port in 31603ms
ok 66 status detects locally running solr in 14674ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2187ms
ok 69 copying files around in 6671ms
ok 70 upconfig in 2689ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 49s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m10.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5704 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5704/

All tests passed

Build Log:
[...truncated 1308 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45893/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 23:09:46.608; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 23:09:46.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 23:09:47.519; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 23:09:47.560; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22684ms
ok 61 start solr with client truststore and security manager in 25456ms
not ok 62 start solr with mTLS needed in 57513ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-RWFEfL/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45893.
#
# Started Solr server on port 45893 (pid=200044). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45894.
#
# Started Solr server on port 45894 (pid=200492). Happy searching!
#
# INFO  - 2023-10-18 23:11:11.005; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 23:11:11.011; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 23:11:11.389; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 23:11:11.393; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 23:11:11.394; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:11.429 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 3D B4 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:47.000 UTC",
#     "not  after"         : "2024-01-16 23:10:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 7E 99 63 DF F2 06 DC   87 82 1F 7D 1F 49 9B 29  $..c.........I.)
#         0010: 17 FE 7D 3D                                        ...=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:11.434 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 06 C8 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:38.000 UTC",
#     "not  after"         : "2024-01-16 23:10:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:11.450 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:11.694 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:11.696 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:11.697 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.703 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.715 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:11.718 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "42 F5 2A BE A5 B0 D2 81 5A 1F 63 8B CA CD 56 79 12 73 68 80 3C D2 44 69 26 78 01 67 7D C0 78 B8",
#   "session id"          : "66 98 90 84 73 5D 8B 7B DB FA FA E2 90 3B 6D 95 EE 48 B0 FB 48 A2 1D 84 16 41 DC 19 37 12 4E 76",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0E A6 B6 72 1A 94 10 0F   24 0E 55 2F 3E CB E1 A6  ...r....$.U/>...
#             0010: 23 01 BD C1 26 3C EB D8   1D 06 41 66 0D 23 DB 7E  #...&<....Af.#..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.820 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 95 63 93 AF AB 2C E6 68 F9 77 23 A5 16 C7 37 31 C1 E2 30 2D F0 AD 57 5F 93 DA 3F 52 DC FC 9B",
#   "session id"          : "66 98 90 84 73 5D 8B 7B DB FA FA E2 90 3B 6D 95 EE 48 B0 FB 48 A2 1D 84 16 41 DC 19 37 12 4E 76",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D5 94 52 F4 EC F6 87 87   8E C3 E5 A0 A5 EB A8 0C  ..R.............
#           0010: AD 07 F9 20 C7 46 0D A2   5F 25 59 8C 7A C2 A3 03  ... .F.._%Y.z...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.821 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.821 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.822 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.823 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.825 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.826 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.826 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.838 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.839 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.843 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.843 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.844 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.846 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.847 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.847 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.848 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.848 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.849 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.849 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.852 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B4 CC 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:43.000 UTC",
#       "not  after"         : "2024-01-16 23:10:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 5D B5 7A 5E D2 55 C2   86 18 7E B8 DF C3 E2 5F  .].z^.U........_
#           0010: D6 A9 A2 EB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.853 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:11.910 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:11.911 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:11.911 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:11.912 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.941 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.945 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 7D D1 2F 7A B3 CF 5C   94 44 05 2F 7D 89 66 B0  ;../z..\.D./..f.
#     0010: 42 A1 99 AC CE 8F AE F5   61 2A A7 76 70 D2 1B 82  B.......a*.vp...
#     0020: 01 7D 71 6F EA FA C9 30   C4 78 20 31 3C DD B0 F6  ..qo...0.x 1<...
#     0030: 12 D8 14 C7 F8 57 46 EA   1F 25 71 BD 08 5B D7 E6  .....WF..%q..[..
#     0040: 7E C5 5A F5 38 78 58 66   7D 12 9F 5C 5B B6 9D B0  ..Z.8xXf...\[...
#     0050: 83 ED AB F5 92 AD F9 EE   BE 3E BD 89 80 55 1F 9A  .........>...U..
#     0060: FA 58 86 53 60 B8 20 BC   B0 A3 7E 6F 33 0F 62 C5  .X.S`. ....o3.b.
#     0070: 7B 9E 93 FB 46 5E D3 65   C9 CF F7 90 E8 B2 7C 20  ....F^.e.......
#     0080: 9C 32 CF 05 B2 7A A7 7E   88 42 CC F1 78 D8 6B F5  .2...z...B..x.k.
#     0090: D4 EB 11 64 43 8B AD E2   82 53 96 84 E9 70 96 C1  ...dC....S...p..
#     00A0: DB AC 50 02 54 5E B9 76   82 35 26 CE 7B 7F 6E B3  ..P.T^.v.5&...n.
#     00B0: B2 2B D4 5E 70 F0 33 0C   EB 62 F4 44 1B B9 5E 5C  .+.^p.3..b.D..^\
#     00C0: 1E D1 17 BC 73 AC 6D 83   1E 0E EF B9 E5 F9 4A 2B  ....s.m.......J+
#     00D0: FD 0A B0 70 24 F2 00 46   1C F8 28 EF 77 0B BD 48  ...p$..F..(.w..H
#     00E0: DC 61 D8 49 D4 C3 1B DE   C3 01 8F 21 46 90 0C CC  .a.I.......!F...
#     00F0: 28 A8 30 24 68 0F 01 5A   4C 4C 27 46 F3 9F 16 49  (.0$h..ZLL'F...I
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.947 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F9 78 10 C1 55 8C 8C 8A   90 46 3E 16 DE 08 7A 78  .x..U....F>...zx
#     0010: 7D 86 D2 3E A5 70 B9 CF   E6 F0 C3 52 0F AF AB CA  ...>.p.....R....
#     0020: 02 D2 46 22 9F 45 24 EF   D5 FD 46 E2 B2 76 8D DF  ..F".E$...F..v..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.950 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:11.951 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.951 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:11.952 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.952 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:11.952 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:11.952 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.953 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.957 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 3D B4 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:47.000 UTC",
#       "not  after"         : "2024-01-16 23:10:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 7E 99 63 DF F2 06 DC   87 82 1F 7D 1F 49 9B 29  $..c.........I.)
#           0010: 17 FE 7D 3D                                        ...=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C DC 0F 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:40.000 UTC",
#       "not  after"         : "2024-01-16 23:10:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#           0010: 17 36 55 81                                        .6U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.983 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 3E B6 A6 02 17 C3 69   E9 8D 54 98 45 A0 B2 E4  R>.....i..T.E...
#     0010: 90 9D 01 A3 12 4F 86 B9   1F 03 52 C4 79 5A AA DC  .....O....R.yZ..
#     0020: 47 19 D6 12 BD 39 13 06   22 1A A3 B9 99 47 B5 A3  G....9.."....G..
#     0030: 9F A6 C5 B7 01 AC 41 17   10 03 1D B4 4B 0F 36 B7  ......A.....K.6.
#     0040: 27 DB 70 64 4F 4E 5D 15   BB 6F FB 2C B9 BA 5A EA  '.pdON]..o.,..Z.
#     0050: 67 39 12 1E 2B 52 51 40   B2 FD 64 80 DE 49 E5 12  g9..+RQ@..d..I..
#     0060: 79 E5 22 57 5C 5D 39 53   EF 65 28 30 A9 0E 04 19  y."W\]9S.e(0....
#     0070: 00 E1 C5 CF 13 2A C7 8A   EC D7 4E 6B B8 D1 E8 61  .....*....Nk...a
#     0080: 73 46 DE 55 07 3C CF D4   57 E6 56 36 7B 49 C9 C5  sF.U.<..W.V6.I..
#     0090: 2C 0F 1A DC 89 B1 FF 7D   61 C8 C3 ED 7D 4A FD C3  ,.......a....J..
#     00A0: FE 46 C6 85 CE 7D 06 7D   86 7F 44 98 58 91 33 DC  .F........D.X.3.
#     00B0: 8B AD 72 70 F8 D0 F2 F4   E6 C5 47 A6 7E FF E9 71  ..rp......G....q
#     00C0: C2 7D C6 31 71 3A 04 C9   3E F6 3D C4 E0 DB 77 E1  ...1q:..>.=...w.
#     00D0: 49 ED 8F 6A DF E4 B4 59   20 76 37 FE BA BE E0 34  I..j...Y v7....4
#     00E0: 45 51 CF 72 13 A7 C4 B1   DC CC C4 55 EC 7B FD C8  EQ.r.......U....
#     00F0: 69 93 7B 7E FD 4A 4A F3   CB 99 1D B1 44 76 D5 6F  i....JJ.....Dv.o
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.985 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F BC E9 37 40 06 BD AE   53 EB DA 25 D6 E3 8A FB  o..7@...S..%....
#     0010: AF 6E 7F 65 95 F9 DE A1   D3 93 22 83 71 B0 4E B4  .n.e......".q.N.
#     0020: B5 7C 31 32 A0 75 CB 19   4B 01 00 1E 36 8F E8 96  ..12.u..K...6...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:11.985 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:12.047 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "87 B9 1B 6B EC D9 F5 8A 27 A2 6C 90 43 20 0E 83 5A DC 69 17 A1 69 07 78 45 16 AC F6 3A 6C 18 92",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 23:11:12.334 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 23:11:12.335 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 23:11:13.296; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 23:11:13.302; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 23:11:13.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 23:11:13.702; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 23:11:13.702; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-RWFEfL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:13.736 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 3D B4 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:47.000 UTC",
#     "not  after"         : "2024-01-16 23:10:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 7E 99 63 DF F2 06 DC   87 82 1F 7D 1F 49 9B 29  $..c.........I.)
#         0010: 17 FE 7D 3D                                        ...=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:13.740 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 06 C8 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:38.000 UTC",
#     "not  after"         : "2024-01-16 23:10:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:13.755 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:14.284 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.284 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:14.286 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:14.286 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.292 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.304 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.304 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:14.308 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "71 FE 21 7C 02 22 E0 70 A6 5D 3F 5E D4 2A 1D 88 C6 96 63 0F 3D 74 EF 75 A6 BB 91 B4 BA EE 78 07",
#   "session id"          : "FD D1 DE 96 96 17 DD 94 56 5A AA 0D 8D EF 14 EA E2 63 17 AA BD 48 4A 03 AD 18 0B A9 B1 04 FB 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6B DB 47 00 B3 48 8E A3   38 4B 21 17 9C 6F 26 35  k.G..H..8K!..o&5
#             0010: 9A F9 AA 6C A6 DA 03 34   23 55 3E 89 A4 F9 C2 11  ...l...4#U>.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.418 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "32 77 B9 9F 5C A5 15 E3 57 91 D0 D2 D8 A2 51 D7 F8 19 B8 56 C1 CB 20 B8 1A 26 85 E4 D8 4E E8 AC",
#   "session id"          : "FD D1 DE 96 96 17 DD 94 56 5A AA 0D 8D EF 14 EA E2 63 17 AA BD 48 4A 03 AD 18 0B A9 B1 04 FB 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E3 6A 4A 4F B5 82 6A 74   77 57 DA CB ED 77 37 A6  .jJO..jtwW...w7.
#           0010: 51 F0 60 52 04 66 9D D4   10 B2 52 82 49 B7 1B 68  Q.`R.f....R.I..h
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.419 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.419 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.420 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.422 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.424 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.425 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.425 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.425 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.426 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.434 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.436 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.437 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.441 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.441 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.441 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.442 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.444 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.445 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.445 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.445 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.447 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.448 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.448 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.451 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B4 CC 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:43.000 UTC",
#       "not  after"         : "2024-01-16 23:10:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 5D B5 7A 5E D2 55 C2   86 18 7E B8 DF C3 E2 5F  .].z^.U........_
#           0010: D6 A9 A2 EB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.452 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:14.504 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:14.507 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:14.508 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:11:14.508 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.546 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C DC 0F 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 23:10:40.000 UTC",
#     "not  after"         : "2024-01-16 23:10:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#         0010: 17 36 55 81                                        .6U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#         0010: F8 01 96 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.550 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 9C B0 AA A2 2F A0 FA   40 AF 3F E2 B2 7D E0 A8  ...../..@.?.....
#     0010: 46 D3 69 E8 54 6E 48 EA   CD 88 1E BE EB 1E 41 49  F.i.TnH.......AI
#     0020: 27 27 56 CC 69 29 EB 00   3C CB 0C CA 9A 83 C8 41  ''V.i)..<......A
#     0030: 11 C4 47 0D D3 FC 7C 61   3E 0A E6 12 D5 C6 FF 82  ..G....a>.......
#     0040: 5E FC 65 55 3A 7D C1 B7   1A C0 FE 86 EA 81 9F BD  ^.eU:...........
#     0050: 43 27 EB 84 19 AF 2A 37   82 60 B7 DC E7 06 A4 F5  C'....*7.`......
#     0060: 18 06 90 58 E8 55 02 2F   C9 B7 A9 8D A0 8E 1E 32  ...X.U./.......2
#     0070: B2 3F C9 7D 74 A6 08 50   83 A3 39 9E EF CF EE F9  .?..t..P..9.....
#     0080: 1F 72 B4 6B B8 CD 4C CB   FA C6 B4 4E 15 12 3A 0A  .r.k..L....N..:.
#     0090: 9B 72 A7 AC 62 97 D1 26   66 A9 AD 76 5E 09 81 17  .r..b..&f..v^...
#     00A0: 8E 57 AD A0 B3 5B 37 70   63 62 74 DC 85 E3 75 44  .W...[7pcbt...uD
#     00B0: 2A 8B E7 AD 0B D1 22 A8   9A 3F 75 32 51 54 81 00  *....."..?u2QT..
#     00C0: A7 C3 75 45 DA 59 31 F5   58 3E 96 FF 66 A4 FC 4D  ..uE.Y1.X>..f..M
#     00D0: CD 59 52 26 1B A4 41 35   34 9C 9B 4E 17 99 24 7A  .YR&..A54..N..$z
#     00E0: 96 51 7C A1 A5 E1 0D 55   42 74 60 C7 9D C7 7C 69  .Q.....UBt`....i
#     00F0: 05 2B 82 75 CE 60 68 B2   28 09 98 E2 1E 1F A5 D1  .+.u.`h.(.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.553 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 B2 71 1E AA 51 A9 6A   18 D4 09 33 27 BC C6 B9  0.q..Q.j...3'...
#     0010: 8B 8C 39 0D 00 46 D2 BF   F3 31 91 D7 41 D7 77 C7  ..9..F...1..A.w.
#     0020: 10 9E 34 59 87 90 D2 0F   86 FC A8 BC 3B B6 8E 74  ..4Y........;..t
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.555 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:14.556 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.556 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:14.557 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.557 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 23:11:14.557 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:14.558 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.558 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.563 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 3D B4 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:47.000 UTC",
#       "not  after"         : "2024-01-16 23:10:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 7E 99 63 DF F2 06 DC   87 82 1F 7D 1F 49 9B 29  $..c.........I.)
#           0010: 17 FE 7D 3D                                        ...=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C DC 0F 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:40.000 UTC",
#       "not  after"         : "2024-01-16 23:10:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#           0010: 17 36 55 81                                        .6U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.589 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 3F 63 69 6D C1 C0 5C   39 C8 97 63 07 66 8E 1A  .?cim..\9..c.f..
#     0010: 21 57 E1 B6 05 92 A5 E9   59 DA 13 00 24 15 75 9A  !W......Y...$.u.
#     0020: 59 D1 D6 46 71 0F 27 D0   77 61 77 AE B9 0A AB 9F  Y..Fq.'.waw.....
#     0030: DB FE 70 84 BB F5 6F 82   A5 F9 2D 87 35 0F 25 5C  ..p...o...-.5.%\
#     0040: 1A 9D FB 5E AF EA 19 80   91 03 10 8B 56 DA 81 DB  ...^........V...
#     0050: 70 0D C8 5D 42 DD 7A EB   31 1C 02 A9 15 F6 1F 3D  p..]B.z.1......=
#     0060: 40 BA 1D F3 67 AF BD 69   BA 9F C4 F7 1B 83 F5 AC  @...g..i........
#     0070: 8D 65 F9 C0 8D A6 B6 0B   99 65 3C 97 BC BA DB 3E  .e.......e<....>
#     0080: 49 4C DE B6 4C 49 AC BF   67 8E 8B E7 07 2B 9B FC  IL..LI..g....+..
#     0090: 7F 3A 14 E1 B9 48 A2 32   19 45 A8 C0 EA C3 36 C3  .:...H.2.E....6.
#     00A0: A2 48 B4 76 2E 67 5E B7   FA CB 2D A1 B8 7B 8B DF  .H.v.g^...-.....
#     00B0: AE 41 13 84 0D E9 F5 34   4C 56 D3 9D 1C 85 6D 56  .A.....4LV....mV
#     00C0: 00 F4 BB 46 06 42 84 15   FB E5 81 48 51 9B 33 EE  ...F.B.....HQ.3.
#     00D0: F9 72 A7 9F 65 4D 5D 1C   98 42 4B F7 CE 25 B6 2C  .r..eM]..BK..%.,
#     00E0: 77 C2 16 2E 1D 02 1F 15   53 F3 3F F8 58 CA 9E 9E  w.......S.?.X...
#     00F0: 92 39 80 46 E0 E9 87 E5   D0 51 54 98 61 F1 71 C2  .9.F.....QT.a.q.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.591 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 D3 4A D2 7A 0E F4 F4   28 D6 26 8A F0 05 DD 46  ..J.z...(.&....F
#     0010: 51 65 D2 51 C3 CA 98 29   B7 F0 FC AD 9A DC A5 CD  Qe.Q...)........
#     0020: C0 09 91 80 62 99 BF 06   EE C6 FD 41 EE 1C 9C D2  ....b......A....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.591 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:14.651 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9E 33 AB D2 25 A6 2E FC FF 8E EB 44 67 04 6F AF 8E 36 74 5E BD 49 94 40 13 39 7E AF 48 4B D8 0A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 23:11:14.947 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 23:11:14.949 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 23:11:26.421; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:26.754 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C DC 0F 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:40.000 UTC",
#       "not  after"         : "2024-01-16 23:10:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#           0010: 17 36 55 81                                        .6U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 E6 D3 DF FC 11 9C C4   62 57 F3 05 2B 4D AA 18  E.......bW..+M..
#           0010: F8 01 96 A4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 06 C8 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 23:10:38.000 UTC",
#       "not  after"         : "2024-01-16 23:10:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 FC C3 44 3B 8D 9E 4E   CE 5C F6 EF A0 61 3F 5B  ...D;..N.\...a?[
#           0010: 17 36 55 81                                        .6U.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 23:11:26.770 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:27.009 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:27.011 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 23:11:27.011 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.028 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.029 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.029 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 23:11:27.031 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "95 75 F1 F2 C6 4C 58 25 C0 3F 36 E0 47 1A 89 44 5D CE 85 A7 D8 3D 53 78 44 CB C3 0C 2C 12 5B 00",
#     "session id"          : "5C 3E 37 9D C5 68 C5 75 69 DD 27 16 AB F5 4A B4 33 99 35 68 D2 0C A9 22 E0 9D 6D 5E 33 C9 5C BB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 1A 5F 18 56 93 2F CA 0F   51 E1 A5 12 D5 B8 78 22  ._.V./..Q.....x"
#               0010: AD D8 22 DA D2 DB 10 28   AB 52 BF DE 6A 8E 99 60  .."....(.R..j..`
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.050 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "64 A2 36 26 98 84 7F 38 1C 11 5A 00 A2 EA 27 8B 5C 23 D9 FA C5 7E FE F1 73 42 44 E5 7F A2 CA 59",
#     "session id"          : "5C 3E 37 9D C5 68 C5 75 69 DD 27 16 AB F5 4A B4 33 99 35 68 D2 0C A9 22 E0 9D 6D 5E 33 C9 5C BB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 38 5E BF 2F 3A 87 F2 6F   5F 81 2C F0 D7 E2 BB FD  8^./:..o_.,.....
#             0010: DF 76 46 E7 88 85 DA 19   A7 7D C6 9E 16 0B 20 0F  .vF........... .
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.050 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.051 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.052 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.054 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.063 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.065 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.066 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:11:27.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 23:11:27.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 23:12:45.497 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:12:45.543 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:12:45.543 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:12:45.544 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 23:12:45.544 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45894/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28248ms
ok 65 stop command for single port in 31212ms
ok 66 status detects locally running solr in 14487ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2208ms
ok 69 copying files around in 6699ms
ok 70 upconfig in 2664ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1206ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 20m 59s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m21.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5703 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5703/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([7BE2E2B86CD25AFC:4E1609E3870E6CA2]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5679 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7BE2E2B86CD25AFC -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 48s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m12s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5702 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5702/

All tests passed

Build Log:
[...truncated 1317 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41307/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 16:13:18.689; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 16:13:18.695; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 16:13:19.974; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 16:13:20.021; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22857ms
ok 61 start solr with client truststore and security manager in 25013ms
not ok 62 start solr with mTLS needed in 59512ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-GCM0WU/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41307.
#
# Started Solr server on port 41307 (pid=200973). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41308.
#
# Started Solr server on port 41308 (pid=201406). Happy searching!
#
# INFO  - 2023-10-18 16:14:43.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 16:14:43.040; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 16:14:43.419; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 16:14:43.422; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 16:14:43.423; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:43.456 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 1C 02 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:19.000 UTC",
#     "not  after"         : "2024-01-16 16:14:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 F5 A7 2B 8D 79 0E 4C   88 5D C6 9E 63 D2 E7 D3  ...+.y.L.]..c...
#         0010: CF 1A 93 BA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:43.460 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 F7 A8 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:11.000 UTC",
#     "not  after"         : "2024-01-16 16:14:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:43.476 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:43.702 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.703 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:43.704 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:43.705 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.710 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.722 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:43.724 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD B0 83 D6 16 DD 0F AD BC A2 AE 5F 56 5D 81 DD DA CE 16 AD 73 AF F8 E2 1E E2 E4 8B CC 69 1A C0",
#   "session id"          : "66 46 51 28 9E E5 0D 5C CA BD 06 C4 7B 1B 91 24 FD 33 84 7D C3 8D 18 1A 33 26 85 F1 12 14 7B EF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 D7 73 AC E9 40 90 ED   B2 7A 65 52 FF B4 97 29  ..s..@...zeR...)
#             0010: 5D AA B0 28 02 56 4F 65   65 09 CC 46 7B 5F 75 25  ]..(.VOee..F._u%
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.830 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "84 F9 2D EF 6C 06 C9 FF DD CF 52 F1 98 39 ED 12 7D 81 62 58 0F 82 55 0A 6C 6D 75 67 09 93 65 B6",
#   "session id"          : "66 46 51 28 9E E5 0D 5C CA BD 06 C4 7B 1B 91 24 FD 33 84 7D C3 8D 18 1A 33 26 85 F1 12 14 7B EF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 37 0D BB 35 3E DA 76 02   73 26 8A EA 9B 3A 35 66  7..5>.v.s&...:5f
#           0010: 2B 84 F0 DC 34 60 C5 1B   03 72 9B 49 5F FF 7C 02  +...4`...r.I_...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.830 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.830 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.831 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.831 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.832 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.835 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.835 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.835 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.844 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.847 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.850 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.853 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.854 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.855 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.856 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.859 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 3C 54 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:15.000 UTC",
#       "not  after"         : "2024-01-16 16:14:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 72 01 2A 0D C5 A4 41   00 83 4B 01 0B 56 38 3A  .r.*...A..K..V8:
#           0010: F3 7F 6E C1                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.859 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:43.913 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:43.914 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:43.914 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:43.914 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.936 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.940 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 9B 1F A5 D0 21 B1 FF   59 B5 7E D3 5F BC BC 94  .....!..Y..._...
#     0010: AD A8 77 29 4B 98 80 EA   0D 11 EE 28 92 F1 5E CB  ..w)K......(..^.
#     0020: 15 DD 5A C0 70 B3 8C 4A   D0 6B E0 1D 39 95 C7 6F  ..Z.p..J.k..9..o
#     0030: 31 31 38 56 49 79 3A 63   A1 91 1E 47 A5 57 B9 10  118VIy:c...G.W..
#     0040: 8F 39 FF 49 14 3F 0D 80   CB 57 B1 46 49 66 2D 24  .9.I.?...W.FIf-$
#     0050: 4E 23 72 97 C0 68 39 A9   15 12 D1 5F D5 62 0D 2D  N#r..h9...._.b.-
#     0060: 19 6A B6 15 6B 0F C9 34   9D CA 4B B1 3C F0 D2 D3  .j..k..4..K.<...
#     0070: 86 78 89 F3 D8 9C BF 3F   7B 5D C1 5D 03 76 BF 23  .x.....?.].].v.#
#     0080: 7E 78 AC EE C6 EF C1 C8   48 CF 31 87 B0 CE 2E 3E  .x......H.1....>
#     0090: 12 12 6E 86 4A 85 ED 68   9C 8C F7 35 0B E4 C4 63  ..n.J..h...5...c
#     00A0: 2E C3 C9 9C BF 50 18 C4   F2 6B 14 8F E4 2D 89 DC  .....P...k...-..
#     00B0: 22 68 6A AE B3 B7 3F F8   F3 2E 1E 66 28 29 21 46  "hj...?....f()!F
#     00C0: D7 2D 5F 81 14 5F 43 4C   3C DB 86 9B F2 93 BA 33  .-_.._CL<......3
#     00D0: 05 BF 9D DD BE 57 A7 FB   58 B6 DB 66 EB 03 58 50  .....W..X..f..XP
#     00E0: FA 98 41 DC 05 BF 76 7D   8B 99 91 6C 2B 5F 90 7C  ..A...v....l+_..
#     00F0: DC E0 5A E5 BA 6C C5 20   09 69 4E 3C 75 FE 23 BE  ..Z..l. .iN<u.#.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.942 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE C9 89 55 30 10 9A 98   16 58 BB FC 62 F5 DC C0  ...U0....X..b...
#     0010: BE 03 CF 59 3E BA 0D 19   F5 E7 02 35 8A 45 7F E2  ...Y>......5.E..
#     0020: D4 2A 12 D9 AD EA 88 40   4E 82 F4 8B 00 8D 69 7E  .*.....@N.....i.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.944 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:43.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.945 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:43.946 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.946 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:43.946 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:43.946 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.947 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.949 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 1C 02 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:19.000 UTC",
#       "not  after"         : "2024-01-16 16:14:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 F5 A7 2B 8D 79 0E 4C   88 5D C6 9E 63 D2 E7 D3  ...+.y.L.]..c...
#           0010: CF 1A 93 BA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 33 53 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:12.000 UTC",
#       "not  after"         : "2024-01-16 16:14:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#           0010: B0 F5 2D 6D                                        ..-m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.975 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9A 9B 66 E7 D8 D1 FC EE   57 DF 1F 3B 14 64 46 AC  ..f.....W..;.dF.
#     0010: D4 18 3F 76 B5 32 9D 84   7A E6 A8 B2 F4 87 9B 79  ..?v.2..z......y
#     0020: E4 2A 71 6A A7 EE CC 96   BC 0B 7A F1 3C 7D 2D F4  .*qj......z.<.-.
#     0030: 01 1A 90 1C F8 13 EC 5C   26 BC 63 2B C3 AC 27 12  .......\&.c+..'.
#     0040: 4B 26 BE CB 50 01 D0 DC   F9 44 54 DD 66 0B 65 ED  K&..P....DT.f.e.
#     0050: 5A FF 1D 6B 8C 3D 32 99   12 85 E6 B0 8F 13 3B 4B  Z..k.=2.......;K
#     0060: CC 45 E9 DE 10 61 4A 77   7E 64 B2 C4 EC 44 2B 6B  .E...aJw.d...D+k
#     0070: 13 11 D9 2E 32 93 5F 8C   0A FC 81 D3 9C A8 6B C5  ....2._.......k.
#     0080: 79 42 D9 78 15 FC BB 0E   43 F6 23 F5 F3 EC 9B 6F  yB.x....C.#....o
#     0090: 9F ED 4F 7A 09 89 10 96   27 27 62 68 7D 1A 05 1A  ..Oz....''bh....
#     00A0: 4A D7 D0 84 82 63 24 07   BC 0F 7C 2A CC 85 C0 D4  J....c$....*....
#     00B0: B0 7A 5C 83 13 4A 45 BA   2C 51 77 32 01 2F 3E C5  .z\..JE.,Qw2./>.
#     00C0: B4 FC 91 11 9A 1E DA 28   77 9D 85 B4 7D 92 B4 44  .......(w......D
#     00D0: 13 EC E7 3F 1B D4 B1 9C   7B AA B3 EA 71 81 03 EB  ...?........q...
#     00E0: D7 58 DC E9 E1 63 D6 DF   E4 6B 7D F2 AB 19 34 2B  .X...c...k....4+
#     00F0: A5 0C 73 E9 08 9A 3E 03   91 CE 3C 42 38 18 FF C2  ..s...>...<B8...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.976 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 49 AD E8 A8 04 EF C7 42   AF AD 72 1F 53 EB B5 FC  I......B..r.S...
#     0010: E7 D4 B1 1D E5 64 F2 4F   86 1F F6 4C F7 AC A4 7C  .....d.O...L....
#     0020: 2A 38 2D B8 0F 15 85 79   E5 75 1F 6F 44 4E 99 7E  *8-....y.u.oDN..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:43.977 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:44.034 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8A E3 1E 38 12 83 8A 39 4E E6 62 BE FE A0 A1 6E 21 04 4F D6 6D A6 6D 51 95 94 BF D3 20 08 63 DF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 16:14:44.303 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 16:14:44.304 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 16:14:45.261; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 16:14:45.267; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 16:14:45.672; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 16:14:45.676; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 16:14:45.676; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCM0WU/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:45.711 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 1C 02 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:19.000 UTC",
#     "not  after"         : "2024-01-16 16:14:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 F5 A7 2B 8D 79 0E 4C   88 5D C6 9E 63 D2 E7 D3  ...+.y.L.]..c...
#         0010: CF 1A 93 BA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:45.716 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 F7 A8 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:11.000 UTC",
#     "not  after"         : "2024-01-16 16:14:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:45.732 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:46.268 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.268 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:46.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:46.271 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.277 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.290 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.290 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.291 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:46.294 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0F 00 3A 04 CA B3 D2 67 5A 0A E3 D3 E8 C4 46 2F DE 91 0A 5D 4D 39 C9 F3 40 0B A3 6B 07 F2 A4 B6",
#   "session id"          : "A0 D9 D6 74 8C BB D1 AD 31 55 4D 4A 5A 09 7F 8D 92 95 3F 1B 70 2D AB 8C 36 25 84 6A 91 FE 82 F3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 31 7B A1 10 F9 F6 C5 AA   AF 71 08 F5 FD 1A 09 B7  1........q......
#             0010: 55 63 10 68 56 AB A2 56   99 BF 55 F8 3C D9 B1 36  Uc.hV..V..U.<..6
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.406 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F9 FB 19 37 87 17 58 37 05 C0 05 EB 87 29 C2 1E 73 BE 55 2F 26 17 FA 1F DA C5 0E 21 CC B8 8B B3",
#   "session id"          : "A0 D9 D6 74 8C BB D1 AD 31 55 4D 4A 5A 09 7F 8D 92 95 3F 1B 70 2D AB 8C 36 25 84 6A 91 FE 82 F3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B8 29 5F 9E 1D 7F 1A D7   91 A5 E8 56 9F 32 7B C0  .)_........V.2..
#           0010: 8A 98 63 10 A4 7A 1F F1   C8 99 87 5A D2 B0 C5 3E  ..c..z.....Z...>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.406 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.407 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.409 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.409 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.409 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.412 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.412 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.414 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.414 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.414 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.422 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.424 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.425 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.429 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.429 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.430 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.430 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.433 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.433 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.433 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.434 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.435 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.436 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.436 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.440 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 3C 54 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:15.000 UTC",
#       "not  after"         : "2024-01-16 16:14:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 72 01 2A 0D C5 A4 41   00 83 4B 01 0B 56 38 3A  .r.*...A..K..V8:
#           0010: F3 7F 6E C1                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.440 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:46.491 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:46.491 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:46.492 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:46.492 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.530 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 33 53 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 16:14:12.000 UTC",
#     "not  after"         : "2024-01-16 16:14:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#         0010: B0 F5 2D 6D                                        ..-m
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#         0010: 2D CC FA 5D                                        -..]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.534 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 15 DA 7D 80 09 F1 2F   BB E3 58 5F 06 BC 08 D2  ......./..X_....
#     0010: 9A 57 B7 E0 B0 EE 2A 7F   AF 03 F7 F3 54 7A BD B5  .W....*.....Tz..
#     0020: A2 E4 6A 15 0B 2C 9D 9D   BC 9A FD 59 DF 69 DA E8  ..j..,.....Y.i..
#     0030: 2E 24 1B 29 1E 8A 0E 44   83 15 02 28 7E B1 26 D8  .$.)...D...(..&.
#     0040: 05 F9 8F 64 C8 71 F0 44   2E 63 02 4E D7 10 5E D2  ...d.q.D.c.N..^.
#     0050: 1F C0 42 F1 ED 20 AA 51   5D DC 64 0B F1 19 79 CB  ..B.. .Q].d...y.
#     0060: A0 5D A8 91 4D 34 E6 02   8A FF 51 99 6B 66 B9 44  .]..M4....Q.kf.D
#     0070: 2F 90 9A 36 AB CC 80 6D   D0 F9 3D BA EB 84 81 E6  /..6...m..=.....
#     0080: D2 13 D0 8C 9E 6B 3E 00   50 21 E1 CF 65 F0 8E B1  .....k>.P!..e...
#     0090: 90 C5 2F A6 CB B9 1E 25   C0 38 D5 C6 27 9C AF A9  ../....%.8..'...
#     00A0: 4D 19 E6 56 33 AC 19 14   94 5E 6C 0F AA 4D 3D 05  M..V3....^l..M=.
#     00B0: AF C3 6A 70 A6 97 F2 35   CB 90 69 0F 7A 89 ED F6  ..jp...5..i.z...
#     00C0: 9A C1 02 FD 1A 78 17 E5   BF B7 D1 90 BE 14 7D C8  .....x..........
#     00D0: EE 55 6A 63 A6 59 E6 42   70 EB 62 65 1D 42 D9 1B  .Ujc.Y.Bp.be.B..
#     00E0: EE 50 DF A2 C5 10 EF 02   91 D9 D6 64 68 F3 82 5F  .P.........dh.._
#     00F0: 6F 55 91 1B D7 5D AE B6   D4 CB 23 48 9D 15 89 8A  oU...]....#H....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.537 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE 02 ED E4 B3 0D 29 F8   06 43 0F F2 DE C6 CF A7  ......)..C......
#     0010: 4C 6F 5A 49 62 51 9E 82   CB 24 16 9C 87 35 1B 49  LoZIbQ...$...5.I
#     0020: D9 72 2C C8 CC BF 4D 41   84 03 B3 8C 83 A6 90 3F  .r,...MA.......?
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.539 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:46.540 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.540 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:46.541 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.541 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 16:14:46.541 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:46.541 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.542 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.545 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 1C 02 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:19.000 UTC",
#       "not  after"         : "2024-01-16 16:14:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 F5 A7 2B 8D 79 0E 4C   88 5D C6 9E 63 D2 E7 D3  ...+.y.L.]..c...
#           0010: CF 1A 93 BA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 33 53 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:12.000 UTC",
#       "not  after"         : "2024-01-16 16:14:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#           0010: B0 F5 2D 6D                                        ..-m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.571 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 23 4B C5 80 F2 C0 1C AA   B7 B5 72 D6 FD CD B9 F3  #K........r.....
#     0010: 26 47 A0 23 47 83 55 5D   AE 09 A4 4F F9 93 A5 11  &G.#G.U]...O....
#     0020: 33 BF 04 70 48 AA 44 21   39 ED 68 E6 E5 E1 E0 1D  3..pH.D!9.h.....
#     0030: E0 D9 14 53 AA 8C AA E9   25 24 36 AE 6A 0B 8E 12  ...S....%$6.j...
#     0040: FA 97 E1 25 66 51 BA 15   FF 48 94 B6 8B 30 53 1A  ...%fQ...H...0S.
#     0050: 5B B9 1E 2F 5E E6 B3 C6   D7 9F 67 4E 15 7F 82 DF  [../^.....gN....
#     0060: 2E E4 B9 90 F2 98 54 17   AF 34 EB 1D 5B 44 CF 11  ......T..4..[D..
#     0070: 48 EB B6 33 09 90 6E ED   A1 34 38 A9 FB 42 FA 15  H..3..n..48..B..
#     0080: 46 50 FF 2A 7B 0C 27 8B   97 CF 52 11 35 62 3B CE  FP.*..'...R.5b;.
#     0090: 41 A6 FA A7 D7 3F 47 16   A8 2E 52 91 9D 9B 5D 1E  A....?G...R...].
#     00A0: 64 56 2F 51 F1 06 F5 D5   43 9D CE 0D 9C 7E 32 C5  dV/Q....C.....2.
#     00B0: 7A BA DD ED 0A 45 4B 2B   18 8A C2 84 8A 19 16 01  z....EK+........
#     00C0: 1F 3A 66 5C 15 1C F0 11   84 C5 D8 47 E2 1C 39 4F  .:f\.......G..9O
#     00D0: EF 61 C3 65 9E 1A EF 33   E6 CB B5 0C EF DD 35 00  .a.e...3......5.
#     00E0: 11 AE 58 A3 C4 AF 60 FA   0F 61 55 E7 88 90 A4 7E  ..X...`..aU.....
#     00F0: 8C 09 F6 30 1A 26 48 1B   AD 33 51 26 68 1F F6 C7  ...0.&H..3Q&h...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.572 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 38 09 0F 18 D7 28 69 33   53 96 B7 E2 FC C0 10 E4  8....(i3S.......
#     0010: 3C 4F F9 67 D0 07 BB 62   11 80 F5 7C 46 A5 86 C4  <O.g...b....F...
#     0020: 8B AF E7 79 8D 85 EC 39   46 5F C6 25 74 2D 22 59  ...y...9F_.%t-"Y
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.573 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:46.640 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CD 01 7C 4F 10 CC B6 59 05 A1 1A 36 CC E0 8F 45 86 17 7C 5C EF 78 B1 3F 4A 0A CE 98 33 04 EA C9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 16:14:46.924 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 16:14:46.926 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 16:14:58.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:58.672 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 33 53 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:12.000 UTC",
#       "not  after"         : "2024-01-16 16:14:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#           0010: B0 F5 2D 6D                                        ..-m
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 58 26 D0 52 D4 1B 43   95 45 17 E8 37 39 85 6E  .X&.R..C.E..79.n
#           0010: 2D CC FA 5D                                        -..]
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 F7 A8 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 16:14:11.000 UTC",
#       "not  after"         : "2024-01-16 16:14:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 18 71 85 18 CD 80 1D   22 FD B8 6F 31 55 3E 45  f.q....."..o1U>E
#           0010: B0 F5 2D 6D                                        ..-m
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 16:14:58.688 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:59.131 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:59.132 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:59.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:14:59.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:59.219 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.219 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:59.221 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 16:14:59.221 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.239 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 16:14:59.242 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A7 A0 E9 6D 6C C1 E1 E0 EA 29 58 C1 82 F4 96 D1 9D 92 40 BE BF 0D BF 87 37 45 B1 0A FE DA 6E DF",
#     "session id"          : "58 15 1D 38 7A A5 26 CA 92 80 B9 C7 8E 68 F8 C9 49 BD 31 22 A8 FD C3 5A A4 22 86 01 5F 16 17 E8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 75 2D 96 9C 8E F7 50 A4   F4 EE 94 AD 43 D7 14 96  u-....P.....C...
#               0010: 41 C1 7B 27 77 43 FD 7D   3C 6A F8 00 38 4A E8 0F  A..'wC..<j..8J..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.264 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4D F2 10 B4 7F 3C 45 60 08 D8 1F F1 F5 AC 33 B2 5F B9 CA E8 04 E9 83 D7 C0 EB BF 7B F5 42 08 DE",
#     "session id"          : "58 15 1D 38 7A A5 26 CA 92 80 B9 C7 8E 68 F8 C9 49 BD 31 22 A8 FD C3 5A A4 22 86 01 5F 16 17 E8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 60 01 07 8A DC 54 1D 13   C7 44 5F 43 CD 56 1C 88  `....T...D_C.V..
#             0010: 9C 31 42 19 C9 13 8E B0   E9 99 07 77 4D 24 D1 04  .1B........wM$..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.264 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.264 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.265 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.266 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.266 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.266 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.266 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.266 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.267 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.267 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.269 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.269 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.279 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.281 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.282 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.286 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.286 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:14:59.287 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 16:14:59.289 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 16:16:20.868 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:16:20.922 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:16:20.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:16:20.922 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 16:16:20.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41308/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28107ms
ok 65 stop command for single port in 31246ms
ok 66 status detects locally running solr in 14698ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2195ms
ok 69 copying files around in 6749ms
ok 70 upconfig in 2647ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 19s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m42s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5701 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5701/

All tests passed

Build Log:
[...truncated 1317 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36803/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 13:24:29.587; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:24:29.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 13:24:30.502; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 13:24:30.542; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23005ms
ok 61 start solr with client truststore and security manager in 25491ms
not ok 62 start solr with mTLS needed in 61118ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-saOKMZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36803.
#
# Started Solr server on port 36803 (pid=199195). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36804.
#
# Started Solr server on port 36804 (pid=199648). Happy searching!
#
# INFO  - 2023-10-18 13:25:54.505; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:25:54.511; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:25:54.884; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:25:54.887; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:25:54.888; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:54.920 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 7B 67 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:30.000 UTC",
#     "not  after"         : "2024-01-16 13:25:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A5 5E 3D 0F 52 B3 3F   16 B4 9E 5F 07 DF CA 2F  ..^=.R.?..._.../
#         0010: C5 48 E3 C1                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:54.924 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D BB 61 DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:22.000 UTC",
#     "not  after"         : "2024-01-16 13:25:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:54.939 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:55.172 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:55.174 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:55.174 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.192 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:55.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FA 78 03 61 3E C7 8F 8D 41 81 B8 F3 0D E9 70 12 DA AC B6 E7 26 1B E1 F0 5D FC 15 0B A9 A2 E7 08",
#   "session id"          : "C8 48 FC 69 8E 9C 09 9E B2 48 57 49 7E 19 48 EF 68 C5 EB 8F 16 CC 21 11 D0 6A 9F EF B1 04 41 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 48 C9 5D 66 24 24 DB C4   B5 EE 77 29 9E 1D D8 51  H.]f$$....w)...Q
#             0010: 55 71 07 DF 90 BA 50 A9   40 94 59 99 F0 66 53 76  Uq....P.@.Y..fSv
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.307 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E1 16 78 99 61 6B 43 D9 9B 0C 3C 84 92 62 5F 34 A4 59 0A 99 FC 18 EB 2D 78 A2 A9 DD CC DE 93 F7",
#   "session id"          : "C8 48 FC 69 8E 9C 09 9E B2 48 57 49 7E 19 48 EF 68 C5 EB 8F 16 CC 21 11 D0 6A 9F EF B1 04 41 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A6 CB 63 9D B8 CF CC EB   6C 40 9C F0 78 F9 2D A6  ..c.....l@..x.-.
#           0010: D1 CC C7 9B BD 75 A5 84   F3 D5 D0 6A 6F D7 2E 24  .....u.....jo..$
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.308 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.308 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.310 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.310 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.310 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.310 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.310 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.315 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.315 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.322 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.323 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.324 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.328 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.328 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.328 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.331 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.332 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.333 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.333 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.336 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C E2 BF 71",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:26.000 UTC",
#       "not  after"         : "2024-01-16 13:25:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 3B E1 15 BE 84 78 AD   4C 6C 20 88 77 7E CC 50  .;....x.Ll .w..P
#           0010: F7 04 EB 7E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.336 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:55.388 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:55.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:55.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:55.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.415 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.419 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F EE C1 10 41 85 33 68   E4 11 43 47 7C C5 A7 10  ....A.3h..CG....
#     0010: 06 C6 D7 5F D6 25 FB 4C   74 40 A6 0C B2 E2 C1 FF  ..._.%.Lt@......
#     0020: 8A 9D 96 EE F1 E4 A6 7F   8A 9A DE 10 FE 9C FD 18  ................
#     0030: 9A 67 75 CB F7 12 E2 36   4A 26 EF 25 26 93 7F 35  .gu....6J&.%&..5
#     0040: C4 D4 F4 26 DD 3F 61 BE   A7 78 69 18 FF E6 66 28  ...&.?a..xi...f(
#     0050: C6 8D 52 F9 3A 54 9B 67   66 F6 88 52 DA EA D9 B5  ..R.:T.gf..R....
#     0060: 20 25 60 8A 4C E5 1D 43   96 8F 6D DC 3B B9 3A 3E   %`.L..C..m.;.:>
#     0070: B3 C5 E5 C5 8D 5D 7B 0F   66 13 AA CF 33 B8 B5 05  .....]..f...3...
#     0080: 84 8A 18 F0 30 12 03 D5   3C 0E 24 31 88 3D 94 D0  ....0...<.$1.=..
#     0090: E8 AF F3 0B 30 ED 79 43   23 64 CB 33 FE 0F 1B 1F  ....0.yC#d.3....
#     00A0: A0 73 BB BD 2D 7C E4 B3   AB AD 4A EA 21 3F 8C 7B  .s..-.....J.!?..
#     00B0: A5 A1 61 27 47 F8 AC 00   60 5F 8A E5 94 E0 F0 56  ..a'G...`_.....V
#     00C0: A4 92 80 EB D5 C5 3B FD   08 EB A2 16 6D AA BB 38  ......;.....m..8
#     00D0: E0 33 15 4D 87 EA 44 88   E5 70 30 A6 AD 46 7D 86  .3.M..D..p0..F..
#     00E0: FA 8B 08 C3 5E F1 FA 3B   3D 88 78 8A 76 CF 2C 02  ....^..;=.x.v.,.
#     00F0: B6 1C E0 6D F2 B4 72 6C   62 EE DE 6B 3B 24 26 9F  ...m..rlb..k;$&.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.421 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 FD C3 4A D5 0A 29 71   4B 8E 7B 7E 68 BC 6F 31  ...J..)qK...h.o1
#     0010: F1 A4 2D 49 4D 01 58 7A   AE 9D 29 34 B5 08 AC D7  ..-IM.Xz..)4....
#     0020: 27 F3 42 30 D4 D7 D1 B0   AE E0 FD 2D 0F 36 44 2C  '.B0.......-.6D,
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.424 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:55.425 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.425 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:55.425 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.425 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:55.425 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:55.426 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.426 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.428 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 7B 67 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:30.000 UTC",
#       "not  after"         : "2024-01-16 13:25:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A5 5E 3D 0F 52 B3 3F   16 B4 9E 5F 07 DF CA 2F  ..^=.R.?..._.../
#           0010: C5 48 E3 C1                                        .H..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 E3 61 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:24.000 UTC",
#       "not  after"         : "2024-01-16 13:25:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#           0010: C2 B9 F4 88                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.453 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 67 64 31 1E A8 47 AB   0F 02 9E 78 58 76 9B CD  jgd1..G....xXv..
#     0010: BB 4C 22 18 C8 E4 17 02   BF D1 8C FE 78 77 55 39  .L".........xwU9
#     0020: 43 2C 6C D3 E0 49 95 5D   FD 41 EF 88 45 0A DA 55  C,l..I.].A..E..U
#     0030: E3 B1 40 AB 54 99 9D C9   0F 66 E3 58 8B 97 62 81  ..@.T....f.X..b.
#     0040: D5 C0 47 87 57 31 16 6A   AE A9 66 4E 6D 34 6A AE  ..G.W1.j..fNm4j.
#     0050: 8B 04 C2 2A 08 5F EB 6A   5C 3B 57 DB 2C 64 BA B4  ...*._.j\;W.,d..
#     0060: 29 9F D1 36 72 60 C0 40   4A AE 19 E6 E4 E6 0A 21  )..6r`.@J......!
#     0070: BA 81 50 B5 C3 27 05 CE   A2 71 EB 2C D4 75 0A 7F  ..P..'...q.,.u..
#     0080: B4 11 BF BD 58 A1 E9 C4   C6 D4 4F E1 4F AF 5B A0  ....X.....O.O.[.
#     0090: 16 4C 9B 7A 0B 69 45 47   27 38 59 1F 70 9E 00 14  .L.z.iEG'8Y.p...
#     00A0: 87 61 6A 13 59 A7 9C 06   18 7C FA 57 44 D0 06 14  .aj.Y......WD...
#     00B0: 54 9D 31 5D CF B7 37 AC   ED 76 31 53 CC EE E7 B8  T.1]..7..v1S....
#     00C0: C1 73 97 82 AD 0D 3C 66   29 C3 CF 62 87 49 1D 44  .s....<f)..b.I.D
#     00D0: A8 B0 A9 10 62 62 62 DE   77 A2 D1 4E 32 F3 98 C6  ....bbb.w..N2...
#     00E0: C3 A7 4C 6E 82 42 E1 A7   8B DE 71 6E C2 73 DB 3E  ..Ln.B....qn.s.>
#     00F0: 17 A0 E1 62 56 E3 94 70   17 6D 1D 25 88 99 77 7B  ...bV..p.m.%..w.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.454 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C 7A 39 33 26 FB 55 3E   B1 70 B3 3B C2 B0 73 78  .z93&.U>.p.;..sx
#     0010: 5E 6C 10 54 67 01 33 2F   71 48 47 46 CC 9F D4 2B  ^l.Tg.3/qHGF...+
#     0020: 96 97 74 A3 A8 C3 06 95   9D B1 DF 10 B2 E3 BB 2C  ..t............,
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.455 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:55.514 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "20 D4 45 C2 5D 03 C7 FE 3A B3 0F DD 1E 56 3D A2 D5 73 BF D6 EF F0 B6 39 7A 11 21 CC 62 DD 7A 2A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:25:55.794 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:25:55.795 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 13:25:56.768; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:25:56.774; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:25:57.153; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:25:57.156; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:25:57.156; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-saOKMZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:57.188 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 7B 67 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:30.000 UTC",
#     "not  after"         : "2024-01-16 13:25:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 A5 5E 3D 0F 52 B3 3F   16 B4 9E 5F 07 DF CA 2F  ..^=.R.?..._.../
#         0010: C5 48 E3 C1                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:57.193 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D BB 61 DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:22.000 UTC",
#     "not  after"         : "2024-01-16 13:25:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:25:57.208 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:57.500 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:57.500 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:57.501 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:25:57.501 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:57.668 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.668 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:57.670 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:25:57.671 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.677 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.689 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:25:57.692 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2C 3F AE 55 BC 72 67 73 0F DE 73 35 1F E4 3A B4 37 40 52 23 28 C1 E2 41 BE 0D 37 69 02 CC 02 54",
#   "session id"          : "91 18 CA E5 42 10 E5 90 D3 0A 85 A8 BC 61 28 E6 43 74 2E 13 94 02 EF E4 53 40 EE C5 A4 98 86 54",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 52 D5 03 85 DC 49 28 5F   3D 5A 0B 5E DC 7B 0E 7E  R....I(_=Z.^....
#             0010: E6 31 3C A7 1C 77 A5 D6   BD D8 F9 A2 A8 35 1A 2E  .1<..w.......5..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.806 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FC F9 FD 4E 03 91 8C 12 CA 33 F9 C2 D2 16 35 97 60 89 A5 59 0C 4E C6 A9 AC F9 B6 F6 31 4B C8 86",
#   "session id"          : "91 18 CA E5 42 10 E5 90 D3 0A 85 A8 BC 61 28 E6 43 74 2E 13 94 02 EF E4 53 40 EE C5 A4 98 86 54",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6B 95 04 86 D8 27 64 9E   70 5C F2 06 06 BA 22 C4  k....'d.p\....".
#           0010: 9C 38 EC 80 61 1B 0D 15   F4 DF 1C F0 0F D8 C7 0A  .8..a...........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.806 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.807 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.809 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.809 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.809 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.809 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.812 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.812 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.812 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.822 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.823 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.825 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.828 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.828 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.831 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.831 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.831 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.832 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.833 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.833 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.833 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.837 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C E2 BF 71",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:26.000 UTC",
#       "not  after"         : "2024-01-16 13:25:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC 3B E1 15 BE 84 78 AD   4C 6C 20 88 77 7E CC 50  .;....x.Ll .w..P
#           0010: F7 04 EB 7E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.837 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.929 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 E3 61 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:25:24.000 UTC",
#     "not  after"         : "2024-01-16 13:25:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#         0010: C2 B9 F4 88                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#         0010: 1D D4 4C 52                                        ..LR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.933 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B FC 08 B8 44 D8 05 E2   79 99 22 CF AF C7 2E 1F  ....D...y.".....
#     0010: 86 1C 10 F3 BC 82 19 44   AE AB EC 15 81 99 27 73  .......D......'s
#     0020: 6A B4 9A 62 4F E6 72 A7   F0 DA 8D 82 D9 11 C4 5C  j..bO.r........\
#     0030: 13 8A 82 01 43 A1 B7 97   22 A4 71 37 4B C1 5E 6D  ....C...".q7K.^m
#     0040: AB 22 18 E7 0C B3 34 99   B0 25 17 F5 BB 37 73 53  ."....4..%...7sS
#     0050: AB 47 74 5F F6 F7 24 5C   2F 56 24 7D C7 F8 EF 75  .Gt_..$\/V$....u
#     0060: BE 4D 61 90 21 BA 27 B6   62 9A A8 C0 93 52 CD 34  .Ma.!.'.b....R.4
#     0070: 0F 46 2D C8 BD 1A AB A1   FD ED 9E D8 89 1C 54 CE  .F-...........T.
#     0080: 1E FD AE F5 F9 7A D9 0C   64 34 3E C7 87 F5 01 99  .....z..d4>.....
#     0090: 5C DC 2E 7B 73 AC 1A E7   96 1F B5 39 34 17 9F AF  \...s......94...
#     00A0: 66 38 AA 2B 01 3A B9 A7   26 32 91 D1 38 22 55 69  f8.+.:..&2..8"Ui
#     00B0: 60 2A BC BF 31 DD 86 00   C1 DF B7 84 07 4A 59 BB  `*..1........JY.
#     00C0: 66 B6 75 05 6F B3 D4 B5   A8 DD A3 A0 FA 3C A9 6B  f.u.o........<.k
#     00D0: 3F 93 0F EE 5B 4D 11 D8   69 8E 5C 93 66 61 92 D3  ?...[M..i.\.fa..
#     00E0: DA 00 C0 09 D7 6E C4 BD   F8 F8 B2 0F 58 44 2C 98  .....n......XD,.
#     00F0: 5E 32 B8 5B 69 74 3F 90   B8 DF 49 1F 6B B4 B2 8F  ^2.[it?...I.k...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.935 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8B 04 AF 6B 7E D6 7A 81   90 37 6B 1A 18 F9 16 16  ...k..z..7k.....
#     0010: 5C 0F BA 21 EA 68 9B 14   D8 1E 35 15 D5 CB 5A 45  \..!.h....5...ZE
#     0020: D8 EE 19 5C 91 E2 6E D4   F8 A9 32 46 AF 83 94 82  ...\..n...2F....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.938 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:57.939 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.939 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:57.939 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.939 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 13:25:57.940 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:25:57.940 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.940 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.944 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 7B 67 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:30.000 UTC",
#       "not  after"         : "2024-01-16 13:25:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 A5 5E 3D 0F 52 B3 3F   16 B4 9E 5F 07 DF CA 2F  ..^=.R.?..._.../
#           0010: C5 48 E3 C1                                        .H..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 E3 61 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:24.000 UTC",
#       "not  after"         : "2024-01-16 13:25:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#           0010: C2 B9 F4 88                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.972 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 65 1C 5E 38 E8 95 AE   BD 4E 5C 50 67 36 A0 30  xe.^8....N\Pg6.0
#     0010: B7 43 1E D9 9D 64 AD 7E   D6 91 FB 0F F3 BB 95 4F  .C...d.........O
#     0020: BC 32 18 D3 0D 85 9C B2   F6 3B 7C BF FE EC 24 36  .2.......;....$6
#     0030: 60 FA E0 8B 58 3F 2A 47   41 B0 3B 40 C2 2B 74 5A  `...X?*GA.;@.+tZ
#     0040: 98 BC 86 4F F3 3B E5 17   02 2E C0 39 C8 DE 7E 37  ...O.;.....9...7
#     0050: DA 35 3E 18 D3 D8 B3 39   29 65 33 F5 01 03 C5 17  .5>....9)e3.....
#     0060: 18 75 83 F9 68 37 28 07   B4 BA 74 F3 CB AA 5E 3E  .u..h7(...t...^>
#     0070: B2 45 60 35 F2 98 AB BB   80 2B E0 61 2E 4F 17 55  .E`5.....+.a.O.U
#     0080: 94 E9 C0 10 D2 68 77 EC   AD AE 42 81 6A 9F 94 32  .....hw...B.j..2
#     0090: 05 C1 7B CD A7 85 F6 95   4D D2 05 26 0C 30 DE D9  ........M..&.0..
#     00A0: C0 70 32 E0 3B CC C3 74   9C BE 99 43 6A D2 00 F8  .p2.;..t...Cj...
#     00B0: 5B E6 08 25 C4 D9 6E 4B   96 D7 84 1C 81 05 BC 9F  [..%..nK........
#     00C0: 79 32 7C 73 E9 EE 8E 2C   1C CE F6 6B EB 56 38 A7  y2.s...,...k.V8.
#     00D0: DB 07 64 9B 38 16 AC 45   34 3E DE 5B B5 D4 3B 54  ..d.8..E4>.[..;T
#     00E0: 73 FB 56 B9 4B 3E C0 B7   93 A2 38 E8 29 A0 D4 B7  s.V.K>....8.)...
#     00F0: 8D FC 73 86 DE C9 57 C0   22 BE 65 99 8A EF 0D 4F  ..s...W.".e....O
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.973 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 0C 3C 9C 35 5B A1 59   94 54 DE 9D 30 8C B5 3A  ..<.5[.Y.T..0..:
#     0010: 99 90 4F 90 1F 58 2D 0F   01 57 F7 C5 05 3E D5 87  ..O..X-..W...>..
#     0020: 5F 3D D2 A1 0F BE 39 97   88 D0 03 95 0A BD 1D 1E  _=....9.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:57.974 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:25:58.034 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0D 67 DF 3C 33 9B 08 2E 39 CD B6 95 59 46 88 32 B1 51 CB 31 49 EF 9F C7 C1 EB D7 65 40 F7 68 59",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:25:58.341 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:25:58.342 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 13:26:09.377; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:26:09.709 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D BB 61 DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:22.000 UTC",
#       "not  after"         : "2024-01-16 13:25:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#           0010: C2 B9 F4 88                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 E3 61 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:25:24.000 UTC",
#       "not  after"         : "2024-01-16 13:25:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D4 22 2A BF 21 FC 61   E3 66 7F 4F BB F4 7B 1D  .."*.!.a.f.O....
#           0010: C2 B9 F4 88                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E F2 D4 C7 59 B1 92 EC   94 86 9F 93 F2 55 20 6D  >...Y........U m
#           0010: 1D D4 4C 52                                        ..LR
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:26:09.724 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:26:09.955 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.955 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:26:09.957 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 13:26:09.957 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.962 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.973 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.974 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.974 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 13:26:09.976 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B6 97 90 BF 79 D1 08 8A BF EB 8E 3C C9 6A 80 7D 0C 47 A9 D2 24 D3 71 CB 00 14 CF 23 40 75 43 C3",
#     "session id"          : "4B F9 62 23 1E 3F 15 07 5B C2 D8 52 AE 12 69 E1 DC 85 6D F6 82 3D 4C 0E D6 1B 53 52 43 9B B9 07",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 9F 52 F6 A8 82 B5 AB B7   08 3D 96 19 61 05 4E F2  .R.......=..a.N.
#               0010: 5B EE A9 6C DA B7 42 A4   09 CB 0B C1 A1 72 28 69  [..l..B......r(i
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.995 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4B A4 8C CE 85 E7 C3 1E 7C 6A 7A B9 62 42 87 D4 A0 F1 52 FF 6E 08 F6 70 DE 7C 15 B6 0E 7F D5 B4",
#     "session id"          : "4B F9 62 23 1E 3F 15 07 5B C2 D8 52 AE 12 69 E1 DC 85 6D F6 82 3D 4C 0E D6 1B 53 52 43 9B B9 07",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 16 1B 3D B7 99 53 60 C3   87 52 8E 5A E0 A3 B0 35  ..=..S`..R.Z...5
#             0010: 99 92 69 F3 A1 34 30 6B   2F 5E 93 3F A4 16 25 5C  ..i..40k/^.?..%\
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.996 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.996 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:09.998 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.000 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.000 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:26:10.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.008 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.010 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.012 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.015 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.015 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.015 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:26:10.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 13:26:10.018 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 13:27:32.869 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:27:32.909 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:27:32.909 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:27:32.910 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:27:32.910 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36804/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28200ms
ok 65 stop command for single port in 31841ms
ok 66 status detects locally running solr in 14750ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2213ms
ok 69 copying files around in 6730ms
ok 70 upconfig in 2671ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1206ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1207ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 38s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m2.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5700 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5700/

All tests passed

Build Log:
[...truncated 1310 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38633/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 11:14:59.126; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 11:14:59.131; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 11:15:00.046; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 11:15:00.086; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22339ms
ok 61 start solr with client truststore and security manager in 25324ms
not ok 62 start solr with mTLS needed in 56200ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7HMoRH/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38633.
#
# Started Solr server on port 38633 (pid=199041). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38634.
#
# Started Solr server on port 38634 (pid=199492). Happy searching!
#
# INFO  - 2023-10-18 11:16:22.634; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 11:16:22.640; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 11:16:23.021; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 11:16:23.024; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 11:16:23.025; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:23.056 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 92 55 F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:58.000 UTC",
#     "not  after"         : "2024-01-16 11:15:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 F8 CC 8A 18 95 09 03   28 38 29 63 69 BC E0 9C  ........(8)ci...
#         0010: 01 9D 0E B9                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:23.061 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:50.000 UTC",
#     "not  after"         : "2024-01-16 11:15:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:23.075 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:23.162 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:23.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:23.164 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:23.164 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:23.309 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.310 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:23.312 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:23.312 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.317 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.329 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.329 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.329 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:23.332 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "20 E4 1C BB A4 F0 E2 1D 32 DF F0 30 DF DE D4 23 C8 D0 7E AF EB 70 6E 9E B9 3E 3C 8E D7 85 0B 43",
#   "session id"          : "84 F6 14 96 5F D6 BD 2B D9 3B 06 D5 15 EC 34 40 68 F5 7A D4 1B 19 9D F5 92 24 C7 7C 68 72 EF F9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3D 99 D6 8A B7 71 D5 5D   42 9B AF A6 20 68 9D 71  =....q.]B... h.q
#             0010: A2 4F 53 E8 3C 89 B4 29   4E 48 54 16 42 86 08 59  .OS.<..)NHT.B..Y
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.434 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B2 96 92 98 08 EF E5 7E 77 BA DD 1E 79 1C 12 03 72 18 AC E3 EE 81 D3 76 08 E5 2B 08 14 90 7F DA",
#   "session id"          : "84 F6 14 96 5F D6 BD 2B D9 3B 06 D5 15 EC 34 40 68 F5 7A D4 1B 19 9D F5 92 24 C7 7C 68 72 EF F9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4A D9 FD E8 2E B3 1E 18   F7 30 1E A1 8A 38 66 4D  J........0...8fM
#           0010: 02 F9 C0 C7 97 4C 5C 7F   A0 9F B1 C2 A1 67 BC 51  .....L\......g.Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.434 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.435 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.437 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.437 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.439 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.440 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.440 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.440 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.449 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.450 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.451 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.455 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.455 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.455 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.455 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.456 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.458 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.458 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.458 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.459 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.459 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.460 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.463 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 F0 65 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:55.000 UTC",
#       "not  after"         : "2024-01-16 11:15:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 81 7D 8D C7 E0 51 C8   57 70 5D E2 98 46 EB D0  W.....Q.Wp]..F..
#           0010: D2 38 26 BF                                        .8&.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.463 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.551 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.555 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 99 28 2B F1 0F 79 29 9E   9B 29 11 5A 32 36 57 94  .(+..y)..).Z26W.
#     0010: 33 DB DD B4 30 4E FF C3   F2 27 64 CE C2 EB 4E 56  3...0N...'d...NV
#     0020: 44 70 A1 79 64 52 B0 73   71 6D 11 53 CB 8B D8 83  Dp.ydR.sqm.S....
#     0030: C0 E2 89 6D 2E E1 C8 07   92 43 EB F9 EB D2 35 FA  ...m.....C....5.
#     0040: EF 3C 60 F1 AB 75 64 99   E3 DF EC A6 7B 28 96 61  .<`..ud......(.a
#     0050: 47 C9 E2 44 D7 DD 62 83   63 9A 57 0C CB C9 56 E5  G..D..b.c.W...V.
#     0060: 59 AD 57 56 7D 21 9D A0   27 68 D4 63 06 A3 4A 10  Y.WV.!..'h.c..J.
#     0070: 69 C2 4C 00 BB 75 98 02   50 B1 8F 80 48 3E 4A E7  i.L..u..P...H>J.
#     0080: 7A 54 15 B8 8F 7B 5E BD   9E 89 4D B1 67 93 EB 79  zT....^...M.g..y
#     0090: 0C 14 4D 1D 27 5E E2 6D   0C 3B B0 1A 65 18 84 1D  ..M.'^.m.;..e...
#     00A0: 1C CB 51 93 E5 40 21 4A   B9 DE AB 93 74 5C D7 9B  ..Q..@!J....t\..
#     00B0: A9 84 F3 6F 07 DE BF C9   AA 14 F6 B0 AD F6 F0 D0  ...o............
#     00C0: 6E C8 1D 1D 66 6A 8D E8   3E 07 F4 54 45 E3 16 AA  n...fj..>..TE...
#     00D0: 7D 4C F9 E1 1A 59 28 4B   55 0D 33 7A 85 DC 11 FB  .L...Y(KU.3z....
#     00E0: 62 E5 C5 9C D1 D0 A5 DF   21 A9 21 EC EC A3 BA BB  b.......!.!.....
#     00F0: 26 3D 11 7D A9 E3 28 49   31 A7 3C F1 B0 01 E1 AC  &=....(I1.<.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.557 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5C 05 16 BB 2E 23 89 C3   A9 D5 3A CB F4 C6 5D D2  \....#....:...].
#     0010: 6A 4D 8C 92 86 FB B0 E7   CD 2A 35 2A D4 40 F2 AC  jM.......*5*.@..
#     0020: 6F DB 99 62 2D DE C2 5A   B7 21 C0 73 D7 BA CE 3F  o..b-..Z.!.s...?
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.559 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:23.560 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.561 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:23.561 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.561 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:23.561 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:23.562 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.562 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.565 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 92 55 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:58.000 UTC",
#       "not  after"         : "2024-01-16 11:15:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 F8 CC 8A 18 95 09 03   28 38 29 63 69 BC E0 9C  ........(8)ci...
#           0010: 01 9D 0E B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 8F 07 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:52.000 UTC",
#       "not  after"         : "2024-01-16 11:15:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#           0010: 80 9A F8 DA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.590 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 CE 4D 4E B9 1E 26 02   D0 07 81 65 CB DB B1 DE  R.MN..&....e....
#     0010: 8B 04 11 A8 41 F3 E0 01   50 0D 24 FE F1 B9 24 15  ....A...P.$...$.
#     0020: 87 1C EE B9 DE D4 08 68   BE 1C 26 76 F1 37 F4 63  .......h..&v.7.c
#     0030: 3F 39 DA 6E 93 BF 8B 0B   36 1B 12 AF 5A 0A B0 2B  ?9.n....6...Z..+
#     0040: 55 0B 6F 3A AE 97 DF 18   92 4A B9 61 3D B3 3C 72  U.o:.....J.a=.<r
#     0050: E9 85 66 BE 6A A7 B2 E3   8D BD 23 78 34 75 75 28  ..f.j.....#x4uu(
#     0060: 2B CB 84 D6 30 87 29 7B   D4 23 EC AC 4E 16 D8 F3  +...0.)..#..N...
#     0070: 84 F6 4E EF A6 EC B0 4C   96 B1 31 F0 88 F8 3F FB  ..N....L..1...?.
#     0080: 27 FC 85 B2 3A 32 86 CA   18 78 6E 46 AD D9 06 EE  '...:2...xnF....
#     0090: 50 65 54 35 BD 6D 3E 69   A3 84 16 8B 74 0A 12 77  PeT5.m>i....t..w
#     00A0: 09 6E A0 60 1C CC 75 85   23 A0 89 BB 72 35 35 83  .n.`..u.#...r55.
#     00B0: 03 DF 88 AE EC F8 F6 14   80 E6 BB 1F B5 C4 E6 9D  ................
#     00C0: BD 4D 2F 5B B6 4F D8 95   A3 1B D2 4E C2 37 FE 32  .M/[.O.....N.7.2
#     00D0: D2 0C 46 27 37 45 3F E4   C4 DD 5D 74 29 86 49 06  ..F'7E?...]t).I.
#     00E0: CF 67 90 C5 2D 73 AE 94   22 8F 85 4A 0E 6C 18 B2  .g..-s.."..J.l..
#     00F0: 98 9A 16 AC F2 40 5B 17   D9 D8 6F D3 E3 F2 42 E2  .....@[...o...B.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.591 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE 1D C2 5C DB DB C3 4A   BE 18 54 B6 6C 81 97 52  ...\...J..T.l..R
#     0010: 15 4E 6E 0B E1 25 09 C8   BB 05 2A CE EA 29 7A B8  .Nn..%....*..)z.
#     0020: 98 5A D1 24 44 2C 23 9D   4D CF A7 91 C6 2D 05 88  .Z.$D,#.M....-..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:23.648 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "72 43 88 77 C0 A9 C7 CD 55 EF AD A0 12 E3 90 90 8F BE 7F 28 0A E0 A0 96 38 16 8A 3E 5B 2B 4C 50",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 11:16:23.920 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 11:16:23.921 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 11:16:24.858; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 11:16:24.864; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 11:16:25.218; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 11:16:25.221; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 11:16:25.222; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7HMoRH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:25.253 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 92 55 F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:58.000 UTC",
#     "not  after"         : "2024-01-16 11:15:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 F8 CC 8A 18 95 09 03   28 38 29 63 69 BC E0 9C  ........(8)ci...
#         0010: 01 9D 0E B9                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:25.257 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:50.000 UTC",
#     "not  after"         : "2024-01-16 11:15:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:25.271 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:25.496 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.497 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:25.498 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:25.499 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.515 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.515 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.515 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:25.518 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EF C1 C0 96 23 A2 49 0E 9C 42 1C DD A3 59 5F B5 28 F5 49 12 7D 5F 93 47 8E A5 FF 68 40 62 77 1C",
#   "session id"          : "8C C5 E8 1A EA 8A A3 E6 64 26 E2 9A 5B 6E D5 7D 76 4D 75 8A 14 F3 38 A6 38 00 D3 7C 1C 71 12 05",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 12 0E C2 F8 AD 47 24   B1 BF 9E 2E B8 A5 3E 1E  D.....G$......>.
#             0010: CC EB 84 3E 3A B2 DB D2   BB EE 2C B9 91 74 B6 69  ...>:.....,..t.i
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.614 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 A7 70 8F AB 4C DD 21 C9 FA B1 82 18 11 87 83 B1 3E E2 35 CA 6E 18 5A D8 A7 D3 4B E4 5F 46 AA",
#   "session id"          : "8C C5 E8 1A EA 8A A3 E6 64 26 E2 9A 5B 6E D5 7D 76 4D 75 8A 14 F3 38 A6 38 00 D3 7C 1C 71 12 05",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 67 CE 60 5D A7 43 69 60   05 A5 22 D5 73 1E 78 B7  g.`].Ci`..".s.x.
#           0010: 62 28 14 1E 7C 4D 9A 46   A0 9D 17 2C 5D 34 11 19  b(...M.F...,]4..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.614 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.614 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.617 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.619 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.619 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.629 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.630 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.631 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.635 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.635 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.635 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.635 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.636 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.636 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.636 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.637 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.638 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.638 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.638 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.639 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.640 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.640 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.642 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 F0 65 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:55.000 UTC",
#       "not  after"         : "2024-01-16 11:15:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 81 7D 8D C7 E0 51 C8   57 70 5D E2 98 46 EB D0  W.....Q.Wp]..F..
#           0010: D2 38 26 BF                                        .8&.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.643 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:25.692 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:25.693 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:25.693 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:16:25.693 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.721 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 8F 07 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 11:15:52.000 UTC",
#     "not  after"         : "2024-01-16 11:15:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#         0010: 80 9A F8 DA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#         0010: 51 02 96 89                                        Q...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.725 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 34 12 9B C6 DF 51 0E   60 3F BD D4 53 71 68 53  .4....Q.`?..SqhS
#     0010: 4F 34 12 8F 23 16 9F 81   5A 14 D3 A9 74 04 32 C1  O4..#...Z...t.2.
#     0020: 8E 4F 95 AB 1E EC FE 0E   42 43 68 B5 43 55 9E F2  .O......BCh.CU..
#     0030: 3D F9 D9 25 24 18 5B A9   AC 63 42 6A 24 B4 82 D3  =..%$.[..cBj$...
#     0040: 5F E1 A1 9B A0 EB 75 39   7D F5 C4 91 35 F3 A1 40  _.....u9....5..@
#     0050: BD 69 5F 63 16 19 D8 48   E3 E1 B8 16 79 F2 3F 07  .i_c...H....y.?.
#     0060: 35 A2 0A 63 F6 3A E8 97   94 2F 8D FE 77 44 D0 50  5..c.:.../..wD.P
#     0070: B7 FE 5A 66 BF 87 23 D9   6B E5 09 B7 4E 6E 47 27  ..Zf..#.k...NnG'
#     0080: B5 19 57 97 91 43 44 07   B5 5F 41 7A 62 CE 5B D7  ..W..CD.._Azb.[.
#     0090: 5D 79 CB 2E 0D 1E 1E C9   71 70 1B E2 AD 28 82 C2  ]y......qp...(..
#     00A0: FF 6E 02 DE C8 48 0A 49   B3 CC E4 91 EC 03 DB B9  .n...H.I........
#     00B0: 32 2B FD 1B B3 31 D1 2C   FE 7A D0 3C DF BB CC C6  2+...1.,.z.<....
#     00C0: 5A 02 30 39 F1 F6 01 19   AB BE 49 1F 1B 96 94 3F  Z.09......I....?
#     00D0: E2 6D 97 47 0B 6C A6 2D   9A E5 5D 9B 90 6A 35 16  .m.G.l.-..]..j5.
#     00E0: C6 69 44 1E 3B 74 DA E5   98 C4 F9 5C 96 87 17 F6  .iD.;t.....\....
#     00F0: B7 DE E4 45 5C 11 7F 35   C9 4A 2A 9F 31 DF 5E 9A  ...E\..5.J*.1.^.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.727 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 BF A3 F0 34 E0 8E A6   BE DC 0E 2D 9C 79 0E 2C  ....4......-.y.,
#     0010: D4 53 62 70 01 A7 BE 55   A3 FB 59 97 BF 7C AA 35  .Sbp...U..Y....5
#     0020: 9D 74 F6 C4 A7 91 8C FD   7E 73 89 14 DD 29 87 2E  .t.......s...)..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.729 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:25.730 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.730 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:25.731 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.731 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 11:16:25.731 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:25.732 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.732 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.735 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 92 55 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:58.000 UTC",
#       "not  after"         : "2024-01-16 11:15:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 F8 CC 8A 18 95 09 03   28 38 29 63 69 BC E0 9C  ........(8)ci...
#           0010: 01 9D 0E B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 8F 07 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:52.000 UTC",
#       "not  after"         : "2024-01-16 11:15:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#           0010: 80 9A F8 DA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.761 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 31 46 E3 C4 63 8B 4B   8A 4C A6 08 CF 8E 5D FD  61F..c.K.L....].
#     0010: A6 AA 6B 47 FB 53 3A 71   44 89 02 28 41 74 A0 FF  ..kG.S:qD..(At..
#     0020: 92 E0 33 52 DC 77 64 B7   5D FC D1 27 6F AA AE 02  ..3R.wd.]..'o...
#     0030: 58 05 53 6E 25 67 24 66   53 E1 CC 45 BE 5D 57 ED  X.Sn%g$fS..E.]W.
#     0040: 05 6D 9E BA 4E EF 14 2B   B2 B9 E8 40 8C 5D 97 F2  .m..N..+...@.]..
#     0050: 54 1F B9 A8 70 0E 14 1F   E0 A8 ED 56 1E E8 54 E2  T...p......V..T.
#     0060: D6 52 82 63 89 14 62 D5   62 6A 62 C4 97 02 90 8A  .R.c..b.bjb.....
#     0070: A4 AB 13 30 15 DA CE 43   04 D1 29 CD 7F 62 C9 C3  ...0...C..)..b..
#     0080: B2 7A D0 C3 69 59 87 47   7A 17 12 60 4A 65 19 78  .z..iY.Gz..`Je.x
#     0090: E6 81 A3 68 4E 79 52 53   24 96 D3 27 A9 DD 4D 42  ...hNyRS$..'..MB
#     00A0: B3 49 9D 9D A3 86 40 9C   BA A4 6F E6 AE 5E 9B F8  .I....@...o..^..
#     00B0: 48 C8 12 AC 6E 27 99 AF   41 C5 B7 C0 07 BF 65 F9  H...n'..A.....e.
#     00C0: DF CB 76 08 73 A3 D7 A2   2F B7 B9 39 1A C5 F6 0D  ..v.s.../..9....
#     00D0: 87 04 EB DD D4 CC 9E 5E   5A 8B BF 4E 11 C4 B8 7F  .......^Z..N....
#     00E0: 94 D3 48 2D B2 D0 08 FD   D6 4E F5 30 DE 1F 01 54  ..H-.....N.0...T
#     00F0: BB DF D3 96 ED 1E 84 9B   86 7F 26 B6 95 4D 3D 67  ..........&..M=g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.762 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 46 7D 8A 86 29 26 7A   7E 17 61 D7 06 A1 25 B1  .F...)&z..a...%.
#     0010: 05 C5 6A 55 40 7F 4D 69   0A D1 E5 63 0A 67 07 C8  ..jU@.Mi...c.g..
#     0020: 07 63 12 18 63 2E DA B6   96 7D 55 B5 34 09 F6 AA  .c..c.....U.4...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.762 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:25.817 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AA CF 39 34 9E 33 B3 4D 53 DB D2 0E E6 C3 07 05 6E 29 6B 73 0B B0 F4 BB CD 16 01 A8 81 EA 51 C6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 11:16:26.091 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 11:16:26.092 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 11:16:37.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:37.591 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1F 45 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:50.000 UTC",
#       "not  after"         : "2024-01-16 11:15:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#           0010: 80 9A F8 DA                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 8F 07 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 11:15:52.000 UTC",
#       "not  after"         : "2024-01-16 11:15:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 08 93 54 B1 C0 A2 40   F8 9F 35 3D 66 9A 5D 76  +..T...@..5=f.]v
#           0010: 80 9A F8 DA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 4D EC C4 04 E0 03 AB   4B A2 8E BC 33 F4 CC 5F  =M......K...3.._
#           0010: 51 02 96 89                                        Q...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 11:16:37.606 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:37.847 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.847 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:37.849 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 11:16:37.849 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.866 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.867 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 11:16:37.869 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2D D5 30 5B 3E F1 04 F1 1B 3F A2 70 71 27 68 73 3C 51 B1 BE 92 0F 39 D0 6B 07 8F 34 27 22 DC 94",
#     "session id"          : "1B D8 0D 87 FD E6 7A F3 B0 90 AB 92 9F 02 0B A3 75 55 32 D7 64 14 20 93 D5 C1 FD DC C6 96 7F 5A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B5 81 93 2D 92 7E 6C FB   CC 38 81 7D DD 55 5D E2  ...-..l..8...U].
#               0010: 7F 63 E3 BE 07 D7 F1 A4   6E E0 6D D6 B5 F2 DC 76  .c......n.m....v
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.888 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DD C8 74 D9 DE 8C 31 28 E3 1F 5B 97 87 56 5E 1E 7D 4C 82 71 5F A8 33 C5 51 92 58 C5 FD 38 21 55",
#     "session id"          : "1B D8 0D 87 FD E6 7A F3 B0 90 AB 92 9F 02 0B A3 75 55 32 D7 64 14 20 93 D5 C1 FD DC C6 96 7F 5A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E B4 BF A6 7E 7A A9 90   E5 31 28 E2 20 01 32 5C  .....z...1(. .2\
#             0010: 6A A6 86 CB 66 BC 7A 6B   29 06 EE 99 B1 05 61 1D  j...f.zk).....a.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.888 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.888 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.890 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.892 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.892 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.901 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.902 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.903 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.907 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.907 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.907 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:37.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:16:37.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 11:16:37.909 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 11:17:56.462 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:17:56.510 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:17:56.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:17:56.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 11:17:56.516 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38634/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28154ms
ok 65 stop command for single port in 31042ms
ok 66 status detects locally running solr in 14650ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2173ms
ok 69 copying files around in 6596ms
ok 70 upconfig in 2664ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1202ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 45s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m9s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5699 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5699/

All tests passed

Build Log:
[...truncated 1308 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45375/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 09:10:15.538; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 09:10:15.543; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 09:10:16.477; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 09:10:16.520; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22869ms
ok 61 start solr with client truststore and security manager in 24821ms
not ok 62 start solr with mTLS needed in 59572ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-T0se03/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45375.
#
# Started Solr server on port 45375 (pid=199211). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45376.
#
# Started Solr server on port 45376 (pid=199659). Happy searching!
#
# INFO  - 2023-10-18 09:11:39.389; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 09:11:39.395; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 09:11:39.787; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 09:11:39.790; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 09:11:39.791; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:39.826 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 7B 7E 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:15.000 UTC",
#     "not  after"         : "2024-01-16 09:11:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 9B E1 2A AE 7A 26 F8   85 B2 8D D7 16 72 9D EF  0..*.z&......r..
#         0010: F7 75 75 EB                                        .uu.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:39.830 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 3D F4 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:07.000 UTC",
#     "not  after"         : "2024-01-16 09:11:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:39.845 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:40.177 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:40.177 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:40.178 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:40.178 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:40.333 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.334 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:40.336 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:40.336 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.342 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.354 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.354 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:40.357 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "96 A4 B4 13 79 48 B3 80 57 0B E7 13 7A 0B 10 1E AE 43 8B 08 92 3F FA 29 E4 66 DE 07 0E 22 78 55",
#   "session id"          : "C9 C4 57 CA 85 00 97 C8 78 F2 C4 EC 6C 37 28 B1 7B 31 86 D6 FC 64 D8 D3 62 BF 09 F6 90 1A A1 AD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CF 09 37 6C AF 24 5C CA   4F 21 77 DD 13 8C 04 4C  ..7l.$\.O!w....L
#             0010: 58 34 27 4E 82 77 4D 8D   1C 24 66 E9 EF ED 65 05  X4'N.wM..$f...e.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.466 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9D 73 2D 76 9A 28 D7 A1 E2 77 15 B2 EB 5B 4A F7 CB A5 91 38 F2 DA C6 06 CF 07 99 6E CA 24 7E 7C",
#   "session id"          : "C9 C4 57 CA 85 00 97 C8 78 F2 C4 EC 6C 37 28 B1 7B 31 86 D6 FC 64 D8 D3 62 BF 09 F6 90 1A A1 AD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FA D1 04 5A 76 4A DB A8   C9 E0 66 21 17 6A 9C 4C  ...ZvJ....f!.j.L
#           0010: F6 6A 85 3F 1B 91 00 0A   8B EF 98 0D 7B 25 C3 5E  .j.?.........%.^
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.467 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.467 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.469 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.472 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.472 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.473 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.481 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.483 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.484 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.490 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.491 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.492 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.497 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 94 08 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:11.000 UTC",
#       "not  after"         : "2024-01-16 09:11:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 4B C6 67 2B EC 6A 78   37 5E A0 FF 3A 85 32 1B  .K.g+.jx7^..:.2.
#           0010: 17 23 88 F6                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.498 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.590 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.595 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 26 B7 C4 9A 2B D2 92 8E   19 56 F2 25 DD 92 F2 FB  &...+....V.%....
#     0010: 0C E2 16 18 1B 00 89 B4   CE E2 75 19 FC 0E 6A B7  ..........u...j.
#     0020: 43 98 38 74 AD F7 D7 CD   D3 CA 44 B8 C2 FC E3 C9  C.8t......D.....
#     0030: F5 37 AC 62 A0 13 2D 34   F1 DA 5B 7F EE 06 EF 9B  .7.b..-4..[.....
#     0040: F1 ED F0 FC A2 CB 9E BC   D5 10 F6 FC 61 E8 61 39  ............a.a9
#     0050: E6 69 DC B9 27 BD 27 DC   5B 4F C2 64 5E DA F3 65  .i..'.'.[O.d^..e
#     0060: 10 A2 62 57 46 01 33 E0   76 D3 7A 94 0F 2A 5C 1D  ..bWF.3.v.z..*\.
#     0070: 6D EC 46 AE 7E D4 1D F2   49 13 85 CC 95 06 06 C3  m.F.....I.......
#     0080: F2 D1 E7 41 F5 98 7D 70   39 63 D2 76 4C B3 4D 47  ...A...p9c.vL.MG
#     0090: 1D 7E 0D D8 C4 F1 D2 13   77 58 E6 0C 1C 59 D0 EE  ........wX...Y..
#     00A0: F1 13 87 CC 07 03 F4 F6   A8 E6 65 FD F1 DE 2A 86  ..........e...*.
#     00B0: DE 84 19 E5 06 E8 0B C6   07 0E 4B 10 28 3E EB 39  ..........K.(>.9
#     00C0: C0 D1 F3 5F 4F D0 95 46   BA D7 11 5B 98 39 40 DA  ..._O..F...[.9@.
#     00D0: 81 54 FA FD 8F DF 6C C1   57 19 BD DC AF 64 55 99  .T....l.W....dU.
#     00E0: 57 DB 4B CB F0 ED 18 4B   B1 7F D0 07 D7 2E 5D 82  W.K....K......].
#     00F0: 08 AE DD E0 E7 79 83 A2   BC 08 9B 9D 6D 56 A1 10  .....y......mV..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.597 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0C E0 EF 0B A3 28 B6 4B   D4 B1 76 D8 00 63 54 30  .....(.K..v..cT0
#     0010: 0B 86 2D 03 5F 35 C7 52   01 36 3E A7 EE 60 B4 DE  ..-._5.R.6>..`..
#     0020: 8E CC D9 15 6F C1 5B C6   93 96 EB 97 BA D8 4E 73  ....o.[.......Ns
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.600 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:40.601 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.601 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:40.602 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.602 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:40.602 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:40.602 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.603 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.606 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 7B 7E 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:15.000 UTC",
#       "not  after"         : "2024-01-16 09:11:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 9B E1 2A AE 7A 26 F8   85 B2 8D D7 16 72 9D EF  0..*.z&......r..
#           0010: F7 75 75 EB                                        .uu.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 9D 9D 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:09.000 UTC",
#       "not  after"         : "2024-01-16 09:11:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#           0010: 87 14 F9 82                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.632 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D 03 0D FA 60 14 CE 6E   77 AC B2 51 61 49 80 F8  m...`..nw..QaI..
#     0010: D6 2A 79 75 3A 70 CF 9D   BA E3 DE B5 43 E0 1C 49  .*yu:p......C..I
#     0020: FC 81 AD CF A0 D8 09 EA   32 6C 42 AB 01 6B 59 6C  ........2lB..kYl
#     0030: 81 29 B6 B0 E2 E9 CD 24   37 C7 9B D7 26 EA DD 1E  .).....$7...&...
#     0040: 9A 5C C1 0C 43 4F 9B C1   E0 26 4E 96 15 F5 94 31  .\..CO...&N....1
#     0050: 20 45 9C DE F5 72 0B 2D   7E AA 33 CE CA 10 B3 27   E...r.-..3....'
#     0060: FE 17 34 6F 68 98 BB CB   3B E9 6C C3 E6 98 87 59  ..4oh...;.l....Y
#     0070: 5D 77 2D 3E FF A5 40 D8   D5 B9 BD CE A7 58 54 16  ]w->..@......XT.
#     0080: 38 7A F1 BE AC D0 6A D9   D0 20 75 6A EA 21 A2 85  8z....j.. uj.!..
#     0090: 39 69 7B CB E7 69 A0 F7   93 AF 69 37 C8 0D 7F 02  9i...i....i7....
#     00A0: 25 B8 D9 F0 59 DE A4 3E   C5 91 81 D7 E9 26 26 33  %...Y..>.....&&3
#     00B0: AB 14 EB F1 4E AB 03 CB   59 BC 43 A6 C9 D2 1D FE  ....N...Y.C.....
#     00C0: 22 8B 91 16 6D 04 46 5F   AC 05 8F A1 5B A5 04 D3  "...m.F_....[...
#     00D0: 59 0B 8A AF 12 0A D5 D3   A5 93 F8 53 FA B8 D5 45  Y..........S...E
#     00E0: 65 83 07 71 DF 73 48 BF   64 29 89 D0 86 33 55 44  e..q.sH.d)...3UD
#     00F0: 69 02 93 92 B9 2B 37 AB   CD 00 FE EB BD 49 69 9D  i....+7......Ii.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.633 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 28 AA B4 BF B8 FF 74   67 86 4D F3 02 1C 6D 41  @(.....tg.M...mA
#     0010: D0 9B 32 46 F7 21 FE 1B   E4 05 90 63 D9 A5 4B 6C  ..2F.!.....c..Kl
#     0020: 22 08 A4 E2 AA BE 14 6B   25 37 7D 9F 66 06 F3 80  "......k%7..f...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.634 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:40.694 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EB 12 66 94 FF 32 A2 24 A0 AC 9F 1C 29 6D 71 B8 92 0D DE 34 87 FA 35 A8 7D DF 62 86 5A D0 85 FE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 09:11:40.975 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 09:11:40.976 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 09:11:41.907; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 09:11:41.912; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 09:11:42.272; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 09:11:42.275; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 09:11:42.275; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-T0se03/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:42.308 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 7B 7E 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:15.000 UTC",
#     "not  after"         : "2024-01-16 09:11:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 9B E1 2A AE 7A 26 F8   85 B2 8D D7 16 72 9D EF  0..*.z&......r..
#         0010: F7 75 75 EB                                        .uu.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:42.313 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 3D F4 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:07.000 UTC",
#     "not  after"         : "2024-01-16 09:11:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:42.327 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:42.408 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:42.417 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:42.417 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:11:42.417 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:42.556 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:42.558 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:42.559 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.575 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.576 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:42.578 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BE F0 50 5F B0 D8 31 BD 3F C6 8A 31 67 45 FD 21 60 42 49 72 79 92 68 E8 F1 75 88 30 C4 49 5F 03",
#   "session id"          : "60 77 F6 44 9E 06 A9 D5 98 0A 11 C7 2F F6 54 2D 5D DB 1A 78 4F DF 87 33 8C F5 7C 2E A5 14 78 0B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EA CE F3 F8 70 C7 54 1E   A5 B9 D2 98 31 A4 63 A2  ....p.T.....1.c.
#             0010: 28 1C 89 41 EA B2 D9 34   42 4F B7 1F 77 88 77 27  (..A...4BO..w.w'
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.675 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "16 9B 2D 02 BE 77 FC F7 95 AD 6D C0 43 A4 D1 CC 3F FD AA 9F EA E6 98 59 86 22 C5 34 CD A5 A9 8E",
#   "session id"          : "60 77 F6 44 9E 06 A9 D5 98 0A 11 C7 2F F6 54 2D 5D DB 1A 78 4F DF 87 33 8C F5 7C 2E A5 14 78 0B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 94 14 69 75 9E 8A CA 8D   29 8E F6 A7 64 69 2B 94  ..iu....)...di+.
#           0010: 80 70 47 96 52 EC 23 1F   8C F7 5B 01 F5 AD D8 0D  .pG.R.#...[.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.676 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.676 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.678 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.681 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.681 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.683 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.683 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.690 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.691 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.692 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.696 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.699 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.699 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.699 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.700 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.700 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.701 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.701 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.704 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 94 08 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:11.000 UTC",
#       "not  after"         : "2024-01-16 09:11:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BD 4B C6 67 2B EC 6A 78   37 5E A0 FF 3A 85 32 1B  .K.g+.jx7^..:.2.
#           0010: 17 23 88 F6                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.704 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.788 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 9D 9D 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 09:11:09.000 UTC",
#     "not  after"         : "2024-01-16 09:11:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#         0010: 87 14 F9 82                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#         0010: 4F BA 78 83                                        O.x.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.792 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 76 9D 12 88 24 B1 30   AE 5C BB 98 53 C6 78 1E  .v...$.0.\..S.x.
#     0010: 13 56 B9 11 5B 77 5E FE   E8 35 CC BA C6 77 CB A8  .V..[w^..5...w..
#     0020: BC 24 4A F3 9F 79 AE 04   DE 3D 41 30 47 56 47 9E  .$J..y...=A0GVG.
#     0030: 89 3B 0B 8F DE DD A6 FA   07 77 48 F2 1D 29 B5 5E  .;.......wH..).^
#     0040: BC 21 FF 4C 58 9F 21 50   47 11 99 6F 1C 37 BD 84  .!.LX.!PG..o.7..
#     0050: 7F C9 CD B0 18 D6 20 9F   49 F0 A1 B4 45 40 65 7B  ...... .I...E@e.
#     0060: 76 1B EE E1 2C FE A7 E1   AF D9 52 3A 24 24 AC 79  v...,.....R:$$.y
#     0070: A5 38 92 24 5E 52 16 97   47 36 89 5C A6 71 0B 89  .8.$^R..G6.\.q..
#     0080: 5C B8 08 18 B4 09 EC 1B   A8 AA 58 6D EE D4 49 F0  \.........Xm..I.
#     0090: A4 99 B7 B9 ED 71 AD 64   EF 86 24 6C F9 DE 06 24  .....q.d..$l...$
#     00A0: 47 30 9C 7B A1 E1 ED 27   6A D3 1D BA 43 C8 9A 60  G0.....'j...C..`
#     00B0: CF 8B C5 D8 A3 3E 56 16   1E A0 FB A3 F4 65 B1 3C  .....>V......e.<
#     00C0: 9A 05 9A FD 92 4D 0D 19   D1 F5 12 60 40 5C 56 C0  .....M.....`@\V.
#     00D0: 9B 2C 83 9B DB 29 24 1E   6C DE A1 DE F2 E8 4D 96  .,...)$.l.....M.
#     00E0: 53 37 10 2D D5 55 C9 9B   DF 11 55 8D 06 73 AA FD  S7.-.U....U..s..
#     00F0: 95 6D 2D 5C 06 74 2B 24   2B 9E DE B1 CE 7E 75 49  .m-\.t+$+.....uI
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.794 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF 76 A8 84 2C CD 57 89   4D 69 40 54 58 88 7D DB  .v..,.W.Mi@TX...
#     0010: CB E6 27 21 03 15 14 34   90 D5 81 5B 24 17 E7 4C  ..'!...4...[$..L
#     0020: 4F 4F 3B 76 1B 86 AE BE   03 E2 6A CA 23 11 6C 80  OO;v......j.#.l.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.796 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:42.797 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.797 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:42.798 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.798 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 09:11:42.798 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:42.798 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.798 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.801 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 7B 7E 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:15.000 UTC",
#       "not  after"         : "2024-01-16 09:11:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 9B E1 2A AE 7A 26 F8   85 B2 8D D7 16 72 9D EF  0..*.z&......r..
#           0010: F7 75 75 EB                                        .uu.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 9D 9D 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:09.000 UTC",
#       "not  after"         : "2024-01-16 09:11:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#           0010: 87 14 F9 82                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.826 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 25 4D 16 CB 17 DF C5   28 9D 9E 5B 7F 8D 3A 7E  >%M.....(..[..:.
#     0010: 40 AF 9D 38 E8 48 4A E6   D5 B1 73 F7 BE 51 6E A3  @..8.HJ...s..Qn.
#     0020: C8 34 39 6A 90 94 35 4D   17 72 7E C2 65 48 E4 D8  .49j..5M.r..eH..
#     0030: 1E E0 EB 93 98 B4 C5 E4   15 3D AE 73 F3 BE EE E7  .........=.s....
#     0040: C4 E4 7E 9C 2B 60 22 4D   C7 09 CA D6 BF F0 66 B0  ....+`"M......f.
#     0050: 63 80 98 8B 28 C1 64 CA   A6 E2 6B 22 E3 CE DA AD  c...(.d...k"....
#     0060: 79 92 A7 8B D8 54 69 D2   AF 30 D9 88 7D 9B CB F5  y....Ti..0......
#     0070: 0E 8E A7 BA 41 F9 77 D7   25 EB 50 F2 71 FB 09 4E  ....A.w.%.P.q..N
#     0080: C2 B1 AC 3D E4 40 BE 04   B0 56 4D D8 44 40 18 84  ...=.@...VM.D@..
#     0090: 6B BA 71 82 7D B1 FB 5E   EA 77 CF 43 54 AD 8B C8  k.q....^.w.CT...
#     00A0: E3 88 7B 65 09 7B C8 08   72 1D 1C E2 67 2E 64 1F  ...e....r...g.d.
#     00B0: A1 AC FF 25 FE EF 80 BF   C7 5B A9 F5 D3 1B 46 34  ...%.....[....F4
#     00C0: FF 48 D4 DB 7C 75 49 3F   00 A9 2D 41 91 4D C2 F7  .H...uI?..-A.M..
#     00D0: E2 CD 0C D8 AE 9A 42 6D   BC 3B A2 0B C0 7D 4E F7  ......Bm.;....N.
#     00E0: C1 AB 22 EA 0D 4B 45 05   5C 68 3D 40 4B 6B F3 9D  .."..KE.\h=@Kk..
#     00F0: B5 EF 3F 52 B5 40 CB E7   48 BE 73 57 EC CB 15 BB  ..?R.@..H.sW....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.827 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 18 71 30 A3 61 40 17 68   CE EF AE 1E B3 21 89 0F  .q0.a@.h.....!..
#     0010: B6 C2 C3 A8 EC 7F 96 F8   17 E5 2A A0 48 45 B6 D9  ..........*.HE..
#     0020: E9 B8 4B 43 0D 2B 4D 34   33 7B EE F5 85 92 2A 7D  ..KC.+M43.....*.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.828 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:42.882 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E0 C8 CD 44 69 EB 74 BE C0 6A A9 01 ED 60 0C C1 32 2B 8A 12 0A D1 AC 29 92 34 D2 EC 6E BE 7F DA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 09:11:43.205 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 09:11:43.206 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 09:11:54.595; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:54.921 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 3D F4 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:07.000 UTC",
#       "not  after"         : "2024-01-16 09:11:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#           0010: 87 14 F9 82                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 9D 9D 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 09:11:09.000 UTC",
#       "not  after"         : "2024-01-16 09:11:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 2D 8D 75 FA 6F 01 4D   76 E7 38 93 78 1F 1B AD  U-.u.o.Mv.8.x...
#           0010: 87 14 F9 82                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 55 14 27 FB AE A6 6C   34 00 E6 9D C5 4D 92 42  .U.'...l4....M.B
#           0010: 4F BA 78 83                                        O.x.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 09:11:54.936 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:55.172 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:55.174 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 09:11:55.174 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.192 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 09:11:55.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "97 C9 0F 9C 7F 46 38 CC 50 03 A5 4D F4 1C DA 08 36 C4 BB E5 83 92 1D 8D E2 9D 9F 93 1A 53 E3 EB",
#     "session id"          : "32 A1 86 8D 2C 5B 72 74 C7 39 4F 8E 5B 2F B5 D2 7B 7C 7B 36 A7 67 22 CD 09 88 1C 65 C7 68 21 2D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 1A FA 5C B0 0D 40 77 C6   91 43 DE BC C8 AE B2 9E  ..\..@w..C......
#               0010: E3 86 82 C1 03 E5 5C 07   2D 6A 6D 8B D3 91 2B 69  ......\.-jm...+i
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.217 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4A 62 43 DC 90 01 E7 8E 96 38 14 DC 02 CF 7C 61 40 2A 36 02 F8 0D D3 93 CE 87 85 18 3A 80 9A 95",
#     "session id"          : "32 A1 86 8D 2C 5B 72 74 C7 39 4F 8E 5B 2F B5 D2 7B 7C 7B 36 A7 67 22 CD 09 88 1C 65 C7 68 21 2D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 33 4F 3C 64 42 4B A6 37   F9 97 6B AF 00 C1 FE 37  3O<dBK.7..k....7
#             0010: 0B 1F EC B6 6B F7 18 3F   D1 44 3C 96 4A FE 24 08  ....k..?.D<.J.$.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.217 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.217 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.218 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.218 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.219 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.222 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.222 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.222 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.222 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:55.223 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.224 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.234 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.235 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.241 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.242 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.242 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:55.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:11:55.243 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 09:11:55.245 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 09:13:16.485 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:13:16.526 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:13:16.526 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:13:16.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 09:13:16.527 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45376/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28433ms
ok 65 stop command for single port in 30914ms
ok 66 status detects locally running solr in 14686ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2206ms
ok 69 copying files around in 6606ms
ok 70 upconfig in 2667ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1201ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 11s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5698 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5698/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46635/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 06:37:36.157; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 06:37:36.162; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 06:37:37.058; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 06:37:37.098; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22332ms
ok 61 start solr with client truststore and security manager in 25485ms
not ok 62 start solr with mTLS needed in 57580ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-izRb1L/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46635.
#
# Started Solr server on port 46635 (pid=199889). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46636.
#
# Started Solr server on port 46636 (pid=200314). Happy searching!
#
# INFO  - 2023-10-18 06:38:59.836; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 06:38:59.841; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 06:39:00.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 06:39:00.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 06:39:00.196; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:00.227 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A B5 35 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:36.000 UTC",
#     "not  after"         : "2024-01-16 06:38:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 B7 E4 9A A7 EF 76 24   E6 B9 D7 38 0C 10 C2 B8  ......v$...8....
#         0010: 19 A4 1A 51                                        ...Q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:00.231 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 D2 D2 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:28.000 UTC",
#     "not  after"         : "2024-01-16 06:38:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:00.245 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:00.330 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:00.331 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:00.331 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:00.331 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:00.471 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.471 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:00.473 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:00.473 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.478 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.490 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.490 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.490 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:00.492 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B1 CC C9 E5 41 AF 05 DA 11 D1 6D 0A C0 C7 8C 8C 89 74 65 46 5D 6D 22 29 0F 95 6F D3 11 31 26 AA",
#   "session id"          : "31 5E 11 68 CE 4C AF 74 1E A1 6F 4C 03 F4 C0 BA 26 CC F3 61 36 42 62 3F C4 8E 54 A2 08 38 C0 5C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F4 53 5A 23 95 0F D7 61   5D B2 32 42 CA AB D8 51  .SZ#...a].2B...Q
#             0010: B5 6D 40 EC DF 31 76 1E   DC BA BA 93 F4 E8 B7 70  .m@..1v........p
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.601 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A6 40 14 DF F6 2C 41 CA 23 6A 30 1A E6 2C 79 8C AE E4 49 0B 7A 9B CF 09 8B FF 73 7F 84 CE F4 6B",
#   "session id"          : "31 5E 11 68 CE 4C AF 74 1E A1 6F 4C 03 F4 C0 BA 26 CC F3 61 36 42 62 3F C4 8E 54 A2 08 38 C0 5C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 18 56 71 D0 61 BF A7 25   A8 7B B3 12 85 2F 0B 94  .Vq.a..%...../..
#           0010: CC AB 16 D2 18 2D C8 B5   68 D2 C9 E8 BC B4 24 4B  .....-..h.....$K
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.601 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.602 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.604 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.606 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.606 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.607 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.616 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.617 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.619 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.622 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.622 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.623 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.625 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.625 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.630 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C F6 11 6F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:32.000 UTC",
#       "not  after"         : "2024-01-16 06:38:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 9B 5C B5 3D E2 94 C6   E0 7B 14 93 F2 2F 8A 19  P.\.=......../..
#           0010: 2D EF E3 90                                        -...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.631 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.715 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.718 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 18 22 11 44 E5 2B A1   1C FC C1 58 BD 4F E8 1A  e.".D.+....X.O..
#     0010: F0 81 3D 3B DB AA BD 54   9D E4 38 F2 96 02 DC 34  ..=;...T..8....4
#     0020: CF 85 50 81 09 6B 97 FF   86 E1 B6 16 BB BE 83 E6  ..P..k..........
#     0030: FB 3A 7C 1A 6E 24 8E D7   2F 63 6F 8C BB 32 95 2F  .:..n$../co..2./
#     0040: 71 09 0C B4 A8 A5 EA D5   E9 B0 F7 EF EA 9B AB AF  q...............
#     0050: 25 9C E3 8D 31 6B AE AB   78 3D C6 85 F3 72 E8 B8  %...1k..x=...r..
#     0060: B2 69 46 A7 1C DC 0F 65   E8 75 0D 83 33 BC 7D 2D  .iF....e.u..3..-
#     0070: 22 0C D2 C4 0C 2D F7 2B   1C 6D B7 99 55 97 1A CB  "....-.+.m..U...
#     0080: 4F DB 02 79 6A 98 C1 EC   6B 79 5D 79 0C 5B 9A E7  O..yj...ky]y.[..
#     0090: 64 37 26 39 52 C8 60 83   66 A2 10 F5 F8 95 45 C4  d7&9R.`.f.....E.
#     00A0: 31 2A 74 09 EC 06 CC EE   0F 3B 0F CD 12 10 F3 2E  1*t......;......
#     00B0: 19 2E FF 85 27 B9 8A D9   7D 86 70 7D 18 80 47 3C  ....'.....p...G<
#     00C0: F3 AF 4D 4F 5F AC DB 8A   F2 FB AB 4E BF 91 88 93  ..MO_......N....
#     00D0: 3C 90 CF 66 D5 47 EE E7   9A 1B E4 62 E4 E9 79 1A  <..f.G.....b..y.
#     00E0: 3B CD 93 1C 06 2C 58 53   2C 78 01 E5 55 A9 0C 03  ;....,XS,x..U...
#     00F0: A2 38 4B 72 A2 CB E0 B3   6E C0 37 EC 83 C9 E3 08  .8Kr....n.7.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.721 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 72 E0 F0 B7 58 E7 65 C1   9E 59 4D D5 C8 B6 32 3B  r...X.e..YM...2;
#     0010: 74 F0 39 EB F2 19 4A 8E   EA 49 C2 82 37 5A BE DF  t.9...J..I..7Z..
#     0020: 72 E2 C6 7A B2 A2 E6 B0   34 92 EC 0D 18 FB 79 2F  r..z....4.....y/
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.724 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:00.725 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.725 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:00.726 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.726 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:00.726 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:00.727 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.728 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.731 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A B5 35 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:36.000 UTC",
#       "not  after"         : "2024-01-16 06:38:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 B7 E4 9A A7 EF 76 24   E6 B9 D7 38 0C 10 C2 B8  ......v$...8....
#           0010: 19 A4 1A 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 E6 06 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:29.000 UTC",
#       "not  after"         : "2024-01-16 06:38:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#           0010: EF 9A A8 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.775 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 85 96 9F 35 34 37 41   D4 64 67 B0 02 8A 66 25  M...547A.dg...f%
#     0010: 79 51 CD 62 4A 06 81 D0   C2 85 DA 0B 0A 8A D4 05  yQ.bJ...........
#     0020: CE 84 28 23 28 78 37 CF   A8 8C 08 53 A0 EE 87 E6  ..(#(x7....S....
#     0030: F5 FC 14 56 CA 9B A3 AF   4B 23 6A 12 29 94 3F CC  ...V....K#j.).?.
#     0040: FE 4E AC 3B E7 E7 FB 39   B5 88 F2 C2 70 58 A1 2F  .N.;...9....pX./
#     0050: 9B 4F 82 F4 55 8D 87 DB   16 33 BC BC 61 1B 91 0E  .O..U....3..a...
#     0060: D8 74 0A 19 C8 95 6F 38   D5 FB AB 16 B2 38 A8 17  .t....o8.....8..
#     0070: 6E A0 A4 F7 4F 4D 95 48   6F DB 6E 02 0A 8A D6 95  n...OM.Ho.n.....
#     0080: E0 65 D4 52 EB FF AB 0A   38 10 67 35 E9 3B AB B0  .e.R....8.g5.;..
#     0090: E7 A0 4F 2B BA F7 F5 A1   44 67 BF 73 F1 CE FE 05  ..O+....Dg.s....
#     00A0: 40 00 C4 ED 04 86 C3 40   E5 D9 28 71 51 AB 4C 23  @......@..(qQ.L#
#     00B0: A2 81 73 88 29 05 04 B1   49 B4 F0 DA 98 C0 DC 5F  ..s.)...I......_
#     00C0: 69 97 73 97 82 B4 E9 57   FF CA 59 30 70 E9 67 30  i.s....W..Y0p.g0
#     00D0: 32 E6 9A E8 C2 6F 62 0C   84 F5 16 B2 07 9B 3C B7  2....ob.......<.
#     00E0: 43 BB F9 8E 73 76 C9 78   5A CE AE 58 BF D9 A4 44  C...sv.xZ..X...D
#     00F0: 8D 9A 07 35 64 64 1C EF   75 D0 B6 FA D7 07 B2 28  ...5dd..u......(
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.777 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C2 B3 F9 26 2B 41 96 17   F6 B6 3B C5 F7 2E 80 48  ...&+A....;....H
#     0010: E1 E7 65 5C 01 A9 D6 C6   B7 A3 09 BB FA DC 30 23  ..e\..........0#
#     0020: D2 B3 31 0C 87 3D B0 45   30 4B 6A 85 E0 D0 0D CA  ..1..=.E0Kj.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.778 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:00.832 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "31 9A 97 72 00 55 AF 47 B2 5B B7 FD 35 BB 94 55 AC 00 0B DD 6C 7F DC 94 E8 89 BB F3 AC 42 1C 4D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 06:39:01.120 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 06:39:01.121 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 06:39:02.050; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 06:39:02.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 06:39:02.422; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 06:39:02.425; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 06:39:02.425; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-izRb1L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:02.457 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A B5 35 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:36.000 UTC",
#     "not  after"         : "2024-01-16 06:38:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 B7 E4 9A A7 EF 76 24   E6 B9 D7 38 0C 10 C2 B8  ......v$...8....
#         0010: 19 A4 1A 51                                        ...Q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:02.462 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 D2 D2 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:28.000 UTC",
#     "not  after"         : "2024-01-16 06:38:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:02.476 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:02.701 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.701 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:02.703 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:02.703 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.720 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:02.722 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3D 67 6E F6 B2 4D 69 B9 53 82 20 AE 04 3C 42 56 67 CD C3 F4 F0 A5 09 56 6B 28 E3 8C 1C 03 91 F5",
#   "session id"          : "7C DE 9D 10 4D 4A 4C 7E DE C2 A4 09 63 70 E3 27 77 41 DF A0 C3 70 22 DC B5 2D 0D 61 B0 4B 17 24",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C4 76 97 0F 4E 82 C1 83   3D 31 FD 59 5B E6 10 56  .v..N...=1.Y[..V
#             0010: 11 15 F4 C3 A8 F8 33 F0   ED 56 12 7F B2 A6 08 26  ......3..V.....&
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.834 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "49 9C 00 8D 10 58 79 0B C4 61 3D 82 29 9A 74 AA ED A8 8B 61 7F B8 27 5B 92 5C C2 3C F8 16 BB 86",
#   "session id"          : "7C DE 9D 10 4D 4A 4C 7E DE C2 A4 09 63 70 E3 27 77 41 DF A0 C3 70 22 DC B5 2D 0D 61 B0 4B 17 24",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 21 9D AE 1C 0B 6F 55 70   4F A6 63 0D 30 DA 33 99  !....oUpO.c.0.3.
#           0010: 71 D4 EE 79 0F 61 F5 B7   D4 45 E4 B1 71 24 52 73  q..y.a...E..q$Rs
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.834 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.835 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.835 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.837 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.839 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.839 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.839 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.841 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.841 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.848 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.850 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.851 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.854 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.854 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.855 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.857 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.857 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.857 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.858 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.858 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.859 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.859 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.862 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C F6 11 6F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:32.000 UTC",
#       "not  after"         : "2024-01-16 06:38:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 9B 5C B5 3D E2 94 C6   E0 7B 14 93 F2 2F 8A 19  P.\.=......../..
#           0010: 2D EF E3 90                                        -...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:02.918 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:02.918 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:02.919 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:02.919 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.946 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 E6 06 EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 06:38:29.000 UTC",
#     "not  after"         : "2024-01-16 06:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#         0010: EF 9A A8 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#         0010: 2F 08 D3 A9                                        /...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.950 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9E A3 70 BE E1 A3 8E D5   27 1D 75 86 11 5B E7 A5  ..p.....'.u..[..
#     0010: 57 58 01 B2 DE E0 5D 29   08 11 89 5B 82 EC 8C 95  WX....])...[....
#     0020: 02 8D 3B 51 5B F1 67 F2   7E 6F EB 73 A5 35 17 85  ..;Q[.g..o.s.5..
#     0030: E0 9B 74 2C 2E 60 B3 4E   B8 B3 DD EA C9 83 21 EB  ..t,.`.N......!.
#     0040: 10 7A 3C 66 83 76 F8 66   B8 8A 5B 1E AC 7F 6E 19  .z<f.v.f..[...n.
#     0050: 86 F1 C7 53 82 50 FE A3   5F DC 27 C7 2D 06 21 A3  ...S.P.._.'.-.!.
#     0060: 62 AC E5 51 7B CF 72 D6   3E FD 82 B6 07 24 64 A5  b..Q..r.>....$d.
#     0070: 75 6A B2 54 3D 37 8D 6D   2B 70 1E B7 89 08 B3 90  uj.T=7.m+p......
#     0080: D0 74 80 DA 9A 0D 84 96   5C 25 2F 7F 60 35 58 4B  .t......\%/.`5XK
#     0090: 3B A7 84 ED 84 D4 0B 91   3A 52 E2 7A 89 72 7D 04  ;.......:R.z.r..
#     00A0: DA EF 7B 60 9D 7A 56 91   27 C8 12 BC 05 BB 26 4E  ...`.zV.'.....&N
#     00B0: 4F 37 51 31 9D 1C 7E 3F   77 3B F5 E6 F1 94 71 00  O7Q1...?w;....q.
#     00C0: 8F E1 30 F0 ED E3 59 9D   E9 42 51 A4 A3 BE 7A B7  ..0...Y..BQ...z.
#     00D0: 37 24 5C 50 C1 09 E0 3C   39 FA 7A 06 94 27 3B 5A  7$\P...<9.z..';Z
#     00E0: 3B B5 9A 30 27 05 D8 91   34 98 71 1F 4D BB 53 F4  ;..0'...4.q.M.S.
#     00F0: 59 D7 F9 33 BF 07 A5 44   08 2C 2A 8A 01 2F 1E 01  Y..3...D.,*../..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.952 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5D BF FC 3F 65 31 4F E6   B6 FD D4 C0 A4 FA BA CF  ]..?e1O.........
#     0010: E0 BF 65 9D 56 72 30 13   86 D7 96 58 D6 C4 21 B7  ..e.Vr0....X..!.
#     0020: 63 80 BF 6D 4C 91 04 9E   95 9C EC 43 8D 1D E1 4B  c..mL......C...K
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.954 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:02.955 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.955 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:02.955 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.956 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 06:39:02.956 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:02.956 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.956 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.959 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A B5 35 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:36.000 UTC",
#       "not  after"         : "2024-01-16 06:38:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 B7 E4 9A A7 EF 76 24   E6 B9 D7 38 0C 10 C2 B8  ......v$...8....
#           0010: 19 A4 1A 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 E6 06 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:29.000 UTC",
#       "not  after"         : "2024-01-16 06:38:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#           0010: EF 9A A8 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.986 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 94 29 6B 84 31 D7 F6   4F C7 A4 44 D6 65 D7 1B  0.)k.1..O..D.e..
#     0010: 80 30 F1 7A C4 F9 B1 D3   03 8D 99 0F 86 FF 4E 7A  .0.z..........Nz
#     0020: E4 04 14 63 CE A0 ED 15   F7 D5 6B C8 DF 3D 9F F7  ...c......k..=..
#     0030: 08 47 44 F1 08 7A E9 69   2B 2F DE 4A 92 81 16 FD  .GD..z.i+/.J....
#     0040: AC DF EC 0A DC 34 1E 3C   F6 65 DA D1 ED E1 1B C9  .....4.<.e......
#     0050: 78 C0 07 7C 01 55 C0 36   AE F0 C9 68 EB F0 6E C3  x....U.6...h..n.
#     0060: B9 81 2A 48 63 43 AC 93   D0 AF D4 F3 41 BF A8 35  ..*HcC......A..5
#     0070: 3B C1 17 E9 65 6B 8E E1   EB 93 68 17 C4 34 DC 9D  ;...ek....h..4..
#     0080: 4A C7 B6 E4 74 35 20 E4   CE A8 04 82 FB 6A DA 84  J...t5 ......j..
#     0090: 95 E5 C9 1A 7E C9 39 B3   6F 1C B9 F1 7A 22 2F 44  ......9.o...z"/D
#     00A0: B0 16 C3 97 9F 11 57 B2   4D 82 0E 23 C2 4F 46 30  ......W.M..#.OF0
#     00B0: 5F 1C D8 5B 58 77 E7 6C   88 0E AC 6D 16 A3 23 23  _..[Xw.l...m..##
#     00C0: 39 3F 55 9B DA 5F 71 9F   01 21 8C 65 B4 90 36 D8  9?U.._q..!.e..6.
#     00D0: A7 47 8A D4 7E 1E 37 F6   A9 8F D6 B7 B8 A7 C1 B9  .G....7.........
#     00E0: 0E 39 8F 4F C1 FD BE F5   BE 61 39 0E F1 35 80 DD  .9.O.....a9..5..
#     00F0: 14 63 CE 6D 3B 5C 2F 7E   84 36 08 A7 AF B5 47 D0  .c.m;\/..6....G.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.987 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 02 60 D0 D3 75 FB 13   CB 2A FA 60 94 2A FD F7  ..`..u...*.`.*..
#     0010: 65 F3 F2 EA 91 74 0E CC   38 B1 98 1B A6 F8 8F 10  e....t..8.......
#     0020: 27 7B 27 6F 77 1F A7 2A   6C D4 33 F0 D2 01 A8 ED  '.'ow..*l.3.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:02.987 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:03.044 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C1 39 D9 1D FC F6 03 B2 6C 2E 65 DC A9 BA 2A 85 8A 44 0B 09 C7 AD E5 AA CC 77 02 83 D9 CA 7D 95",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 06:39:03.316 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 06:39:03.316 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 06:39:15.177; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:15.513 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 D2 D2 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:28.000 UTC",
#       "not  after"         : "2024-01-16 06:38:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#           0010: EF 9A A8 57                                        ...W
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 E6 06 EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 06:38:29.000 UTC",
#       "not  after"         : "2024-01-16 06:38:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 BF D8 97 BA BF BC 0D   4F 8C BA 70 D8 30 22 FC  a.......O..p.0".
#           0010: EF 9A A8 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A B8 37 85 E0 14 CE C2   01 31 D3 B0 D5 C9 44 B9  ..7......1....D.
#           0010: 2F 08 D3 A9                                        /...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 06:39:15.530 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:15.891 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:15.892 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:15.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:39:15.892 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:16.025 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:16.028 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 06:39:16.028 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.034 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.046 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 06:39:16.050 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "CA 2D 7E 60 93 71 37 A9 93 9B 4D 1F 2D 65 2B E9 C6 B3 82 F8 55 2A A6 13 FF 89 0F F4 62 08 C8 48",
#     "session id"          : "84 BF 12 14 6A CD 1F EE 01 D9 72 2B F0 17 14 86 47 CC 72 99 C5 4E DB AF EA 5F E6 A1 AA 98 48 44",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B8 10 A0 73 80 58 20 6C   30 F4 51 A0 4F BA EB FE  ...s.X l0.Q.O...
#               0010: EC 30 29 A0 72 C7 8D ED   A9 DC B0 88 78 BB 93 5D  .0).r.......x..]
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.068 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "65 CD C9 B6 A8 02 A0 E2 35 C9 F0 8F 76 C7 83 EF C2 E0 36 AD 50 39 6E 17 59 30 CC E6 CC F8 3E F8",
#     "session id"          : "84 BF 12 14 6A CD 1F EE 01 D9 72 2B F0 17 14 86 47 CC 72 99 C5 4E DB AF EA 5F E6 A1 AA 98 48 44",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 84 E8 74 5D D6 65 D9 90   B3 C7 05 C8 30 A5 BC 7C  ..t].e......0...
#             0010: C8 60 75 71 B4 D2 1A 5B   15 6F 3B 56 20 FC 26 1C  .`uq...[.o;V .&.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.069 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.069 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.071 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.074 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.074 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:16.075 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:16.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.083 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.085 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.086 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.090 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.090 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.090 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.090 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.090 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:16.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:39:16.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 06:39:16.093 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 06:40:34.744 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:40:34.794 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:40:34.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:40:34.794 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 06:40:34.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46636/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28101ms
ok 65 stop command for single port in 31390ms
ok 66 status detects locally running solr in 14314ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2218ms
ok 69 copying files around in 6592ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1212ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 31s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m54.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5697 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5697/

All tests passed

Build Log:
[...truncated 1309 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33475/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 02:39:13.230; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:39:13.235; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 02:39:14.482; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 02:39:14.525; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23427ms
ok 61 start solr with client truststore and security manager in 25115ms
not ok 62 start solr with mTLS needed in 56773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5K7b62/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33475.
#
# Started Solr server on port 33475 (pid=200206). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33476.
#
# Started Solr server on port 33476 (pid=200659). Happy searching!
#
# INFO  - 2023-10-18 02:40:37.997; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:40:38.003; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 02:40:38.382; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:38.385; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:38.386; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.421 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 6F 9F A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:14.000 UTC",
#     "not  after"         : "2024-01-16 02:40:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  ..h...S......q.n
#         0010: 70 35 5A 5D                                        p5Z]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.426 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 B4 6A 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:06.000 UTC",
#     "not  after"         : "2024-01-16 02:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:38.442 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.775 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.777 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:38.777 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.939 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.939 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.941 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:38.941 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.947 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:38.963 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B7 61 85 CF 55 C7 48 41 44 24 D9 8D F4 60 C2 97 91 22 BF 14 13 33 72 13 64 2F 58 0C D1 6D 75 BD",
#   "session id"          : "0B 72 C9 AE E7 B3 ED B2 BD 9D 86 79 7D C9 72 38 C9 76 A1 8A 6E FD B1 AF E9 26 43 D9 1D 0F B3 CC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB C8 C6 86 0C 7E B1 AF   84 13 4D 4F 5C C2 FE 52  ..........MO\..R
#             0010: 7B 29 4D 68 37 A4 E4 7C   63 0D 6C FE A9 92 B9 4E  .)Mh7...c.l....N
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 F9 46 92 2F 66 26 D3 3F EF DC 46 92 AF C9 00 3D 79 85 3D AB C9 73 7A 0F A1 DF 35 33 4B B4 C8",
#   "session id"          : "0B 72 C9 AE E7 B3 ED B2 BD 9D 86 79 7D C9 72 38 C9 76 A1 8A 6E FD B1 AF E9 26 43 D9 1D 0F B3 CC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CF 72 5E 7A FF C9 44 49   79 91 BD A4 41 E6 80 53  .r^z..DIy...A..S
#           0010: E9 FA AA E6 4A 41 9E 99   40 10 08 89 C3 1B 19 75  ....JA..@......u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.070 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.072 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.073 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.075 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.085 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.087 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.088 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.092 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.092 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.093 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.095 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.096 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.098 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.099 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.103 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 23 68 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:10.000 UTC",
#       "not  after"         : "2024-01-16 02:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 4C 0E B0 E0 ED 73 68   6E 6A 68 01 F3 FF 35 89  <L....shnjh...5.
#           0010: 29 0D 4D 60                                        ).M`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.103 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.193 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.196 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 C2 8A F9 AD 75 15 C7   FE 7F 46 A1 53 D9 AD 2B  .....u....F.S..+
#     0010: F1 FA 64 FA DD 82 DF D0   07 AB 64 F5 F4 4A 11 28  ..d.......d..J.(
#     0020: 2C 08 E2 3C 14 6B 22 DC   C2 19 A2 99 BB 1E FD 92  ,..<.k".........
#     0030: BC C5 0A D2 45 49 64 30   64 D5 46 B0 FE 5F 03 91  ....EId0d.F.._..
#     0040: CB 6E 90 52 A0 EE 48 80   72 67 2E EA 8B 81 6E 59  .n.R..H.rg....nY
#     0050: A8 3B 4C 69 FB 18 2A E7   60 64 02 45 2F 5B A2 36  .;Li..*.`d.E/[.6
#     0060: A9 77 D3 1A 7E B4 2B 8D   43 CC CD 86 13 F8 AB 36  .w....+.C......6
#     0070: 3B 48 E9 55 1A 5D FB B9   75 05 92 18 CB A5 62 C8  ;H.U.]..u.....b.
#     0080: 62 06 8C EC 75 02 8A 8A   C9 DF 69 94 99 76 09 C1  b...u.....i..v..
#     0090: 3A 95 A5 9D 3B 5E 09 0B   B9 A1 03 36 6D F0 A7 37  :...;^.....6m..7
#     00A0: 6A 22 73 70 4D D7 56 CE   BA 35 27 32 51 11 70 4F  j"spM.V..5'2Q.pO
#     00B0: 11 E7 4B BA C0 73 E3 9F   94 36 E3 F4 7D DD 5B 66  ..K..s...6....[f
#     00C0: DB C4 47 EE 69 79 7C C1   F5 52 12 30 0A CB 65 06  ..G.iy...R.0..e.
#     00D0: 90 C2 F3 A2 5F 9C 73 B7   AD EB A4 40 40 10 B0 EF  ...._.s....@@...
#     00E0: 76 0D D2 A5 16 CD 19 C5   0A 07 2E 4D E2 F5 A4 73  v..........M...s
#     00F0: F1 F3 85 D4 F2 91 9E 13   C7 90 87 5C 04 56 7C CF  ...........\.V..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.199 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 BB 28 36 9B 01 88 85   02 1E 54 67 5C BF 2D C9  ..(6......Tg\.-.
#     0010: C3 1F 5D 1A DA 07 9F 40   8E 37 AC 03 11 7B AD 4A  ..]....@.7.....J
#     0020: FD 15 C2 F6 E2 F0 B3 E7   0F FF FA B3 3F F5 FD 74  ............?..t
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.201 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.202 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.202 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:39.203 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.204 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.206 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6F 9F A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:14.000 UTC",
#       "not  after"         : "2024-01-16 02:40:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  ..h...S......q.n
#           0010: 70 35 5A 5D                                        p5Z]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.232 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4B C1 F9 BD BD 14 DC 49   B1 78 80 8D 5E D5 A2 DB  K......I.x..^...
#     0010: 42 4D E3 CF 4B CF 7D 08   C3 E7 70 93 7F 97 75 93  BM..K.....p...u.
#     0020: 37 07 5E 40 FC 00 07 3E   D4 28 F5 C8 D0 07 48 76  7.^@...>.(....Hv
#     0030: E3 30 F9 EE D3 C6 95 4F   00 B4 4B C9 5D 96 EB E2  .0.....O..K.]...
#     0040: CA 3C AD 48 25 50 6D B0   59 45 08 0F C8 1E 56 6B  .<.H%Pm.YE....Vk
#     0050: 55 70 A1 29 CB 1C 07 5C   E8 F8 F7 60 48 93 CE 09  Up.)...\...`H...
#     0060: 0E 48 95 17 38 6D 7B 3B   2E 0A 6E 85 EC 0A F6 FF  .H..8m.;..n.....
#     0070: F4 AE F4 77 55 74 66 52   9F 26 04 DA EF 77 1C 70  ...wUtfR.&...w.p
#     0080: CA 83 A3 70 7B 30 E5 79   F2 1B 62 43 31 D9 50 AA  ...p.0.y..bC1.P.
#     0090: 9A FF C5 F4 49 34 71 BE   FE EE B7 2A 11 7B 76 03  ....I4q....*..v.
#     00A0: 38 DB C0 F7 B5 B9 16 85   15 59 89 34 F2 0A CC 26  8........Y.4...&
#     00B0: 47 2F 53 45 02 79 27 AB   30 47 AA 51 D8 8D 21 0A  G/SE.y'.0G.Q..!.
#     00C0: 57 9C 71 1E F7 19 01 04   FC E7 10 49 68 B1 48 D7  W.q........Ih.H.
#     00D0: 07 08 01 94 77 0C 32 A1   B8 95 4D 45 ED D6 F3 09  ....w.2...ME....
#     00E0: 3C 5C C0 1C 11 FE 48 E2   F6 8F BD 36 B1 49 00 7E  <\....H....6.I..
#     00F0: 84 D0 EC 56 54 8D DC B6   70 C1 79 6A 2F C6 E0 E9  ...VT...p.yj/...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.233 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1C E6 3C 58 A8 3B 92 47   EF 8C 25 67 52 7C EA BD  ..<X.;.G..%gR...
#     0010: 55 90 48 AB F2 C0 81 DE   A8 09 FE E8 13 8C 9E 27  U.H............'
#     0020: 5D 84 31 2B 29 30 0B DB   1F 9F 15 4B A5 2D 2D 7C  ].1+)0.....K.--.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.234 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:39.297 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6C AB A0 80 CE 93 43 0D 25 52 BB 0A 69 A4 4F CF C4 06 24 D5 77 32 31 B2 2D 27 06 11 78 0C 92 AA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 02:40:39.573 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 02:40:39.575 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 02:40:40.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 02:40:40.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 02:40:40.918; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:40.921; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 02:40:40.921; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5K7b62/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.952 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 6F 9F A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:14.000 UTC",
#     "not  after"         : "2024-01-16 02:40:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  ..h...S......q.n
#         0010: 70 35 5A 5D                                        p5Z]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.957 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 B4 6A 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:06.000 UTC",
#     "not  after"         : "2024-01-16 02:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:40.971 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.054 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.056 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.057 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:41.057 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.199 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.199 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.201 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:41.201 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.207 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.218 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.218 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.219 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:41.221 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C4 31 A6 F1 E8 BF AE BF 6B 05 08 F5 67 33 54 92 2A 71 07 A5 51 D3 2F 6D C9 0F 6F 29 3C A1 B8 5E",
#   "session id"          : "60 01 E6 E0 7D 62 B0 C9 4D B9 16 44 58 A6 57 66 77 DB AA C6 48 FB 31 44 2B D9 96 06 DE 80 53 8E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 53 00 BE 5F 90 1A 3B 34   AE E8 7C 51 F4 A2 40 81  S.._..;4...Q..@.
#             0010: 5B C2 CB DC 85 E4 62 D0   BA 7B AB 77 4C 92 4C 39  [.....b....wL.L9
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.315 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "30 F3 E0 C7 D5 5F D4 EC F9 F1 DF 9C B4 BA 73 EB 83 6D 42 B1 C4 3F F4 E8 88 50 50 C1 F3 94 82 F9",
#   "session id"          : "60 01 E6 E0 7D 62 B0 C9 4D B9 16 44 58 A6 57 66 77 DB AA C6 48 FB 31 44 2B D9 96 06 DE 80 53 8E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 DF FB AC AC 78 6B 2C   C8 8B 79 BE B2 38 7B E0  .....xk,..y..8..
#           0010: F2 CF 7E 05 63 27 4D 62   D7 87 FC 41 0D 1B F7 6C  ....c'Mb...A...l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.316 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.316 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.318 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.321 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.322 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.323 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.330 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.331 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.332 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.336 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.337 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.339 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.340 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.341 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.341 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.342 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.345 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 23 68 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:10.000 UTC",
#       "not  after"         : "2024-01-16 02:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 4C 0E B0 E0 ED 73 68   6E 6A 68 01 F3 FF 35 89  <L....shnjh...5.
#           0010: 29 0D 4D 60                                        ).M`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.345 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.424 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 21 02 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 02:40:07.000 UTC",
#     "not  after"         : "2024-01-16 02:40:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#         0010: B8 48 86 50                                        .H.P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#         0010: 7A 68 92 5C                                        zh.\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.428 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 82 7B 66 C1 3F 91 C5   48 1C 13 D9 C0 4A 91 8B  E..f.?..H....J..
#     0010: 8D C2 4B 58 5B BB 6C 74   10 C9 BE ED 3C 1C 30 53  ..KX[.lt....<.0S
#     0020: 40 F1 37 D5 21 1A 52 CB   93 62 55 22 79 1E 77 41  @.7.!.R..bU"y.wA
#     0030: 65 65 80 AC 8F AA 0F 26   CC B9 D6 E7 C8 A0 21 B1  ee.....&......!.
#     0040: B2 7F 8D 13 74 DB 3A 0D   09 34 85 16 F8 F9 BE ED  ....t.:..4......
#     0050: FE 74 00 86 EE 5E EB 4D   30 05 C9 C2 63 63 78 E8  .t...^.M0...ccx.
#     0060: 2A E9 F7 6D D2 B3 85 00   CC 9C 5B 16 AD F9 A8 D8  *..m......[.....
#     0070: 6A 0F 26 A9 B8 F3 3A 09   50 89 55 7A 03 EC 61 94  j.&...:.P.Uz..a.
#     0080: 44 4F 81 4F 89 31 33 FE   32 0B 96 93 BD 23 B4 55  DO.O.13.2....#.U
#     0090: E8 7F 22 4A A3 F4 6D CE   93 2F FD F2 99 7B C9 24  .."J..m../.....$
#     00A0: 79 95 32 7E 5A E3 61 B9   33 56 5D 0C CF DB 1D 95  y.2.Z.a.3V].....
#     00B0: B6 77 81 CD 72 1F A6 2F   62 B7 7E 64 13 8A EC BE  .w..r../b..d....
#     00C0: 28 88 FC 13 1D 47 B2 81   F1 6F 85 FB 1F C6 CC D1  (....G...o......
#     00D0: BA 06 1B C5 60 B5 13 12   1A 72 06 BB C2 DB 57 39  ....`....r....W9
#     00E0: 39 E3 E7 C9 48 40 68 11   C7 34 C7 82 EE 79 E0 CD  9...H@h..4...y..
#     00F0: 67 32 2F B6 84 A8 54 26   69 C5 06 08 87 85 6F 69  g2/...T&i.....oi
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.430 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 26 81 ED 8E 90 46 44   25 22 12 07 A8 36 E4 81  .&....FD%"...6..
#     0010: C3 6A FE AD C1 E6 9D DF   83 6A CC 42 6A AB 6B D3  .j.......j.Bj.k.
#     0020: DA B7 BB 26 4F 71 B5 C6   B7 F6 AD 99 8B 48 C4 EE  ...&Oq.......H..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.433 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.434 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.435 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.438 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6F 9F A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:14.000 UTC",
#       "not  after"         : "2024-01-16 02:40:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AF 0B 68 E1 AE B1 53 B1   C1 AD A3 12 E9 71 B1 6E  ..h...S......q.n
#           0010: 70 35 5A 5D                                        p5Z]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.463 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 81 33 33 71 47 94 7F   75 6D E3 66 9A 79 FA 32  ..33qG..um.f.y.2
#     0010: B6 A4 F3 09 5F 35 A4 8A   24 13 A4 28 0E 3D B9 FD  ...._5..$..(.=..
#     0020: DC 0D 36 41 FA C2 14 A4   40 E9 7B 3E 02 7C 8F 30  ..6A....@..>...0
#     0030: EA BC C3 9A 11 EC 43 4B   51 58 AF 89 D9 69 5E 52  ......CKQX...i^R
#     0040: 3C BA F3 AC 10 06 EA A2   C2 28 A8 C3 73 CD DB FD  <........(..s...
#     0050: AC 33 98 3D DC 4C F1 C9   F5 54 52 52 C2 08 97 F4  .3.=.L...TRR....
#     0060: 22 68 D3 95 EC 08 47 2E   D8 7D D6 17 7F D5 D0 F3  "h....G.........
#     0070: E5 4C 23 A5 33 DD 3B D1   D5 61 97 C1 C0 CD E6 FA  .L#.3.;..a......
#     0080: BD DC FE 5B 4C 86 F8 F1   F7 4E 9C 06 29 2D DD FD  ...[L....N..)-..
#     0090: 22 EB B9 EF 63 64 84 79   77 A0 AF C9 4D A1 EF 98  "...cd.yw...M...
#     00A0: 84 33 29 52 E3 D6 A0 D2   81 BF 48 DE 56 AB B9 2C  .3)R......H.V..,
#     00B0: 55 97 A5 B4 CB 51 4B 2B   6A 2F C8 28 76 61 87 17  U....QK+j/.(va..
#     00C0: 2A 62 8E AB 4E 64 66 4E   8F 16 F3 34 69 39 F7 82  *b..NdfN...4i9..
#     00D0: B9 C0 4E E3 D6 E9 BF 28   6A 36 AD 12 1C 14 1A 2B  ..N....(j6.....+
#     00E0: 33 8B 1E 29 18 73 3A 79   0B 2F DF 9B 04 6B C1 14  3..).s:y./...k..
#     00F0: B0 4A 1E 2C 73 E7 31 D4   4D 2B 11 20 BE 03 A0 54  .J.,s.1.M+. ...T
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.464 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 A7 B4 DF E8 8F 0F A0   27 2F 9E 57 D0 91 01 64  ........'/.W...d
#     0010: 1E 55 65 C5 C5 25 4E 3F   2A 0A E3 7A DA 75 84 12  .Ue..%N?*..z.u..
#     0020: FD C9 59 7D 16 BF 75 64   66 F7 EB 1B 2B 9B 20 E2  ..Y...udf...+. .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.464 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:41.519 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0C 40 36 97 E5 0F EE 6D 9C AD 33 E4 5E DA 34 39 C4 98 48 D0 AE A5 62 F3 3C 1E BA E6 A8 39 CA 84",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 02:40:41.789 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 02:40:41.790 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 02:40:52.794; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:53.146 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 21 02 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:07.000 UTC",
#       "not  after"         : "2024-01-16 02:40:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 A0 50 D8 C0 D9 A4 27   61 8B 03 E6 65 57 95 CC  ..P....'a...eW..
#           0010: 7A 68 92 5C                                        zh.\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 B4 6A 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 02:40:06.000 UTC",
#       "not  after"         : "2024-01-16 02:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3C 22 60 C7 C6 5D 72   49 1C 77 3F 98 E8 63 6B  r<"`..]rI.w?..ck
#           0010: B8 48 86 50                                        .H.P
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 02:40:53.163 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.560 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.561 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.562 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:40:53.562 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.699 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.702 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 02:40:53.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.721 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 02:40:53.724 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AA 64 FA 89 0C 5B 00 B5 57 DA 08 59 B0 41 FF 39 9E EC E6 3C 2F 04 34 AA 54 8F 68 DB F7 C4 41 6E",
#     "session id"          : "FD 39 2A D8 03 CB 75 9D 05 56 04 23 AC 25 18 36 0F B5 60 A4 39 41 06 3A 68 99 0E 47 49 11 7C F5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 D9 3C A4 D5 FF 8F AC   BF CA B6 45 FB 36 10 2E  h.<........E.6..
#               0010: 03 EB 16 69 2E 93 DC 6A   00 A6 CB 68 8E 2E 62 3F  ...i...j...h..b?
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DE 65 1C 08 D6 21 13 31 17 61 65 96 2B 20 7E A7 20 F6 70 86 49 46 F8 FA 60 43 9C 7E 07 05 B8 ED",
#     "session id"          : "FD 39 2A D8 03 CB 75 9D 05 56 04 23 AC 25 18 36 0F B5 60 A4 39 41 06 3A 68 99 0E 47 49 11 7C F5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2D 76 D0 28 2D 21 23 F4   E1 7B 4A 56 89 B0 A4 69  -v.(-!#...JV...i
#             0010: 8E 46 B9 32 5A 38 40 72   E8 78 40 25 29 BA EA 1E  .F.2Z8@r.x@%)...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.744 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.746 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.749 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.758 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.759 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.761 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.764 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:40:53.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 02:40:53.767 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 02:42:12.251 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.301 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.301 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.302 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 02:42:12.302 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33476/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28209ms
ok 65 stop command for single port in 31824ms
ok 66 status detects locally running solr in 14726ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2222ms
ok 69 copying files around in 6666ms
ok 70 upconfig in 2700ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1217ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 38s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m3.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5696 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5696/

All tests passed

Build Log:
[...truncated 1304 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35933/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-18 00:02:50.372; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 00:02:50.378; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-18 00:02:51.270; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 00:02:51.309; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22341ms
ok 61 start solr with client truststore and security manager in 25479ms
not ok 62 start solr with mTLS needed in 56484ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eE2EJs/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35933.
#
# Started Solr server on port 35933 (pid=199747). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35934.
#
# Started Solr server on port 35934 (pid=200198). Happy searching!
#
# INFO  - 2023-10-18 00:04:14.090; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 00:04:14.096; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 00:04:14.485; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 00:04:14.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 00:04:14.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:14.523 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7E 9D 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:50.000 UTC",
#     "not  after"         : "2024-01-16 24:03:50.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E D9 73 EF 88 2D BD 38   6F 69 03 17 A5 88 25 7A  n.s..-.8oi....%z
#         0010: 80 88 60 0B                                        ..`.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:14.527 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 76 C8 A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:42.000 UTC",
#     "not  after"         : "2024-01-16 24:03:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:14.542 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:14.641 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:14.641 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:14.641 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:14.641 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:14.795 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:14.797 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:14.797 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.815 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.816 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:14.818 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "26 C6 ED 4E CA F0 00 78 80 A9 E6 1E 92 06 7C 8D DE 4C 4F E4 F9 5B 9E 45 B4 06 DD C8 E7 FB 24 FF",
#   "session id"          : "62 2B D0 CE 26 DD DB 02 87 3C 34 D4 D7 17 B3 FB 51 90 F5 6F 78 20 93 2D 40 C4 9F 43 C4 48 A6 3F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9E 7D 06 07 EA 1B 0D AB   E8 E0 C9 6E 67 F0 64 66  ...........ng.df
#             0010: 0A 53 D8 4F A6 C0 97 6E   40 DA 00 6F 2F 6E B1 56  .S.O...n@..o/n.V
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.921 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AA 78 D8 76 C1 1F D4 15 26 A7 81 D9 ED 69 9F 0B A5 A4 5F DF 40 8C 9F A6 46 01 47 2B 3C F7 73 A4",
#   "session id"          : "62 2B D0 CE 26 DD DB 02 87 3C 34 D4 D7 17 B3 FB 51 90 F5 6F 78 20 93 2D 40 C4 9F 43 C4 48 A6 3F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C0 6B 98 A3 3B 62 3B 02   7D AB 01 AE 60 D5 98 BF  .k..;b;.....`...
#           0010: D6 AC F6 3C E7 B7 75 E2   63 EA 69 87 EE D5 3F 7F  ...<..u.c.i...?.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.921 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.921 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.923 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.925 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.926 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.926 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:14.927 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.935 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.936 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.937 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.941 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.941 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.942 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:14.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:14.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.945 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.945 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.946 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:14.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.949 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 09 65 A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:46.000 UTC",
#       "not  after"         : "2024-01-16 24:03:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 4B 34 9F B4 2F B4 53   1C 9F 1A 5E 1C 88 68 B5  7K4../.S...^..h.
#           0010: 82 27 2E 31                                        .'.1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:14.949 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.032 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.036 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 A0 8E ED 36 6E A5 56   AD B4 E1 64 D8 9B CB 1D  s...6n.V...d....
#     0010: 1C CB 88 A0 08 86 E7 F2   BA F2 A8 E8 C2 42 89 19  .............B..
#     0020: 00 9D D7 06 05 68 CC 2C   4C AD 1C 42 5E F4 F4 DA  .....h.,L..B^...
#     0030: AD 59 45 F4 04 71 D4 1E   6C 72 39 73 31 3F CF C5  .YE..q..lr9s1?..
#     0040: 44 DF BD 03 FF 75 79 30   4C C2 C3 E6 A1 D0 96 2E  D....uy0L.......
#     0050: F1 78 AB E8 4C 1A DF 50   C1 52 A6 70 8E 0D 3D 31  .x..L..P.R.p..=1
#     0060: 6C 19 5C 48 B9 AE 24 4A   0B 62 FF 8F BE 8E 3B 7A  l.\H..$J.b....;z
#     0070: 84 44 6A 1A E1 D8 65 19   4A 2D 7C 4C 1A 56 81 7A  .Dj...e.J-.L.V.z
#     0080: 90 D4 9D 23 EE 41 B9 68   F0 F0 E8 E0 91 EC C6 33  ...#.A.h.......3
#     0090: BC 50 FB 69 8C B5 73 31   C9 33 D9 A3 3A 44 41 9A  .P.i..s1.3..:DA.
#     00A0: 10 1E 5D AC 94 0F 04 EE   87 2B 88 A5 87 A5 F6 0F  ..]......+......
#     00B0: 93 EC 2C B6 AC 59 92 41   B3 BC 2E 13 2C 86 98 0C  ..,..Y.A....,...
#     00C0: 6F 77 20 8E F3 5E DB F4   B3 1B 30 FF C9 F4 13 9A  ow ..^....0.....
#     00D0: E7 A1 AB 77 80 EF A6 CE   71 F1 7D E0 E1 A9 BD 3D  ...w....q......=
#     00E0: 82 04 7E C2 E1 DE 5E 17   F2 83 7F EE AB 93 77 92  ......^.......w.
#     00F0: 7F 79 0B B5 22 AA 40 06   55 C7 F9 DF FF 89 A4 60  .y..".@.U......`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.038 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 09 BB 1E 09 9B 97 DA   26 58 B4 D9 E4 F5 3B F5   .......&X....;.
#     0010: 37 F1 F2 37 F0 13 44 98   70 C4 26 4E 31 DE 79 DD  7..7..D.p.&N1.y.
#     0020: 76 24 0D 48 CB 90 4F E9   97 65 D3 23 12 B2 4B 72  v$.H..O..e.#..Kr
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.040 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:15.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:15.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:15.042 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:15.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:15.042 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:15.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.043 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.046 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 7E 9D 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:50.000 UTC",
#       "not  after"         : "2024-01-16 24:03:50.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E D9 73 EF 88 2D BD 38   6F 69 03 17 A5 88 25 7A  n.s..-.8oi....%z
#           0010: 80 88 60 0B                                        ..`.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 49 59 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:44.000 UTC",
#       "not  after"         : "2024-01-16 24:03:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#           0010: 46 50 C6 6C                                        FP.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.071 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 7C 43 C2 5A 54 52 62   A3 21 78 9F 7E E3 0E 10  V.C.ZTRb.!x.....
#     0010: 74 CA 80 33 81 E2 2B CE   AE 44 4D D8 8B 93 94 15  t..3..+..DM.....
#     0020: 69 67 88 68 BE B2 C4 2E   C7 38 DF 0F 58 E4 FD FA  ig.h.....8..X...
#     0030: 14 18 91 79 35 43 55 33   0E 7B 70 62 31 88 DC D9  ...y5CU3..pb1...
#     0040: 36 EE C3 B0 19 14 A3 34   0F DD 5B 88 B6 52 18 61  6......4..[..R.a
#     0050: D6 8C 7F 81 58 A3 A0 C8   2F 9E D6 DD CA 9F 16 DC  ....X.../.......
#     0060: EA 56 C3 D0 91 96 18 63   96 02 33 A5 3F 5C 48 D8  .V.....c..3.?\H.
#     0070: 5E AA 18 77 E2 DB 7D AA   7D C9 26 65 9D 42 CB 65  ^..w......&e.B.e
#     0080: 53 03 EF 5C CC 68 01 B0   DD B3 5E BA 3E 97 76 29  S..\.h....^.>.v)
#     0090: 64 9A 54 20 E4 B5 3A 17   E9 82 9D 42 2B 8D 2A 55  d.T ..:....B+.*U
#     00A0: 20 2B 2D 3D 4F A7 64 35   5A 74 B7 96 7E 1F 59 D6   +-=O.d5Zt....Y.
#     00B0: C0 6B FE E7 12 FC 3C 36   2C 96 65 AF FA AA 33 56  .k....<6,.e...3V
#     00C0: 21 61 41 56 65 B1 17 69   90 7E 68 72 E1 19 3D 5F  !aAVe..i..hr..=_
#     00D0: 90 B0 A7 3C D8 83 B7 E2   9D 36 41 21 07 E1 7D EB  ...<.....6A!....
#     00E0: C2 2E 9A 9D 6B 71 5C D5   9C 70 E0 3E 05 46 85 31  ....kq\..p.>.F.1
#     00F0: 79 13 86 E7 54 4D DF 60   81 04 71 CF 95 68 E1 06  y...TM.`..q..h..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.073 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 D6 C8 67 8F C5 48 3A   E9 A5 83 0E 91 13 8B 47  R..g..H:.......G
#     0010: 00 59 FB D9 74 67 51 F6   E2 6A 74 21 98 95 66 71  .Y..tgQ..jt!..fq
#     0020: D9 74 A0 E0 93 97 42 67   85 F9 CC 55 E4 3B AA 19  .t....Bg...U.;..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.073 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:15.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3C A7 11 A5 0F E1 E7 A5 F5 06 F3 A2 71 DA B2 FF 43 88 7F 52 CE 5B 4D 27 21 49 15 B9 D6 55 E0 43",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 24:04:15.425 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 24:04:15.425 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 00:04:16.352; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 00:04:16.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 00:04:16.719; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 00:04:16.722; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 00:04:16.722; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eE2EJs/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:16.754 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 7E 9D 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:50.000 UTC",
#     "not  after"         : "2024-01-16 24:03:50.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E D9 73 EF 88 2D BD 38   6F 69 03 17 A5 88 25 7A  n.s..-.8oi....%z
#         0010: 80 88 60 0B                                        ..`.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:16.758 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 76 C8 A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:42.000 UTC",
#     "not  after"         : "2024-01-16 24:03:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:16.772 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:16.990 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:16.991 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:16.992 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:16.993 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:16.998 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:17.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:17.009 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:17.010 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:17.012 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 4A C5 46 3E 48 4B 55 54 0F 0B E7 7A C5 F8 E6 3E C3 4F 19 BD 7D B1 B6 3A 7F 2D 2C 3F D0 E7 27",
#   "session id"          : "5A BB 02 A7 A7 98 A8 83 5D F1 44 55 E4 96 1E F0 E1 A2 89 55 BA 3A DE B4 33 A0 C4 B9 FD 25 2C 9D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 5B 3C 04 DF 5D CF 70   7B 56 3A 4E F4 F3 5E AA  e[<..].p.V:N..^.
#             0010: B9 E9 0D 5C 3B 66 F3 1A   2F 36 46 3B 31 B7 2B 3C  ...\;f../6F;1.+<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.104 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AF 11 A1 43 51 A9 D7 AE 33 7E 29 C6 BE FB 57 F0 41 08 B3 7E 5D 9F 96 3F 88 D0 12 0F 43 DE B2 D1",
#   "session id"          : "5A BB 02 A7 A7 98 A8 83 5D F1 44 55 E4 96 1E F0 E1 A2 89 55 BA 3A DE B4 33 A0 C4 B9 FD 25 2C 9D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1D 01 99 1F 9E 3F AE 60   D4 D3 49 ED 20 60 16 C7  .....?.`..I. `..
#           0010: A5 52 90 04 B0 56 B9 9F   09 56 9A 66 9F A8 84 03  .R...V...V.f....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.105 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.106 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.107 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.109 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.120 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.121 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.124 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.124 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.125 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.127 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.127 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.127 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.128 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.128 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.129 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.132 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 09 65 A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:46.000 UTC",
#       "not  after"         : "2024-01-16 24:03:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 4B 34 9F B4 2F B4 53   1C 9F 1A 5E 1C 88 68 B5  7K4../.S...^..h.
#           0010: 82 27 2E 31                                        .'.1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.132 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:17.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:17.205 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:17.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:04:17.205 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.217 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 49 59 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 24:03:44.000 UTC",
#     "not  after"         : "2024-01-16 24:03:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#         0010: 46 50 C6 6C                                        FP.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#         0010: 7B 26 44 5D                                        .&D]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.221 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 63 A3 30 A6 FF B2 A6   9C 33 19 6D B9 E4 6F E3  /c.0.....3.m..o.
#     0010: 1C 03 4C 4F 2A 51 33 A4   69 44 7C 7E 6A 7D DA A4  ..LO*Q3.iD..j...
#     0020: 31 AF 21 65 03 38 06 21   88 81 BE 06 F1 79 58 74  1.!e.8.!.....yXt
#     0030: B5 BC DF 90 44 62 1C F0   6C EA 04 AE 70 8B 94 5B  ....Db..l...p..[
#     0040: 11 BC 40 08 6F 75 C0 00   09 D4 DB 0A 61 D3 8B 22  ..@.ou......a.."
#     0050: 97 35 29 DE 4A 28 16 F9   8C 00 53 78 76 C2 D5 D8  .5).J(....Sxv...
#     0060: 42 6A 85 16 1B D9 4B A7   EF 0D 3F 6C 43 0D 3E 9E  Bj....K...?lC.>.
#     0070: 36 4D 2E 09 27 9D 6F 86   19 3F 8A D6 6B 7B C1 6B  6M..'.o..?..k..k
#     0080: 34 7A 9A 6E 8C A8 B3 AB   49 42 20 E2 B7 61 96 6F  4z.n....IB ..a.o
#     0090: 13 B6 38 6A 4B 2D 26 0B   0F 63 A9 5A 2C 6C 6A 78  ..8jK-&..c.Z,ljx
#     00A0: 4C FA A2 FB 29 0D 15 42   AE 2C 55 D1 30 F3 15 D3  L...)..B.,U.0...
#     00B0: 78 14 46 C8 2C 08 B1 13   70 D8 57 6A A2 27 AF CC  x.F.,...p.Wj.'..
#     00C0: 22 B7 02 5D 55 B2 7D D5   C7 1C 59 1F 97 32 69 B9  "..]U.....Y..2i.
#     00D0: 95 35 39 59 BA B4 B4 FE   28 56 30 EF F9 66 AF FE  .59Y....(V0..f..
#     00E0: 53 BD 21 3F 50 E6 8A 9A   D2 62 9E 2E D7 29 C9 C6  S.!?P....b...)..
#     00F0: A1 71 D6 FE 7F 6B C6 D6   1E D8 76 C4 AC C3 48 0A  .q...k....v...H.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.223 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 18 7C F9 CE 6F 35 95 29   BC DC 03 4D A3 1F 3B 6C  ....o5.)...M..;l
#     0010: 55 4D 5B 67 F4 8C 37 1B   23 39 1E 69 F1 A5 9A C8  UM[g..7.#9.i....
#     0020: 69 50 02 71 0D 5C A2 6C   F5 40 5F E4 0D BA 63 CE  iP.q.\.l.@_...c.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.225 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:17.226 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.226 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:17.226 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.226 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-18 24:04:17.226 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:17.227 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.227 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.229 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 7E 9D 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:50.000 UTC",
#       "not  after"         : "2024-01-16 24:03:50.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E D9 73 EF 88 2D BD 38   6F 69 03 17 A5 88 25 7A  n.s..-.8oi....%z
#           0010: 80 88 60 0B                                        ..`.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 49 59 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:44.000 UTC",
#       "not  after"         : "2024-01-16 24:03:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#           0010: 46 50 C6 6C                                        FP.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.254 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F B6 F4 D4 4D 58 F4 D4   DE 54 1E BA 6F 7D FE D3  ....MX...T..o...
#     0010: 7D E2 90 5C 0A 21 F1 7E   3D 6F EE D2 DD A0 C8 EE  ...\.!..=o......
#     0020: 35 C8 1F 8C EF E9 75 62   3B 59 E6 55 68 0A 8F 2B  5.....ub;Y.Uh..+
#     0030: D2 81 FE 83 76 0A 9A 91   0C D2 51 31 43 89 86 0A  ....v.....Q1C...
#     0040: BD 46 29 93 3E 44 CB 7E   9C FB F4 48 14 5E 05 5F  .F).>D.....H.^._
#     0050: 87 78 58 E4 33 2C 4B 91   A8 6D 28 AE C3 10 02 93  .xX.3,K..m(.....
#     0060: 6E B6 AA DF E0 81 D4 40   46 AC 57 C9 91 E2 15 24  n......@F.W....$
#     0070: 83 2F A9 17 18 55 0A 2F   45 B4 06 6E 7A 0A 1D 2F  ./...U./E..nz../
#     0080: 2C 72 F7 C8 61 7F 0D 1F   06 67 9D C8 B6 ED 21 E3  ,r..a....g....!.
#     0090: 68 C5 AB C2 79 C8 36 8D   EE 7D B8 13 87 DD B3 2A  h...y.6........*
#     00A0: 69 4E 48 ED CD 26 D3 CB   EC DA 09 85 08 0A FC 6B  iNH..&.........k
#     00B0: 73 54 B3 48 5D A4 EF BD   88 98 1C 52 1D 3E BA 61  sT.H]......R.>.a
#     00C0: DD B4 FA 67 29 CF E1 56   FE 69 CB 32 88 84 A4 A4  ...g)..V.i.2....
#     00D0: 6C 49 43 70 5C C6 2E 4B   9C 96 00 E2 A4 71 D9 C6  lICp\..K.....q..
#     00E0: E0 11 73 F7 52 D9 59 D4   F9 04 DF EC D4 29 7F E9  ..s.R.Y......)..
#     00F0: 6F 67 9C EA C4 E8 D0 7B   2C 96 1B 1B C9 F0 DC 3F  og......,......?
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.256 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 99 EC F9 F1 D1 32 06 86   BF B0 DE F9 F2 05 FE 7F  .....2..........
#     0010: DA C9 76 26 74 A1 B9 FB   98 29 6E D9 FE 5D 87 F3  ..v&t....)n..]..
#     0020: 0F AD 90 B3 37 CC 1C 5E   C0 65 EC CE AC A3 35 21  ....7..^.e....5!
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.256 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:17.311 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "17 5F 92 66 8E A0 AA 34 6E B5 40 7C 1B A5 39 CE FE FE 55 C7 C2 00 4F A1 45 68 04 B1 60 D5 51 0B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 24:04:17.587 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 24:04:17.588 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-18 00:04:28.935; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:29.278 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 49 59 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:44.000 UTC",
#       "not  after"         : "2024-01-16 24:03:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#           0010: 46 50 C6 6C                                        FP.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 50 86 26 80 7C 93 F5   3C 55 DD A2 95 5C A6 4E  ]P.&....<U...\.N
#           0010: 7B 26 44 5D                                        .&D]
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 76 C8 A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 24:03:42.000 UTC",
#       "not  after"         : "2024-01-16 24:03:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 42 F8 BD 4E E7 82 F6   3B 4A AF 23 BC 5F 89 63  .B..N...;J.#._.c
#           0010: 46 50 C6 6C                                        FP.l
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 24:04:29.294 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:29.520 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:29.522 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-18 24:04:29.523 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.528 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.539 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-18 24:04:29.542 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "DD 91 72 EE 71 7B 66 2E 08 18 2B C9 CF C6 0C 82 CB E2 58 1A E0 9B 6B B8 F3 7E 9E AE 45 41 CF 80",
#     "session id"          : "B9 C2 03 61 84 D7 BD 81 22 E1 5C B1 EE CC 51 7D 8B 44 1C 26 28 6C C2 64 A8 0C EE 40 86 10 C2 81",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 29 80 07 09 2C A8 04 DA   68 8F F7 06 3F 40 70 64  )...,...h...?@pd
#               0010: E8 B6 AF BC 4E 04 CE EB   5E 6F 49 4C 06 78 EB 14  ....N...^oIL.x..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.561 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "0B 94 DF 3A AA 6C CF 49 15 EE AF 44 1F E4 D8 79 82 83 B4 CA CF E9 5E 76 CC 96 E9 8E 69 0B 03 09",
#     "session id"          : "B9 C2 03 61 84 D7 BD 81 22 E1 5C B1 EE CC 51 7D 8B 44 1C 26 28 6C C2 64 A8 0C EE 40 86 10 C2 81",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 91 17 32 B0 54 40 B2 6F   E9 4E FD C3 0D 40 34 5F  ..2.T@.o.N...@4_
#             0010: 68 7F D6 21 5F C8 F9 C8   E9 28 4B 3E 9D 46 CF 02  h..!_....(K>.F..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.561 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.562 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.563 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.567 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.575 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.577 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.578 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.581 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.581 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.581 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:04:29.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-18 24:04:29.584 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-18 24:05:47.483 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:05:47.528 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:05:47.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:05:47.529 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 24:05:47.529 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35934/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28462ms
ok 65 stop command for single port in 31302ms
ok 66 status detects locally running solr in 14614ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2183ms
ok 69 copying files around in 6537ms
ok 70 upconfig in 2613ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 3s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m26.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5695 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5695/

1 tests failed.
FAILED:  org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample

Error Message:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:35383/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr

Starting up Solr on port 35383 using command:
"/tmp/src/solr/solr/bin/solr" start -cloud -p 35383 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr"



Stack Trace:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:35383/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr

Starting up Solr on port 35383 using command:
"/tmp/src/solr/solr/bin/solr" start -cloud -p 35383 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr"


	at __randomizedtesting.SeedInfo.seed([9685CE89BC9600EE:4DF42E438BE3C588]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1289 lines...]
  2> ERROR: java.lang.Exception: Error starting up MiniSolrCloudCluster
  2> 
  2> 5296 INFO  (TEST-TestSolrCLIRunExample.testInteractiveSolrCloudExample-seed#[9685CE89BC9600EE]) [] o.a.s.SolrTestCaseJ4 ###Ending testInteractiveSolrCloudExample
   >     java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:35383/solr; tool output: 
   >     Welcome to the SolrCloud example!
   > 
   >     This interactive session will help you launch a SolrCloud cluster on your local workstation.
   >     To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
   >     Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
   >     Please enter the port for node1 [8983]: 
   >     Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr
   > 
   >     Starting up Solr on port 35383 using command:
   >     "/tmp/src/solr/solr/bin/solr" start -cloud -p 35383 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-001/cloud/node1/solr"
   >         at __randomizedtesting.SeedInfo.seed([9685CE89BC9600EE:4DF42E438BE3C588]:0)
   >         at org.junit.Assert.fail(Assert.java:89)
   >         at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
   >         at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   >         at java.base/java.lang.reflect.Method.invoke(Method.java:566)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
   >         at java.base/java.lang.Thread.run(Thread.java:829)
  2> NOTE: reproduce with: gradlew test --tests TestSolrCLIRunExample.testInteractiveSolrCloudExample -Dtests.seed=9685CE89BC9600EE -Dtests.locale=ca-AD -Dtests.timezone=Europe/Chisinau -Dtests.asserts=true -Dtests.file.encoding=UTF-8
  2> 5335 INFO  (TEST-TestSolrCLIRunExample.testFailExecuteScript-seed#[9685CE89BC9600EE]) [] o.a.s.SolrTestCaseJ4 ###Starting testFailExecuteScript
  2> 
  2> ERROR: access denied ("java.io.FilePermission" "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001/tempDir-003/failExecuteScript" "execute")
  2> 
  2> 5344 INFO  (TEST-TestSolrCLIRunExample.testFailExecuteScript-seed#[9685CE89BC9600EE]) [] o.a.s.SolrTestCaseJ4 ###Ending testFailExecuteScript
  2> 5350 INFO  (SUITE-TestSolrCLIRunExample-seed#[9685CE89BC9600EE]-worker) [] o.a.s.u.ErrorLogMuter Closing ErrorLogMuter-regex-1 after mutting 0 log messages
  2> 5350 INFO  (SUITE-TestSolrCLIRunExample-seed#[9685CE89BC9600EE]-worker) [] o.a.s.u.ErrorLogMuter Creating ErrorLogMuter-regex-2 for ERROR logs matching regex: ignore_exception
  2> NOTE: leaving temporary files on disk at: /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9685CE89BC9600EE-001
  2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{}, maxPointsInLeafNode=657, maxMBSortInHeap=5.779925896972724, sim=Asserting(RandomSimilarity(queryNorm=false): {}), locale=ca-AD, timezone=Europe/Chisinau
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=2,free=230850952,total=324534272
  2> NOTE: All tests run in this JVM: [TestSolrCLIRunExample]

WARNING: Test org.apache.solr.TestRandomFaceting wrote 11,819,836 bytes of output.
WARNING: Test org.apache.solr.search.facet.TestCloudJSONFacetSKGEquiv wrote 15,498,770 bytes of output.
WARNING: Test org.apache.solr.schema.TestCloudSchemaless wrote 12,158,985 bytes of output.
WARNING: Test org.apache.solr.search.facet.TestCloudJSONFacetSKG wrote 20,363,656 bytes of output.

> Task :solr:modules:hdfs:test
WARNING: Test org.apache.solr.hdfs.index.CheckHdfsIndexTest wrote 23,747,536 bytes of output.

> Task :solr:core:test
:solr:core:test (FAILURE): 4897 test(s), 1 failure(s), 205 skipped

4897 tests completed, 1 failed, 205 skipped

> Task :solr:modules:hdfs:test
:solr:modules:hdfs:test (SUCCESS): 103 test(s), 55 skipped

> Task :solr:modules:hdfs:wipeTaskTemp
> Task :solr:modules:hdfs:check
> Task :solr:modules:hdfs:assemblePackaging
> Task :solr:core:test FAILED
> Task :solr:core:wipeTaskTemp
> Task :solr:packaging:installFullDist

ERROR: The following test(s) have failed:
  - org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cli.TestSolrCLIRunExample.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9685CE89BC9600EE -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 41s
653 actionable tasks: 636 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5694 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5694/

All tests passed

Build Log:
[...truncated 1308 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36157/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 16:49:19.200; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 16:49:19.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 16:49:20.446; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 16:49:20.490; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23088ms
ok 61 start solr with client truststore and security manager in 26080ms
not ok 62 start solr with mTLS needed in 62421ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7BRNv2/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36157.
#
# Started Solr server on port 36157 (pid=197299). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36158.
#
# Started Solr server on port 36158 (pid=197731). Happy searching!
#
# INFO  - 2023-10-17 16:50:44.891; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 16:50:44.897; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 16:50:45.277; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 16:50:45.281; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 16:50:45.281; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:45.315 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 C4 B0 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:20.000 UTC",
#     "not  after"         : "2024-01-15 16:50:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 5E 51 FA FC E5 33 FB   93 4A EF C1 07 C6 34 67  E^Q...3..J....4g
#         0010: 47 10 9E D2                                        G...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:45.319 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 9B D5 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:12.000 UTC",
#     "not  after"         : "2024-01-15 16:50:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:45.335 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:45.669 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:45.670 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:45.670 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:45.670 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:45.830 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.831 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:45.832 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:45.833 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.851 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:45.855 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "46 F7 05 5B DD 46 47 4C 7F 0C 26 A4 B9 66 EB EC 03 1E B1 F8 AF 07 A5 1B EC 55 DA 62 B4 DB 5B 59",
#   "session id"          : "AC FB 86 1A 28 1F FD 28 8E C0 F7 CE 8B 4D 46 6B 7E 18 F8 E6 8F A9 B4 67 B1 DB 33 6F 77 A7 42 43",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 49 9B B6 DA 25 98 5E 06   14 2E C8 30 95 5E 08 73  I...%.^....0.^.s
#             0010: 82 03 47 00 43 25 65 B2   70 3F EB FF 1B C5 41 30  ..G.C%e.p?....A0
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.956 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C5 3A 86 30 7F BB B6 6F B7 0D 55 3F 38 0F CB 98 A8 B7 B7 67 54 4D A6 E4 B6 36 D2 14 B2 68 24 68",
#   "session id"          : "AC FB 86 1A 28 1F FD 28 8E C0 F7 CE 8B 4D 46 6B 7E 18 F8 E6 8F A9 B4 67 B1 DB 33 6F 77 A7 42 43",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 10 07 8E 43 E3 64 CE A9   18 D5 4A CA 57 74 FD 22  ...C.d....J.Wt."
#           0010: BF 38 08 2A 00 65 B7 94   42 75 7B 3D 4E 6F FB 64  .8.*.e..Bu.=No.d
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.957 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.957 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.959 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.962 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.963 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:45.964 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.973 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.974 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.975 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.979 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.979 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.980 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.980 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.980 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.980 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.980 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:45.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:45.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.983 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.984 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:45.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.988 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 72 0F 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:17.000 UTC",
#       "not  after"         : "2024-01-15 16:50:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 18 A2 98 80 DB 6D 08   28 DA A6 90 E4 D7 BB 14  ......m.(.......
#           0010: 56 0B 6B 9B                                        V.k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:45.988 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.070 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.074 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E 49 62 79 FC 99 C4 FE   14 AB 9D 60 B9 DB 7C E3  .Iby.......`....
#     0010: 72 D0 06 23 4C 4A D9 8D   4B B8 37 07 81 DE 19 9E  r..#LJ..K.7.....
#     0020: D0 20 A2 D4 51 2A 81 C0   4E 0D 85 C2 68 59 04 88  . ..Q*..N...hY..
#     0030: 28 DF 21 E9 8F 1A F4 A2   6C 43 75 6B 4A F9 84 08  (.!.....lCukJ...
#     0040: D3 D2 9B C3 EE 69 B1 AE   0E E3 0A 15 F2 38 B3 33  .....i.......8.3
#     0050: 45 D4 DB 42 55 7D 35 81   FC 3D 60 3A 74 4D 6A E1  E..BU.5..=`:tMj.
#     0060: 9B 73 5E 2B B7 A6 FC AF   4D 95 27 B1 8B CB 07 DE  .s^+....M.'.....
#     0070: 14 EB F2 3C 4A EA 8B D5   6A 69 85 FE DB 16 C5 35  ...<J...ji.....5
#     0080: 6D 9A B7 38 FB 5B 79 7B   C2 F1 6D 61 FE 7A 86 3E  m..8.[y...ma.z.>
#     0090: ED 63 F3 0C AC D0 20 2E   A7 9F 54 7B EB A3 79 9B  .c.... ...T...y.
#     00A0: FA 18 74 32 93 D6 05 EF   60 A8 13 BB B4 D9 85 19  ..t2....`.......
#     00B0: 38 C1 F9 4B 9B F6 2A 93   EC 5B 84 F1 00 98 73 C2  8..K..*..[....s.
#     00C0: BE 08 9C 37 1D 87 F5 89   F4 CF CB EE 17 81 0B 45  ...7...........E
#     00D0: D0 16 57 E3 FE 13 7F F4   85 03 D7 11 A6 D4 72 77  ..W...........rw
#     00E0: 8C 5E 04 5B C6 35 34 58   E6 18 BD 66 7D 15 1F 8D  .^.[.54X...f....
#     00F0: 35 37 D3 CD 68 28 B6 FD   D4 1A CB 95 18 FA 26 39  57..h(........&9
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.076 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 29 98 24 CA 44 4D EE 8F   33 FA 41 2D 78 5D 39 47  ).$.DM..3.A-x]9G
#     0010: F1 3B 8A 9C 8E A3 AA C3   0C CC 83 91 28 8C 33 59  .;..........(.3Y
#     0020: DB C2 FB 92 3F E2 B3 A3   D0 DD 68 0C FE 32 72 27  ....?.....h..2r'
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:46.079 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:46.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:46.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:46.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:46.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:46.081 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.081 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.083 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 C4 B0 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:20.000 UTC",
#       "not  after"         : "2024-01-15 16:50:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 5E 51 FA FC E5 33 FB   93 4A EF C1 07 C6 34 67  E^Q...3..J....4g
#           0010: 47 10 9E D2                                        G...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 F2 AC 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:14.000 UTC",
#       "not  after"         : "2024-01-15 16:50:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#           0010: CE FA B9 2D                                        ...-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.108 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D 3F D8 80 38 C2 FA 23   1C CF A1 39 EC 22 35 A2  .?..8..#...9."5.
#     0010: F3 11 57 C4 5E 1C F3 B6   13 C1 F7 06 B5 2C D2 66  ..W.^........,.f
#     0020: 81 50 10 CF 42 EC 15 FD   E1 63 8F 73 24 F3 0F 7D  .P..B....c.s$...
#     0030: 5A 30 5E EA 99 4C 05 0A   F2 D7 55 BF BA 56 F4 D0  Z0^..L....U..V..
#     0040: 30 F1 7D FE 7F 38 16 04   3B FF 6B EA 86 3B E0 63  0....8..;.k..;.c
#     0050: 7C 14 37 C5 53 3F 62 9F   C9 68 10 42 3A 09 0E 88  ..7.S?b..h.B:...
#     0060: 11 E9 5D 6F E1 E3 6D 27   26 12 DD 04 B4 15 01 E2  ..]o..m'&.......
#     0070: 1E 6C AF 94 63 07 64 F2   CF A6 9D 33 23 8A 48 3D  .l..c.d....3#.H=
#     0080: B2 D5 2C F7 58 0B 39 CA   8B 2C 10 3E 7F 87 6C B3  ..,.X.9..,.>..l.
#     0090: F0 4D 9B C3 31 02 38 AF   DF AB D9 F3 E6 D7 E3 02  .M..1.8.........
#     00A0: 9A 95 37 FF 91 18 1E 74   9D 49 28 02 8D 99 91 D5  ..7....t.I(.....
#     00B0: BE 82 B0 09 C8 0B B0 88   44 FB 08 50 BE 23 13 4C  ........D..P.#.L
#     00C0: 5C 17 29 94 A8 2D 97 A7   0C 0F D9 F4 8D A4 29 95  \.)..-........).
#     00D0: 3B 4F B2 60 65 0B 9D 81   85 A4 5F 64 06 C7 E2 44  ;O.`e....._d...D
#     00E0: F1 03 4C 88 F6 B5 BB A4   83 ED DA 53 D6 E7 CD 81  ..L........S....
#     00F0: 0A 13 0B C2 14 EE 84 51   2C 87 E7 F0 1D B5 B9 B9  .......Q,.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.110 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C EE 91 6E 24 53 94 BA   C0 AF 89 99 D6 24 F6 4A  ...n$S.......$.J
#     0010: 55 B8 F3 71 14 89 70 67   24 C3 7F 2D 54 13 57 09  U..q..pg$..-T.W.
#     0020: CB E7 D7 AC 0D C3 7D 71   A6 57 FA 98 CA D2 7F 3F  .......q.W.....?
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.110 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:46.174 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B8 BC 45 B0 1D FE 10 E1 E8 9D 3D 47 46 E2 C1 12 67 9E 05 57 84 DC 8F 2A 43 C5 99 9F 9D 81 80 C3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 16:50:46.455 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 16:50:46.457 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 16:50:47.422; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 16:50:47.427; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 16:50:47.799; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 16:50:47.802; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 16:50:47.802; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7BRNv2/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:47.835 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 C4 B0 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:20.000 UTC",
#     "not  after"         : "2024-01-15 16:50:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 5E 51 FA FC E5 33 FB   93 4A EF C1 07 C6 34 67  E^Q...3..J....4g
#         0010: 47 10 9E D2                                        G...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:47.840 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 9B D5 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:12.000 UTC",
#     "not  after"         : "2024-01-15 16:50:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 16:50:47.856 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:48.055 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:48.056 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:48.058 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:50:48.058 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:48.212 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.213 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:48.215 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:50:48.215 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.222 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.233 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.234 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.234 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:50:48.237 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "37 47 FB 0C 26 E7 66 CF 9E 06 80 3C AE 19 49 B8 7E 10 23 0B C7 A9 49 FC 60 21 15 9D 89 DE D2 70",
#   "session id"          : "F9 9B 74 A9 A2 C3 EB 75 FC 65 EF D4 D7 3A 82 76 82 96 F0 20 78 46 81 B3 07 5B 1C A9 21 E7 EF 13",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 12 17 56 3C 5C A4 2D   9C E5 22 B8 37 0F 28 1D  ...V<\.-..".7.(.
#             0010: 77 25 2A CE 85 19 23 A6   93 67 53 5C CB B3 59 4B  w%*...#..gS\..YK
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.343 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FE 97 10 D3 71 17 20 E1 63 BC D5 22 43 3D 57 13 D9 DC 6C 9B B7 EE F7 E2 6C 79 CB 7A 02 B3 E9 EA",
#   "session id"          : "F9 9B 74 A9 A2 C3 EB 75 FC 65 EF D4 D7 3A 82 76 82 96 F0 20 78 46 81 B3 07 5B 1C A9 21 E7 EF 13",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 82 C6 FC 80 AF 4C 15 6A   CE DC 1E 1F D6 C0 FB D9  .....L.j........
#           0010: 12 FF 6F DD A6 60 26 B0   D6 F3 15 91 FD E5 F0 17  ..o..`&.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.344 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.346 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.349 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.351 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.351 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.359 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.360 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.361 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.365 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.365 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.365 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.365 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.366 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.368 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.368 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.368 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.369 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.369 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.370 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.373 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 72 0F 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:17.000 UTC",
#       "not  after"         : "2024-01-15 16:50:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 18 A2 98 80 DB 6D 08   28 DA A6 90 E4 D7 BB 14  ......m.(.......
#           0010: 56 0B 6B 9B                                        V.k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.374 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.462 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 F2 AC 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 16:50:14.000 UTC",
#     "not  after"         : "2024-01-15 16:50:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#         0010: CE FA B9 2D                                        ...-
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#         0010: C2 BF EE 34                                        ...4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.466 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 20 8D C4 27 2D FD 5C 73   39 32 6B 4D 4B DC CE A9   ..'-.\s92kMK...
#     0010: 45 24 13 2A ED CE 82 CC   B6 28 5B 0C D3 67 43 75  E$.*.....([..gCu
#     0020: 5D 00 C9 36 0D 2D 5A 91   5E AF B4 43 51 39 92 2A  ]..6.-Z.^..CQ9.*
#     0030: E0 EE 68 9B 10 A3 CE A9   0B 6F 2B B0 DE BC 7B F1  ..h......o+.....
#     0040: 94 51 C6 36 28 E9 D0 58   D4 EE 62 33 91 D0 B7 B6  .Q.6(..X..b3....
#     0050: 22 DA 5E 3D 43 2F D3 41   79 B1 4F 3E 67 C3 20 84  ".^=C/.Ay.O>g. .
#     0060: 94 7F F0 5C 65 2E 07 7C   28 E0 A7 10 46 37 12 53  ...\e...(...F7.S
#     0070: 4C 70 39 C5 65 F8 AB A8   15 B1 3D 39 2D 9E D3 9C  Lp9.e.....=9-...
#     0080: 0A C0 47 CB BB 8D 07 02   0F 24 00 C6 14 38 65 A3  ..G......$...8e.
#     0090: B1 FC 26 51 39 F3 1D 03   80 FF 34 39 1B 7C CD 1C  ..&Q9.....49....
#     00A0: C6 F8 C5 09 18 61 E4 61   0E 3A 95 03 85 07 18 F8  .....a.a.:......
#     00B0: 64 6E D1 56 79 5F 5F 5D   5E BE 54 31 92 E3 54 FE  dn.Vy__]^.T1..T.
#     00C0: 5F D0 AC 2F EB A4 42 AE   73 DA D3 4F BB 09 49 C4  _../..B.s..O..I.
#     00D0: 89 75 69 7E 0C FB 8B B5   74 55 43 A0 AC 40 D1 C2  .ui.....tUC..@..
#     00E0: 51 D0 2F D6 84 EC C3 BB   BD 43 9E EB 1E A2 D5 90  Q./......C......
#     00F0: 32 70 FE DE 63 72 65 A7   77 24 2D 8F AD 82 18 C8  2p..cre.w$-.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.467 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 68 35 33 F2 85 A1 D6 5B   3C F1 7E 40 A7 7E 3A 58  h53....[<..@..:X
#     0010: D1 D4 48 BA 66 99 79 B5   AC 3E EE 07 1F D4 AA DE  ..H.f.y..>......
#     0020: C1 1C 83 AC A6 4C 23 67   7E F4 2A 7E 07 F1 56 F5  .....L#g..*...V.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.470 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:48.470 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.471 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:48.471 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.471 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 16:50:48.471 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:50:48.472 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.472 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.475 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 C4 B0 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:20.000 UTC",
#       "not  after"         : "2024-01-15 16:50:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 5E 51 FA FC E5 33 FB   93 4A EF C1 07 C6 34 67  E^Q...3..J....4g
#           0010: 47 10 9E D2                                        G...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 F2 AC 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:14.000 UTC",
#       "not  after"         : "2024-01-15 16:50:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#           0010: CE FA B9 2D                                        ...-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.502 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9E 6D 28 10 BF 6F 42 C0   27 04 A8 23 74 A5 A6 D8  .m(..oB.'..#t...
#     0010: 5D 3D 58 35 CA D4 57 15   70 AB A2 F8 7A 51 E4 EF  ]=X5..W.p...zQ..
#     0020: 5E 29 F4 52 64 57 9D CF   BF EC E7 41 AA 3E 4E 82  ^).RdW.....A.>N.
#     0030: 6F 08 57 53 56 63 BB F3   35 EF 90 D8 07 2B 00 98  o.WSVc..5....+..
#     0040: 22 A6 97 B4 8A 36 4C F0   07 28 AE C7 DA 8C 9F 78  "....6L..(.....x
#     0050: 4D 97 AA 4F 01 4B 78 4A   56 F7 B4 BD BC 2A 95 58  M..O.KxJV....*.X
#     0060: D9 C1 06 2A A7 7A E6 6A   7D 4F 95 0D F6 88 D0 38  ...*.z.j.O.....8
#     0070: E4 85 CF CD 6A 1E 0B 19   C9 2E FE 56 0E 21 B3 D1  ....j......V.!..
#     0080: FD 7C 18 67 7B 1C 1F 1B   00 F2 71 DD 74 48 99 D2  ...g......q.tH..
#     0090: 86 38 9F D6 82 6D 51 47   1E 23 A4 9E 7A EC 85 1D  .8...mQG.#..z...
#     00A0: 01 51 AC 27 D6 E4 B3 A1   19 45 7F 08 5C 48 25 88  .Q.'.....E..\H%.
#     00B0: 9B 7C FE 43 EA 6A 55 3E   7E DA 66 B5 36 FA 04 9E  ...C.jU>..f.6...
#     00C0: CD 69 07 51 67 34 AF F8   71 3E 06 90 89 F1 A6 A9  .i.Qg4..q>......
#     00D0: 54 77 6E DD D8 57 57 91   34 C6 6A F4 A6 42 E9 DD  Twn..WW.4.j..B..
#     00E0: 78 03 1A F4 9F 60 DA F1   9B EF F5 4D 36 6C 11 23  x....`.....M6l.#
#     00F0: BF 93 3F EA 4F 0D 43 09   F3 8C E5 59 8A 2F 1B 41  ..?.O.C....Y./.A
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.503 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C B8 AF 14 61 02 74 A4   E8 2D 23 6A 65 65 81 C7  l...a.t..-#jee..
#     0010: E1 C5 DF 16 58 8B 83 A2   AF 48 BC F6 7A 58 D9 2B  ....X....H..zX.+
#     0020: E1 1B B3 EE 43 0D 89 89   DE 4F 5C CB F4 A4 E7 B9  ....C....O\.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.503 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:50:48.566 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "66 D6 13 F5 23 EC 11 6F A4 5C E2 B5 60 6A 24 AA 9B EF 0E 63 E2 72 1C C3 68 2B D6 3F 5F 64 02 8C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 16:50:48.853 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 16:50:48.854 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-17 16:51:00.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 16:51:00.958 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 9B D5 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:12.000 UTC",
#       "not  after"         : "2024-01-15 16:50:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#           0010: CE FA B9 2D                                        ...-
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 F2 AC 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 16:50:14.000 UTC",
#       "not  after"         : "2024-01-15 16:50:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 2A 90 DE B0 6B BF 95   AA 5E C3 D4 47 60 BD ED  .*...k...^..G`..
#           0010: CE FA B9 2D                                        ...-
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 7D 9B F7 30 85 83 EE   45 13 7C 5C 59 83 F1 EF  ....0...E..\Y...
#           0010: C2 BF EE 34                                        ...4
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 16:51:00.975 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:51:01.404 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:51:01.404 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:51:01.404 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:51:01.404 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:51:01.491 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:51:01.493 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 16:51:01.494 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.499 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.511 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 16:51:01.514 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "05 6A 22 7D F4 66 37 F9 36 C8 2B EE F8 B2 36 F7 29 F8 4C 83 12 45 60 3E 61 3E 60 39 EC 50 FC 01",
#     "session id"          : "6B 8D 40 1E 0F 40 8D 60 F7 AD 44 84 62 47 67 56 DC 33 7C A0 B9 27 E1 96 51 0C D6 D4 D4 19 AA F9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F1 C7 C3 D0 4E F9 1B A5   8E 1F 03 E6 E2 74 89 0C  ....N........t..
#               0010: A1 A3 A9 87 10 BD 11 C8   20 26 14 74 7E F3 89 62  ........ &.t...b
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.534 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "2B B4 5C A3 B3 AD A1 BF D4 8E F5 85 1E 9C E2 EC 81 2D F1 48 28 4F 33 EC 7F 5F 06 59 55 43 58 D9",
#     "session id"          : "6B 8D 40 1E 0F 40 8D 60 F7 AD 44 84 62 47 67 56 DC 33 7C A0 B9 27 E1 96 51 0C D6 D4 D4 19 AA F9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 43 98 A4 B9 BD 6C E5 94   44 52 15 81 5A 5F 5D C9  C....l..DR..Z_].
#             0010: 5C A2 E0 8A 33 CA 9D 93   30 64 D3 C3 CC E1 42 0A  \...3...0d....B.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.534 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.534 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.535 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.536 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.538 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.539 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.540 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.541 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.547 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.549 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.550 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.554 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.554 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.554 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:51:01.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 16:51:01.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 16:52:26.281 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:52:26.325 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:52:26.325 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:52:26.325 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 16:52:26.325 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36158/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28475ms
ok 65 stop command for single port in 31784ms
ok 66 status detects locally running solr in 14729ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2187ms
ok 69 copying files around in 6684ms
ok 70 upconfig in 2676ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 22m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m27s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5693 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5693/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([DE8D525B69D85D76:EB79B90082046B28]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6266 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=DE8D525B69D85D76 -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 47s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m10s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5692 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5692/

All tests passed

Build Log:
[...truncated 1311 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33075/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 11:46:26.045; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 11:46:26.051; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 11:46:26.966; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 11:46:27.007; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22269ms
ok 61 start solr with client truststore and security manager in 25540ms
not ok 62 start solr with mTLS needed in 57286ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-6kzuiW/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33075.
#
# Started Solr server on port 33075 (pid=198089). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33076.
#
# Started Solr server on port 33076 (pid=198542). Happy searching!
#
# INFO  - 2023-10-17 11:47:50.215; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 11:47:50.221; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 11:47:50.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 11:47:50.593; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 11:47:50.594; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:50.626 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 D7 E6 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:26.000 UTC",
#     "not  after"         : "2024-01-15 11:47:26.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 BE F0 28 7C D7 E4 B2   00 A3 16 46 1A DC 9C 41  ...(.......F...A
#         0010: 91 DA AB 6F                                        ...o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:50.631 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 79 9C 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:17.000 UTC",
#     "not  after"         : "2024-01-15 11:47:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:50.646 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:50.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:50.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:50.988 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:50.988 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:51.143 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.144 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:51.146 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:51.146 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.151 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.164 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.164 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:51.166 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1F 00 AE 19 E5 71 0C 84 B8 F8 A8 4C BF 72 8E 06 5F FF 1A A7 D0 BF E4 22 62 41 1E 2F 35 5F BC 39",
#   "session id"          : "69 57 3D 3D A3 56 52 84 54 F8 E1 A7 A4 E2 07 AA 38 13 91 50 4D B5 04 5C 36 95 E8 A4 BC 44 74 19",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 56 A3 05 7B BE 9A 82   D7 07 AA 80 7B 77 A5 E3  ^V...........w..
#             0010: A2 94 78 B2 B3 A5 4F 02   9B F1 11 22 AC D3 66 1A  ..x...O...."..f.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.271 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 A2 09 42 C8 26 BB 28 BB F5 FF 01 2E 8F 57 2B 8B EA 66 69 00 A9 EA 96 2F 82 59 B0 E4 B1 43 79",
#   "session id"          : "69 57 3D 3D A3 56 52 84 54 F8 E1 A7 A4 E2 07 AA 38 13 91 50 4D B5 04 5C 36 95 E8 A4 BC 44 74 19",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A 15 EE 11 13 DE 7C C0   85 57 40 40 52 10 DE 86  :........W@@R...
#           0010: 23 20 6D 2B 9E EA D9 88   6B AF 79 E7 D5 68 0C 38  # m+....k.y..h.8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.271 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.271 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.272 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.272 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.273 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.276 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.276 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.276 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.277 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.278 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.285 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.287 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.288 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.292 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.292 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.292 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.295 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.296 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.296 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.297 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.298 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.299 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.299 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.303 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 60 34 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:22.000 UTC",
#       "not  after"         : "2024-01-15 11:47:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 BF 31 E0 2D 7B E6 E2   2E 0D 5F EA 60 B3 4E 10  ..1.-....._.`.N.
#           0010: 3A C0 20 10                                        :. .
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.303 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.388 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.391 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 23 D3 BF 67 D8 29 55 B5   5E F1 FE F3 46 38 B7 D1  #..g.)U.^...F8..
#     0010: A9 57 4B D7 BB 11 9E DA   16 C0 46 00 E5 EF CC E7  .WK.......F.....
#     0020: 91 76 66 89 82 3C C9 17   84 CB 1C D5 C3 DF C3 4E  .vf..<.........N
#     0030: 21 B5 59 04 C3 DD 92 14   D2 D1 29 06 85 1B F3 23  !.Y.......)....#
#     0040: 3F 3A D9 AD 7A 43 23 BD   F1 DB 1E 09 A8 DC 07 8B  ?:..zC#.........
#     0050: B1 39 FC 65 A0 0C BF 39   12 17 00 33 A1 25 B8 32  .9.e...9...3.%.2
#     0060: B5 23 63 90 71 24 9C AC   84 82 FB AC 73 15 FD 7E  .#c.q$......s...
#     0070: 87 4E 3B 4A DD 9B 47 4C   83 22 F1 51 11 33 6A 25  .N;J..GL.".Q.3j%
#     0080: 56 F2 87 33 1C 5A 33 F2   98 98 2C C8 17 82 36 64  V..3.Z3...,...6d
#     0090: C3 DC B1 E9 B9 0E EF E9   4F 7E C8 D5 2C 8D 9E 9D  ........O...,...
#     00A0: FD 24 0F 3A 5E 91 ED 6A   2B EA BF 01 02 2A 1B 90  .$.:^..j+....*..
#     00B0: 18 82 47 30 58 95 FC F7   B0 73 36 14 BC 83 89 BB  ..G0X....s6.....
#     00C0: 35 02 F3 4D 86 E8 56 DA   F7 19 C9 0D 3D 82 D3 55  5..M..V.....=..U
#     00D0: 2F 95 B0 A2 50 00 7C AF   C8 95 BD 86 62 96 8D D3  /...P.......b...
#     00E0: 1A 01 F9 AF EC FD A0 B1   E8 0B AC 5E FB 1B F4 A6  ...........^....
#     00F0: 76 42 63 BF 10 38 31 AB   CA 73 05 9A 0E 97 0F A8  vBc..81..s......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.393 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 50 7F AE B0 40 7C 0D B7   7F 6D 57 2A DC EB E3 99  P...@....mW*....
#     0010: 75 92 86 CF 1C 86 12 64   93 07 C7 33 3B 96 6D 56  u......d...3;.mV
#     0020: CD EE D0 05 6A 5C 5A 50   04 83 4E DB 26 F8 BA 0C  ....j\ZP..N.&...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.395 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:51.396 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.396 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:51.397 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.397 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:51.397 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:51.397 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.398 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.400 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 D7 E6 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:26.000 UTC",
#       "not  after"         : "2024-01-15 11:47:26.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 BE F0 28 7C D7 E4 B2   00 A3 16 46 1A DC 9C 41  ...(.......F...A
#           0010: 91 DA AB 6F                                        ...o
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 C3 AC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:19.000 UTC",
#       "not  after"         : "2024-01-15 11:47:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#           0010: EB 6B 27 3E                                        .k'>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.427 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C C2 AF F6 04 71 9A 6A   C4 B7 6A 29 87 2E F2 EC  .....q.j..j)....
#     0010: 5C 79 78 C5 23 A2 C4 2F   8C 35 54 58 E8 FD D3 C5  \yx.#../.5TX....
#     0020: A7 41 27 EF 59 53 8C BE   B4 B3 48 BB 7F AB B8 52  .A'.YS....H....R
#     0030: 7B 4B A8 D0 A7 14 5E F8   76 CD EE 27 0B 72 8A 86  .K....^.v..'.r..
#     0040: 00 D8 10 85 31 53 53 20   91 13 94 3B 78 E5 ED B0  ....1SS ...;x...
#     0050: AF B1 18 8D E7 E1 C6 E4   66 50 92 6E 18 54 17 10  ........fP.n.T..
#     0060: A0 6B AB 6C F5 85 53 F1   B2 7D 7C B8 F7 CF 5B E0  .k.l..S.......[.
#     0070: 75 09 39 8B A6 28 46 66   30 B4 5C 9E 0D 04 A0 E5  u.9..(Ff0.\.....
#     0080: 00 E2 2D 5D 4D 85 36 79   DD 9A 93 86 32 36 1D 4C  ..-]M.6y....26.L
#     0090: A2 C9 95 9B 9F 2A 72 FE   7B 73 00 58 CE 5A 1A C8  .....*r..s.X.Z..
#     00A0: A0 EB DB FA 25 86 5D 48   E5 78 50 59 A7 9F 15 B4  ....%.]H.xPY....
#     00B0: 4A AD 2B AE 96 E1 DB 2F   24 4B 7A 56 D1 0F 10 A4  J.+..../$KzV....
#     00C0: 25 C5 D9 FD D1 08 8B 41   F0 EE 53 21 D6 37 92 49  %......A..S!.7.I
#     00D0: 23 0D D2 5D 0C 09 27 95   91 15 28 D1 CE 70 8A BE  #..]..'...(..p..
#     00E0: 66 9F B1 D4 1B 56 30 7B   45 CD A0 DC 7A 23 BF 97  f....V0.E...z#..
#     00F0: A1 A5 68 E8 E8 DA 7B A6   71 AE B6 FF A3 E6 4C C9  ..h.....q.....L.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.428 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D 29 0D F4 4C 17 D0 DE   0F B8 44 94 A5 6C 01 61  .)..L.....D..l.a
#     0010: A0 94 7E 7C 2B 96 C6 4D   5F 22 B5 0B 36 FD 92 6B  ....+..M_"..6..k
#     0020: EC 6A BE A5 09 6A 21 75   95 82 A4 58 5A CF 73 D6  .j...j!u...XZ.s.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.429 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:51.490 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "18 99 C2 62 47 F2 0B 07 10 E3 E1 2F E6 EE 8B B0 0C 11 15 30 16 B7 C5 8E B8 C6 06 D4 05 F9 BA E7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 11:47:51.781 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 11:47:51.782 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 11:47:52.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 11:47:52.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 11:47:53.086; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 11:47:53.089; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 11:47:53.090; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6kzuiW/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:53.121 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 D7 E6 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:26.000 UTC",
#     "not  after"         : "2024-01-15 11:47:26.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 BE F0 28 7C D7 E4 B2   00 A3 16 46 1A DC 9C 41  ...(.......F...A
#         0010: 91 DA AB 6F                                        ...o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:53.126 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 79 9C 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:17.000 UTC",
#     "not  after"         : "2024-01-15 11:47:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 11:47:53.140 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:53.230 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:53.230 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:53.231 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:47:53.231 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:53.372 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.372 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:53.374 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:47:53.374 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.380 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.392 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.392 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.392 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:47:53.395 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8B E9 0D CB CE 4C 00 81 E4 42 ED A8 DA 8B 9A C1 6D 39 0D 03 65 BE 59 01 36 3E 83 D5 2C 40 73 55",
#   "session id"          : "28 6E E0 68 46 98 F9 25 C7 81 A1 77 72 70 62 1B 9C FF E8 CE B4 52 0D 47 E2 C2 56 D3 1A C2 C2 E3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B9 92 0C 10 17 02 83 66   E1 13 B7 29 5B 4E 9C 12  .......f...)[N..
#             0010: 55 15 56 59 DF EA 64 53   CD 5A 05 E1 B8 3B D7 7A  U.VY..dS.Z...;.z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.494 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B5 A5 CA 9F 51 A7 B6 20 A5 03 FE 92 EB 7D AB 57 AF 17 02 B1 2C A4 97 B4 D1 4C 12 44 23 EC 6C F4",
#   "session id"          : "28 6E E0 68 46 98 F9 25 C7 81 A1 77 72 70 62 1B 9C FF E8 CE B4 52 0D 47 E2 C2 56 D3 1A C2 C2 E3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 83 C0 2D 45 63 F5 40 D4   A7 24 54 F0 39 63 04 48  ..-Ec.@..$T.9c.H
#           0010: 28 D6 E1 AC 3A 14 D9 96   F3 57 9E 7F 17 EF 47 07  (...:....W....G.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.495 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.495 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.498 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.500 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.500 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.500 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.501 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.509 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.510 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.511 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.515 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.515 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.515 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.518 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.519 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.519 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.520 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.520 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.523 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 60 34 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:22.000 UTC",
#       "not  after"         : "2024-01-15 11:47:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 BF 31 E0 2D 7B E6 E2   2E 0D 5F EA 60 B3 4E 10  ..1.-....._.`.N.
#           0010: 3A C0 20 10                                        :. .
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.523 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.603 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C3 AC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 11:47:19.000 UTC",
#     "not  after"         : "2024-01-15 11:47:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#         0010: EB 6B 27 3E                                        .k'>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#         0010: 6B B0 45 5C                                        k.E\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.606 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 C2 6A A2 0E 2F 9B 99   B9 1D 1E 2A 6B 72 93 56  ..j../.....*kr.V
#     0010: C2 31 98 EE C8 2B FA AF   0A BE 22 3D 86 B6 56 71  .1...+...."=..Vq
#     0020: 1B 34 1B 5C EE E4 88 CB   14 C4 26 EB B8 FC 91 46  .4.\......&....F
#     0030: DE BB AE 0C CB EF 92 4D   85 27 03 B7 44 F1 31 DB  .......M.'..D.1.
#     0040: AB 73 0D E1 6A 4F BF 46   2E 91 82 FC 88 75 D6 D0  .s..jO.F.....u..
#     0050: 28 91 14 50 B7 AD 56 7A   FC 98 D8 5B F7 79 04 24  (..P..Vz...[.y.$
#     0060: 37 97 0D FE 1C E7 61 30   C9 DC A3 B5 57 C2 EE D0  7.....a0....W...
#     0070: A6 4D AC D3 82 3C FD 5A   E8 53 7C 00 76 01 2D D2  .M...<.Z.S..v.-.
#     0080: 0B 67 37 F3 78 37 51 14   A1 8E 75 EF 01 10 33 42  .g7.x7Q...u...3B
#     0090: D1 62 AD AE A9 D8 5B C5   5A E6 14 A9 42 E5 1A F5  .b....[.Z...B...
#     00A0: E6 E7 62 9B 8F 48 E1 54   96 41 A3 4E 08 9F 4E 86  ..b..H.T.A.N..N.
#     00B0: 84 66 8B B9 AE 3F FF 89   DE DD 55 38 94 18 AF 17  .f...?....U8....
#     00C0: 95 40 66 44 00 50 DB DD   9D 59 F3 6B 2F 84 76 C5  .@fD.P...Y.k/.v.
#     00D0: 37 5E 0E 01 72 27 B3 81   93 63 23 D2 E0 E9 99 EA  7^..r'...c#.....
#     00E0: 11 84 A5 61 D0 44 32 B4   A5 20 06 A8 50 9A 8A 68  ...a.D2.. ..P..h
#     00F0: 7E ED 05 9D 8D CF 8B 6E   A7 B3 2B BA 50 A7 98 B5  .......n..+.P...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.608 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 3A 86 CE 53 A3 EA 52   4E 78 F0 4E 66 B8 5B 2A  .:..S..RNx.Nf.[*
#     0010: 8F 95 40 2C 69 C8 E6 F3   83 D9 3D D9 6E A0 AE E5  ..@,i.....=.n...
#     0020: 84 3D 53 6E 08 73 85 6F   B8 DE 45 54 E2 92 5D 39  .=Sn.s.o..ET..]9
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:53.611 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.611 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:53.612 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.612 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 11:47:53.612 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:47:53.612 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.613 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.615 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 D7 E6 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:26.000 UTC",
#       "not  after"         : "2024-01-15 11:47:26.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 BE F0 28 7C D7 E4 B2   00 A3 16 46 1A DC 9C 41  ...(.......F...A
#           0010: 91 DA AB 6F                                        ...o
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 C3 AC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:19.000 UTC",
#       "not  after"         : "2024-01-15 11:47:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#           0010: EB 6B 27 3E                                        .k'>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.642 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BC 5C E1 45 FE EC 3A F3   4B 2F CA B1 F5 DC AE DB  .\.E..:.K/......
#     0010: 29 02 01 83 A4 7E 5F 20   AA 4D 27 9B 26 9F 83 13  )....._ .M'.&...
#     0020: 86 DA 18 AB 2F A4 E3 DD   77 BF CF 4C B0 7F E0 36  ..../...w..L...6
#     0030: C0 F8 38 BE 82 C4 3C 8C   31 CD 37 E9 F1 E4 FF B2  ..8...<.1.7.....
#     0040: E3 80 E2 9A 7D 49 8D 17   B2 63 9A E4 A8 06 26 33  .....I...c....&3
#     0050: 0C AB 62 92 AC 5D AD 60   D1 9F 93 61 39 CB 91 CF  ..b..].`...a9...
#     0060: 45 66 C8 82 9F C1 23 59   AC E4 B4 40 7E BC 4B 42  Ef....#Y...@..KB
#     0070: 9F 77 4D 88 5C B6 AB 29   95 CD 96 90 26 2C 7F 04  .wM.\..)....&,..
#     0080: F7 B1 FF 02 D6 38 DF B4   96 9E E8 36 3D 19 D7 DC  .....8.....6=...
#     0090: CB B7 F5 02 98 26 4B 1F   74 9B 41 1D 52 92 DB 18  .....&K.t.A.R...
#     00A0: C9 BB 16 60 5B 4D B1 F3   F7 90 BD B9 69 96 5C 6A  ...`[M......i.\j
#     00B0: D3 F1 1C D1 E0 63 E1 8E   E7 7A CC F3 8C E4 1B DA  .....c...z......
#     00C0: 0F 5A BD 5E FB C9 B0 33   E4 AF 4E BE A4 8F 92 38  .Z.^...3..N....8
#     00D0: 23 65 77 56 7B 69 15 10   38 0F 36 63 0A A3 30 18  #ewV.i..8.6c..0.
#     00E0: 70 1B 08 4A BD 57 C0 8A   DC E0 31 76 7E C0 E8 C2  p..J.W....1v....
#     00F0: 61 D7 C3 C6 DF 2C 4F 7A   5B A4 3B 60 31 1C 75 AF  a....,Oz[.;`1.u.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.643 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E8 90 33 DE 68 4D 42 14   2A CB F9 50 53 25 E2 7C  ..3.hMB.*..PS%..
#     0010: D5 69 E5 7D 5F 3F 3F 52   B5 B9 15 10 BF C7 26 66  .i.._??R......&f
#     0020: 66 64 34 B5 AA D2 5B B5   CD 4F 80 ED 87 F0 00 C3  fd4...[..O......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.643 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:47:53.698 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DB 93 F6 5A 8E 04 1C 48 38 AD 25 48 4B 71 3F 58 B4 AD 08 52 75 4B 4F 99 99 3D 81 F5 69 66 02 4C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 11:47:53.973 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 11:47:53.974 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-17 11:48:04.761; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 11:48:05.111 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 C3 AC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:19.000 UTC",
#       "not  after"         : "2024-01-15 11:47:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#           0010: EB 6B 27 3E                                        .k'>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 FA E4 AE 4E 69 DE A8   66 82 CD B9 DA CA 26 1A  ....Ni..f.....&.
#           0010: 6B B0 45 5C                                        k.E\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 79 9C 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 11:47:17.000 UTC",
#       "not  after"         : "2024-01-15 11:47:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 8C 0B A3 B7 63 49 13   0D 4D FA 2C 3E 65 4C BB  .....cI..M.,>eL.
#           0010: EB 6B 27 3E                                        .k'>
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 11:48:05.128 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:48:05.531 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:48:05.531 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:48:05.532 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:48:05.532 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:48:05.611 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:48:05.613 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 11:48:05.613 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.618 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.630 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 11:48:05.633 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "9E B2 0A 6D 17 F7 5C 7A DD 62 1A 58 BA 87 5C F5 A0 28 DE 0E DA AC 78 63 E7 2F 9E 4C E4 DB E1 7B",
#     "session id"          : "F5 FC 13 2B FE 15 A0 E9 20 10 E9 F3 05 C8 59 82 5B EF 81 CF D6 10 1B E7 E5 72 29 B1 DB A7 F2 32",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 05 7E A8 70 1F 63 04 4A   77 47 BB 34 B8 26 53 76  ...p.c.JwG.4.&Sv
#               0010: FB 73 39 FB C1 86 99 13   0A 31 93 B3 2D 11 38 11  .s9......1..-.8.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.651 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E4 DF 38 A8 3E E7 DD D6 04 B1 7A DA 52 95 B9 23 9E BC C2 B0 3E FB DE F7 EE CF 29 4C E5 05 69 D5",
#     "session id"          : "F5 FC 13 2B FE 15 A0 E9 20 10 E9 F3 05 C8 59 82 5B EF 81 CF D6 10 1B E7 E5 72 29 B1 DB A7 F2 32",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 39 67 AD F7 E8 8B 03 C9   65 E4 E7 B7 58 68 D8 A5  9g......e...Xh..
#             0010: 07 82 50 9D 1B 96 7A DB   E3 05 35 D6 B7 D9 75 55  ..P...z...5...uU
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.651 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.652 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.653 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.653 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.653 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.653 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.653 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.654 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.656 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.657 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.657 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.657 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.657 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.659 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.666 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.667 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.668 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.672 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.672 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.672 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.672 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.673 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:48:05.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:48:05.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 11:48:05.674 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 11:49:25.006 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:49:25.052 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:49:25.053 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:49:25.053 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 11:49:25.053 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33076/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28070ms
ok 65 stop command for single port in 31319ms
ok 66 status detects locally running solr in 14366ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2197ms
ok 69 copying files around in 6601ms
ok 70 upconfig in 2633ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 20m 51s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m15s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5691 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5691/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42503/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 09:32:02.082; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 09:32:02.088; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 09:32:03.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 09:32:03.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23782ms
ok 61 start solr with client truststore and security manager in 24926ms
not ok 62 start solr with mTLS needed in 57391ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-y5P4ay/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42503.
#
# Started Solr server on port 42503 (pid=199354). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42504.
#
# Started Solr server on port 42504 (pid=199786). Happy searching!
#
# INFO  - 2023-10-17 09:33:27.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 09:33:27.238; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 09:33:27.612; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 09:33:27.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 09:33:27.615; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:27.645 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 02 7C B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:33:03.000 UTC",
#     "not  after"         : "2024-01-15 09:33:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A E5 D1 7E A4 B6 1C 0F   47 48 30 98 77 06 B0 B4  :.......GH0.w...
#         0010: 43 DB 98 53                                        C..S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:27.650 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A E0 8F 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:55.000 UTC",
#     "not  after"         : "2024-01-15 09:32:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:27.664 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:27.773 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:27.774 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:27.774 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:27.774 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:27.910 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.911 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:27.913 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:27.913 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.919 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.931 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.931 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.931 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:27.934 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B2 30 88 1F CB BD D7 32 90 D0 7D B4 81 AD 2C 42 46 EA 13 10 EF CC 63 F4 9B 46 FA 50 A5 AF 3A 65",
#   "session id"          : "55 CD EE DD 45 96 8B C6 17 93 12 61 92 92 EF D8 67 E8 C9 AF A3 79 3D 2A 10 AC 7E 67 D0 69 C7 58",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7B 9E 53 FF 13 37 C5 52   1D 27 B9 05 8E D7 D8 C9  ..S..7.R.'......
#             0010: B7 DD C3 1F 9C 61 37 61   AE FF 8D 50 C6 74 7D 50  .....a7a...P.t.P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.049 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EA 31 27 8A 8E DC A2 EE 14 FE BB 78 AA 0C 27 57 10 61 EE AB 08 53 88 CE 4B E7 D2 78 44 66 2D BF",
#   "session id"          : "55 CD EE DD 45 96 8B C6 17 93 12 61 92 92 EF D8 67 E8 C9 AF A3 79 3D 2A 10 AC 7E 67 D0 69 C7 58",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 28 E8 15 6E 2C 61 0E 09   1A AA F7 3F 76 E9 68 46  (..n,a.....?v.hF
#           0010: C7 7A ED 7C 97 E4 B1 55   A9 22 AF 9D 86 CB CE 23  .z.....U.".....#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.050 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.050 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.052 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.054 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.055 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.063 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.065 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.066 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.073 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.074 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.075 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.075 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.077 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 8C FF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:59.000 UTC",
#       "not  after"         : "2024-01-15 09:32:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 5F D3 68 1B 38 96 8C   1B 0E 4E E9 5F 1E F2 49  1_.h.8....N._..I
#           0010: 5B 41 87 F1                                        [A..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.077 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.156 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.159 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 94 22 81 01 56 B8 CE BC   5D D9 80 55 F8 DF EE 06  ."..V...]..U....
#     0010: 50 5A FF 3E 66 6B FB 5F   2B 61 12 5A CC EC 87 6B  PZ.>fk._+a.Z...k
#     0020: C3 40 3F E9 F6 4C 4F 07   BF A9 E1 1A DB 78 5E CE  .@?..LO......x^.
#     0030: 93 1B 97 16 4D EF 65 7B   CC AB A6 36 00 72 D1 96  ....M.e....6.r..
#     0040: 94 FA 45 B8 20 18 AD 57   35 26 03 88 85 53 DC FD  ..E. ..W5&...S..
#     0050: D0 49 5E 3F 6E 25 EF 4D   C0 7C 09 79 C1 49 28 47  .I^?n%.M...y.I(G
#     0060: D7 E5 B4 6B E1 F4 35 A5   1A C4 1F 74 FC 35 1D 9E  ...k..5....t.5..
#     0070: 64 FB DE D4 6D 98 B8 1D   8F 05 5D 36 A0 5E 5F 1B  d...m.....]6.^_.
#     0080: 15 54 76 94 07 E3 56 AD   09 3E 0C CB 0F DF FA 33  .Tv...V..>.....3
#     0090: 97 57 BF 81 DE 0D 60 FB   3E 85 CA F2 13 E4 FF 3C  .W....`.>......<
#     00A0: 3C 35 40 AA E1 65 A9 F0   54 01 4A 03 80 72 92 F5  <5@..e..T.J..r..
#     00B0: F5 50 1B E3 BA 40 DE 4F   FC 05 B5 97 D8 14 BD DE  .P...@.O........
#     00C0: 35 D3 84 B0 00 89 EE B7   DC D4 3F F3 8F 67 A4 64  5.........?..g.d
#     00D0: C0 0C EE 59 8C BD 6E 71   B9 40 82 EB CF 45 5F B2  ...Y..nq.@...E_.
#     00E0: 41 A4 D3 EF D2 FD D5 92   24 35 93 9F 32 09 14 57  A.......$5..2..W
#     00F0: 85 96 1B 78 3E D5 EF 34   03 45 EB 85 E2 C3 C2 80  ...x>..4.E......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.161 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 E2 F0 D8 B8 3B 7E 4C   3C 96 D7 AC 0F 49 72 6B  .....;.L<....Irk
#     0010: 2E 57 CD FF 89 E7 9A 0A   1C 7C D0 EF 7A FA 00 E4  .W..........z...
#     0020: CE F9 8F 8F F7 7E 3A 20   65 38 8A DD 45 A2 8E 82  ......: e8..E...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:28.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:28.165 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.165 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:28.165 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:28.165 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.166 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.168 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 02 7C B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:33:03.000 UTC",
#       "not  after"         : "2024-01-15 09:33:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A E5 D1 7E A4 B6 1C 0F   47 48 30 98 77 06 B0 B4  :.......GH0.w...
#           0010: 43 DB 98 53                                        C..S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 18 B7 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:57.000 UTC",
#       "not  after"         : "2024-01-15 09:32:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#           0010: 2C E1 87 8D                                        ,...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.194 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 75 53 C7 76 D3 39 74   66 0C 2E E9 9C FD 8D 16  6uS.v.9tf.......
#     0010: 67 1F 9E 4D 10 EC 51 E2   4E CB C6 A8 B5 7D C4 5F  g..M..Q.N......_
#     0020: E9 33 70 19 90 2F F6 57   98 DA 4D 4C 83 D2 0A 31  .3p../.W..ML...1
#     0030: 49 89 77 91 F3 84 9E AA   CD 0D 00 69 8C 06 1D 75  I.w........i...u
#     0040: 81 36 B1 E7 83 29 EF 8E   B5 20 BA D8 96 D9 72 7D  .6...)... ....r.
#     0050: E1 B0 A0 E0 06 2E F4 DE   08 03 89 1C A9 8C DE 25  ...............%
#     0060: 5A 81 28 AB 21 E9 C8 8A   CC DE 51 EE 53 46 78 14  Z.(.!.....Q.SFx.
#     0070: DB 3B AE 33 32 A1 34 23   76 81 D5 D2 69 B1 BC FD  .;.32.4#v...i...
#     0080: C7 18 2B B5 0D 3B 43 3F   59 75 6B 2C B4 F4 C6 33  ..+..;C?Yuk,...3
#     0090: 8D 05 77 48 CC 62 7F 5C   BD 58 94 4C 95 F7 E4 2C  ..wH.b.\.X.L...,
#     00A0: 50 D2 5A 9C EE 5F 21 D1   D9 1E 9F CC 56 08 D3 14  P.Z.._!.....V...
#     00B0: 5B AB F6 03 FC 44 2B A4   37 8C 47 34 98 75 EC AD  [....D+.7.G4.u..
#     00C0: DE 08 14 35 E5 B7 0C 94   50 52 4A FA 59 C4 18 06  ...5....PRJ.Y...
#     00D0: CD 89 72 13 A4 1F 83 83   5F F3 43 19 C4 BF 20 DA  ..r....._.C... .
#     00E0: 77 82 34 AC 72 0D A2 AF   02 C9 E5 1C 93 31 AA E7  w.4.r........1..
#     00F0: 9D 9C E4 31 7E 7E BF 4C   37 2D 58 33 E8 09 AE CE  ...1...L7-X3....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.195 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 50 DF 1B EB 19 AD 47 7A   68 3F E2 7D 6F C0 E2 F3  P.....Gzh?..o...
#     0010: 90 B2 14 56 BF D0 54 38   7B 72 C2 E1 89 2B FD C5  ...V..T8.r...+..
#     0020: 67 DE 1B F8 E7 81 34 D7   89 43 79 63 39 11 40 1C  g.....4..Cyc9.@.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.196 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:28.252 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A2 38 63 2C A0 58 4D 5D 2B 96 8F 62 F4 68 47 86 E5 19 78 03 19 24 38 D8 27 3A 3A E1 8B 41 61 D1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 09:33:28.560 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 09:33:28.561 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 09:33:29.511; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 09:33:29.516; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 09:33:29.885; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 09:33:29.889; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 09:33:29.889; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-y5P4ay/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:29.922 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 02 7C B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:33:03.000 UTC",
#     "not  after"         : "2024-01-15 09:33:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A E5 D1 7E A4 B6 1C 0F   47 48 30 98 77 06 B0 B4  :.......GH0.w...
#         0010: 43 DB 98 53                                        C..S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:29.927 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A E0 8F 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:55.000 UTC",
#     "not  after"         : "2024-01-15 09:32:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:29.943 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:30.451 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.452 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:30.454 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:30.454 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.460 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.472 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.473 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.473 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:30.476 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "32 61 55 9B D9 9B B9 C0 6B 66 BE DA 10 17 35 B9 59 11 CA 43 06 91 01 F1 E3 F3 25 24 D1 03 3C 5B",
#   "session id"          : "39 C1 4B 44 2A F1 5F 21 10 2F B1 CC 38 C6 12 28 D8 3E 23 11 28 D8 49 BE 89 90 4F E7 2D 7B 99 99",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A9 3B A4 78 AF F0 AD 10   E1 0D AA 38 B8 07 BC 3D  .;.x.......8...=
#             0010: DF D6 C1 B5 AC 26 8D B3   0F 98 0E F1 96 53 1D 75  .....&.......S.u
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.574 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6C A0 C5 E3 BD AA 0D 00 AA 69 78 A7 3C 36 92 5A E6 E5 DA 43 84 D7 22 8D 7A F8 4B BB 0A 29 1A A6",
#   "session id"          : "39 C1 4B 44 2A F1 5F 21 10 2F B1 CC 38 C6 12 28 D8 3E 23 11 28 D8 49 BE 89 90 4F E7 2D 7B 99 99",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FB BE BE 8D 42 3D C3 70   44 59 76 2E F1 37 B2 BD  ....B=.pDYv..7..
#           0010: 3A C1 3A E7 F8 F3 B0 3C   E8 22 71 52 D0 55 A1 57  :.:....<."qR.U.W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.575 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.575 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.580 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.580 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.580 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.590 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.593 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.596 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.597 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.597 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.600 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.601 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.603 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.603 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.607 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 8C FF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:59.000 UTC",
#       "not  after"         : "2024-01-15 09:32:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 5F D3 68 1B 38 96 8C   1B 0E 4E E9 5F 1E F2 49  1_.h.8....N._..I
#           0010: 5B 41 87 F1                                        [A..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.607 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:30.651 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:30.653 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:30.653 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:30.653 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.690 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 18 B7 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 09:32:57.000 UTC",
#     "not  after"         : "2024-01-15 09:32:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#         0010: 2C E1 87 8D                                        ,...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#         0010: 63 22 C0 68                                        c".h
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.693 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 FD 7D 2B 7E 78 57 03   B5 1C 4E AC CE F4 9C 36  D..+.xW...N....6
#     0010: C8 E0 9E 8F B6 38 53 41   10 6A B6 52 C1 6D 5D B1  .....8SA.j.R.m].
#     0020: F3 F3 12 BF 25 FE 68 BE   87 41 F2 40 0D EA 9D F7  ....%.h..A.@....
#     0030: 79 37 2A 17 05 56 72 AA   99 27 32 CF 47 4E D4 29  y7*..Vr..'2.GN.)
#     0040: 7D 7C AA C9 F1 88 4F E2   76 EB 3E 03 75 6D 31 49  ......O.v.>.um1I
#     0050: 04 38 44 B4 46 45 0A 06   13 73 54 A9 BC C3 34 E6  .8D.FE...sT...4.
#     0060: 12 DB A3 B1 7A 20 71 82   E8 5B A6 CC 64 EA FB C9  ....z q..[..d...
#     0070: 48 4F AC E2 7E 0D B0 7B   1E 81 E9 70 CD ED F9 47  HO.........p...G
#     0080: 1A C3 68 2F 69 F5 5F F3   26 5E A2 E3 C3 B6 1B 83  ..h/i._.&^......
#     0090: AB 77 E0 78 DF B9 EE BA   88 CF 2C 5A FA 41 1F 46  .w.x......,Z.A.F
#     00A0: 2F AA DE 1F 35 4E 05 D7   22 72 16 EA 31 11 18 2E  /...5N.."r..1...
#     00B0: 6C 1D D6 C7 C7 A6 81 CC   BF 55 72 4A 7E 04 71 31  l........UrJ..q1
#     00C0: DE EB 94 AA 81 82 D2 EF   2F BB 23 78 8C 95 DC 4B  ......../.#x...K
#     00D0: EC 9E DB B9 B5 04 7D 28   7C 6D B4 CA 27 0B 8B B8  .......(.m..'...
#     00E0: F3 49 DA 9A D9 13 95 2B   E1 9D 94 4D 87 39 A1 15  .I.....+...M.9..
#     00F0: E5 79 E4 CB 6F 46 15 0D   75 32 5F E4 20 05 39 C6  .y..oF..u2_. .9.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.695 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 50 51 E9 36 BA CF 86 A3   96 A0 CF A1 95 49 4F 1F  PQ.6.........IO.
#     0010: 39 FA D8 09 1B A2 03 DD   37 43 E5 AC 26 67 D9 BD  9.......7C..&g..
#     0020: D8 A9 FC 63 B7 A3 6F D8   8F 48 59 FE CE 9C 26 A7  ...c..o..HY...&.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.698 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:30.699 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.699 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:30.699 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.700 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 09:33:30.700 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:30.700 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.701 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.704 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 02 7C B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:33:03.000 UTC",
#       "not  after"         : "2024-01-15 09:33:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A E5 D1 7E A4 B6 1C 0F   47 48 30 98 77 06 B0 B4  :.......GH0.w...
#           0010: 43 DB 98 53                                        C..S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 18 B7 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:57.000 UTC",
#       "not  after"         : "2024-01-15 09:32:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#           0010: 2C E1 87 8D                                        ,...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.730 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F BC A1 0C A8 50 F1 BD   CB 7A DA 63 FA 60 FF 41  _....P...z.c.`.A
#     0010: E4 80 39 D4 CC 8D DD 12   87 49 CF 5F 1C 07 8C FB  ..9......I._....
#     0020: 1B 64 06 9A BC C2 E3 20   EA 8F BA 2A DA 58 84 72  .d..... ...*.X.r
#     0030: 24 61 6D F1 98 3E 2F 10   76 39 A1 50 6E 9E BA C1  $am..>/.v9.Pn...
#     0040: 42 E5 3B CE 74 9E B8 71   A6 D3 B7 CE 5A E0 2D 40  B.;.t..q....Z.-@
#     0050: 85 38 AD D1 6D 14 F1 8E   89 AE 12 4E 99 FF 35 CC  .8..m......N..5.
#     0060: 5E 63 A7 28 DB 1D 61 29   BC 87 77 16 CB 0C 39 56  ^c.(..a)..w...9V
#     0070: FE CC 59 44 83 0B D7 10   29 61 3F 47 1F E9 23 F8  ..YD....)a?G..#.
#     0080: 68 BB AD 5A 3B 92 30 EC   9A E4 C1 83 2E 4A 80 50  h..Z;.0......J.P
#     0090: 9E BF 0D 58 0D E2 8D 71   D3 3D 2B C1 DA 22 AB 9B  ...X...q.=+.."..
#     00A0: 05 5F D3 42 CA 27 B7 47   E0 84 60 CE 3A 6F 8E C3  ._.B.'.G..`.:o..
#     00B0: F3 AE A5 F7 F9 07 3F 84   02 83 2C 0B BB 81 F5 3F  ......?...,....?
#     00C0: D5 87 DB 4D C0 68 3F 92   B7 C9 DB 28 77 3B 5A 58  ...M.h?....(w;ZX
#     00D0: 0A 7F CC 38 AD 73 6B F6   D5 44 F5 A7 A7 1F A4 78  ...8.sk..D.....x
#     00E0: 12 96 A9 E8 F7 79 8B 97   8C C2 E4 F7 BA 97 59 8C  .....y........Y.
#     00F0: 74 8E 1B 06 D4 2C 79 A7   45 CF 13 DC 72 72 93 F3  t....,y.E...rr..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.731 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: ED C8 6E F3 32 88 FA C7   76 79 87 37 85 CF 93 8E  ..n.2...vy.7....
#     0010: 1F BB A7 67 E0 9F 6B AD   CA 7B 19 08 5F C9 53 9E  ...g..k....._.S.
#     0020: 25 86 81 A9 CB A1 E7 70   DD 98 13 3C 04 D7 53 C2  %......p...<..S.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.732 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:30.789 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E2 EB 52 AB 4E FE 6B 51 1A B9 D9 87 04 16 D8 7D 6A 8A 66 E5 74 9F D8 4A 33 CE 03 AE B0 A7 55 5D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 09:33:31.068 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 09:33:31.069 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-17 09:33:42.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:42.815 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A E0 8F 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:55.000 UTC",
#       "not  after"         : "2024-01-15 09:32:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#           0010: 2C E1 87 8D                                        ,...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 18 B7 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 09:32:57.000 UTC",
#       "not  after"         : "2024-01-15 09:32:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 03 44 58 00 6E 03 DF   63 ED B4 B9 FE FD 2D 2C  ..DX.n..c.....-,
#           0010: 2C E1 87 8D                                        ,...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 95 AF 32 E6 D5 9A 68   A1 EF 12 A6 80 A7 A9 5D  ...2...h.......]
#           0010: 63 22 C0 68                                        c".h
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 09:33:42.832 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:43.178 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:43.179 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:43.179 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:33:43.180 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:43.325 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.325 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:43.327 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 09:33:43.328 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.334 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.347 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 09:33:43.350 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "53 96 6B 74 EB 4F 1A C4 EE 1A D1 D0 A4 2C 7E BF CE E8 B9 88 33 BC 26 5E 28 6A 2D 1B 03 9C 2A 17",
#     "session id"          : "94 AF E5 95 84 50 C2 0C 6E 5D 40 D2 45 72 A6 39 C7 61 9F 17 C9 21 B1 A7 A7 4C CE A7 C5 3A F2 A5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 01 0A B3 5D EB D4 27 29   8A 35 E5 71 0E 82 C9 B9  ...]..').5.q....
#               0010: 32 19 8F 0D 73 64 1F B4   19 52 4C 76 4F A9 66 5B  2...sd...RLvO.f[
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.370 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "28 1A 33 A6 20 4B 30 AD 82 52 4F F4 7D D0 15 77 57 0A 27 FA 0A C4 18 8F 76 A1 04 92 9F 14 3E 97",
#     "session id"          : "94 AF E5 95 84 50 C2 0C 6E 5D 40 D2 45 72 A6 39 C7 61 9F 17 C9 21 B1 A7 A7 4C CE A7 C5 3A F2 A5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A8 53 F2 89 03 D1 8B EB   85 A3 BA EB B7 F5 B4 1A  .S..............
#             0010: DE 59 6E 38 DE 3D C5 3C   D4 52 E6 14 89 31 14 2D  .Yn8.=.<.R...1.-
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.370 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.370 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.371 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.371 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.373 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.375 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.375 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.375 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:43.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:43.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.384 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.386 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.387 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.391 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.391 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.391 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:33:43.392 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 09:33:43.394 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 09:35:01.718 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:35:01.756 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:35:01.758 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:35:01.758 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 09:35:01.758 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42504/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28117ms
ok 65 stop command for single port in 31323ms
ok 66 status detects locally running solr in 14336ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2204ms
ok 69 copying files around in 6592ms
ok 70 upconfig in 2627ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1203ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 10s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m32.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5690 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5690/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([146935D5C6C12C72:219DDE8E2D1D1A2C]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6058 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=146935D5C6C12C72 -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 40s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m3.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5689 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5689/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([D11422471767B791:E4E0C91CFCBB81CF]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5686 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D11422471767B791 -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 7m 3s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m25s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5688 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5688/

All tests passed

Build Log:
[...truncated 1310 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39191/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-17 00:59:52.051; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 00:59:52.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-17 00:59:52.952; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 00:59:52.992; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22373ms
ok 61 start solr with client truststore and security manager in 24679ms
not ok 62 start solr with mTLS needed in 59011ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2QHVfx/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39191.
#
# Started Solr server on port 39191 (pid=198355). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39192.
#
# Started Solr server on port 39192 (pid=198785). Happy searching!
#
# INFO  - 2023-10-17 01:01:14.956; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:01:14.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 01:01:15.329; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 01:01:15.332; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 01:01:15.333; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:15.365 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 85 87 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:51.000 UTC",
#     "not  after"         : "2024-01-15 01:00:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 DA FB 5B 7E 24 2A 3C   2A 1A 56 76 27 CB A8 AB  ...[.$*<*.Vv'...
#         0010: 8A 28 0C A4                                        .(..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:15.370 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 7D 41 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:43.000 UTC",
#     "not  after"         : "2024-01-15 01:00:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:15.385 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:15.728 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:15.734 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:15.735 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:15.735 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:15.889 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.890 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:15.892 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:15.892 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.898 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.910 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:15.913 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "63 59 31 F8 D2 00 A8 10 12 10 4A 41 54 DE C8 F6 C6 6C 3C 45 56 0C 15 CC AD 28 8C F7 27 50 DC 37",
#   "session id"          : "BD AC 85 84 3E 1B C1 12 43 D2 55 9A 60 55 D7 9B 60 47 59 D8 9B 68 1A BA 81 D2 61 59 76 A7 5A 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 26 54 70 DD 3F 74 8A 99   55 25 78 3E C7 DF 5B 67  &Tp.?t..U%x>..[g
#             0010: B2 DC 73 B2 66 D6 3A A9   C8 6B B1 0F 1E 98 66 7D  ..s.f.:..k....f.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.025 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C2 F0 EF FD F9 DE 54 93 25 88 F5 4D 36 7F E5 97 34 1B 6B D8 0C E0 17 52 FC 63 74 40 D7 D6 18 62",
#   "session id"          : "BD AC 85 84 3E 1B C1 12 43 D2 55 9A 60 55 D7 9B 60 47 59 D8 9B 68 1A BA 81 D2 61 59 76 A7 5A 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A3 9F 78 27 7A 21 4E 4C   5C B4 62 A1 30 DE 2B A3  ..x'z!NL\.b.0.+.
#           0010: 1D F1 CB 7A ED A9 D2 1C   47 50 03 55 17 3A E7 4D  ...z....GP.U.:.M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.025 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.026 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.027 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.028 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.028 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.028 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.028 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.028 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.031 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.031 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.031 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.032 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.032 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.032 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.032 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.032 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.033 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.041 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.043 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.044 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.048 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.048 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.048 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.048 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.049 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.049 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.049 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.049 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.049 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.051 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.051 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.052 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.052 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.053 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.054 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.058 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 57 95 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:47.000 UTC",
#       "not  after"         : "2024-01-15 01:00:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 4E 42 D6 4E D0 5D 25   88 D3 7E 58 0D 1A 68 E5  .NB.N.]%...X..h.
#           0010: 17 B8 9C D7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.059 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.145 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.149 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 08 EF D3 63 DB 9B 51 9E   4E 89 63 F4 49 83 7C 45  ...c..Q.N.c.I..E
#     0010: 56 2D A2 03 D1 87 9D CD   D5 36 11 B9 AB 68 96 3A  V-.......6...h.:
#     0020: E8 E6 2F F7 B8 FC AD 38   30 F7 15 FF 09 01 1E C5  ../....80.......
#     0030: D8 4C 0C 33 0C 8D DE C4   D7 AD CD 9B E9 1A D5 0C  .L.3............
#     0040: 22 39 63 C9 C1 A9 71 80   7B 0A C7 33 C1 75 C4 8D  "9c...q....3.u..
#     0050: 48 53 D6 9A D6 B7 8D B4   04 54 39 C2 47 31 30 A6  HS.......T9.G10.
#     0060: 71 CD 2F 5E 19 F5 ED 93   4C 53 A9 81 13 A6 9C 18  q./^....LS......
#     0070: C6 EA A5 53 29 62 BF D4   E8 B0 5E 8E 66 C6 C3 F9  ...S)b....^.f...
#     0080: 4F 4F 51 BB 7F B8 14 57   DF 82 53 25 CF 1F A2 3E  OOQ....W..S%...>
#     0090: DA 54 F8 61 B2 FE 46 26   CF 6B 8F 3A 1C 4A 36 10  .T.a..F&.k.:.J6.
#     00A0: 93 D1 28 9F F2 3F 20 CB   A6 A9 A3 13 01 F5 CD 2F  ..(..? ......../
#     00B0: A9 FE DC 7B 58 05 7A 06   06 D4 85 54 D6 05 5E 91  ....X.z....T..^.
#     00C0: E2 3C 83 24 77 21 A7 98   89 29 EC 31 A6 E1 19 BA  .<.$w!...).1....
#     00D0: 18 0F 72 C4 E9 96 D2 E9   78 1E B8 56 23 A2 A7 33  ..r.....x..V#..3
#     00E0: 2A 7C C4 F5 12 26 48 15   D0 D8 C1 E4 DE 11 7B 81  *....&H.........
#     00F0: EA F0 24 F7 46 EE 53 AF   CB 14 CA 1D 00 4B F4 A3  ..$.F.S......K..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.151 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 3B 7E E9 C1 AA D3 9B   04 59 D9 E7 AC B7 B4 0C   ;.......Y......
#     0010: 7D D2 A3 09 68 DD 40 3E   DB B9 B7 74 C5 D4 1B 73  ....h.@>...t...s
#     0020: C8 BE 01 29 45 4E E8 95   16 41 4E 8C 37 CD 83 53  ...)EN...AN.7..S
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.153 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:16.154 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.155 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:16.155 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.155 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:16.155 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:16.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.156 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.159 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 85 87 5B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:51.000 UTC",
#       "not  after"         : "2024-01-15 01:00:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 DA FB 5B 7E 24 2A 3C   2A 1A 56 76 27 CB A8 AB  ...[.$*<*.Vv'...
#           0010: 8A 28 0C A4                                        .(..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 6F AB AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:44.000 UTC",
#       "not  after"         : "2024-01-15 01:00:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#           0010: A0 D3 B5 3E                                        ...>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.184 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A4 20 19 C2 95 CD 1A FF   E2 70 AF 91 D1 13 90 05  . .......p......
#     0010: 7F F2 C6 2D DE 39 B8 CC   B5 CD DC D4 1C F8 A0 95  ...-.9..........
#     0020: 9D D2 45 9E 04 07 2A 4D   E5 FC 94 F5 F2 A8 A4 67  ..E...*M.......g
#     0030: 45 A2 42 BF 36 82 FD F8   A6 4C FF C5 28 0A FE 08  E.B.6....L..(...
#     0040: CE 41 E1 4F 85 ED 0B 7A   56 10 A9 F7 0E 57 B9 84  .A.O...zV....W..
#     0050: 35 64 49 65 E7 BD EB 4B   0D 62 90 2F 23 20 22 96  5dIe...K.b./# ".
#     0060: 1E 87 D7 EE AC 3F 33 26   8C D2 4A 91 01 02 5D E1  .....?3&..J...].
#     0070: 0D BB 07 43 44 CC 0C 8C   E7 DE F5 A2 FA 58 90 BE  ...CD........X..
#     0080: 59 20 F1 8B 72 22 7B 0A   91 29 8A 9B 7D 61 E7 A2  Y ..r"...)...a..
#     0090: 96 E7 10 25 99 A0 1C 46   7D 43 D3 65 A0 FF B5 41  ...%...F.C.e...A
#     00A0: A8 83 7D BD A8 EA AC 27   61 7C D7 F8 DB 70 10 FA  .......'a....p..
#     00B0: 99 EF A0 C3 5F CB 65 C2   F3 E1 10 46 5F AA 7B 1D  ...._.e....F_...
#     00C0: 5B 50 47 FE B4 93 20 95   82 AC 4C A0 70 84 4C B6  [PG... ...L.p.L.
#     00D0: FF FC B7 03 4F 1B 4C C4   52 0A D2 11 6B 55 3C C9  ....O.L.R...kU<.
#     00E0: 76 D1 AB 15 0E 8A 3D 72   77 D7 89 1B 88 B9 97 46  v.....=rw......F
#     00F0: 7B 1E 72 DE E2 71 9B 65   DE 78 94 4E 4A 89 72 03  ..r..q.e.x.NJ.r.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.186 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 24 E6 DC 4C 7E 94 5C F2   D6 30 20 AC 59 1A 40 5A  $..L..\..0 .Y.@Z
#     0010: 45 CC 48 E7 55 57 0E E9   C4 FF 7E 3A AD 25 3E 72  E.H.UW.....:.%>r
#     0020: 0F EF BB E4 A0 41 2D 96   0A 84 0B C7 11 04 0D 42  .....A-........B
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.186 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:16.244 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "23 8C B8 C8 69 4B 6F A9 A6 5C 78 CE 68 6C 80 E7 E0 A7 69 E5 C7 60 A4 A9 D7 28 4A 63 DF A0 5C 47",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 01:01:16.559 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 01:01:16.560 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 01:01:17.503; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 01:01:17.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 01:01:17.862; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 01:01:17.865; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 01:01:17.866; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2QHVfx/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:17.898 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 85 87 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:51.000 UTC",
#     "not  after"         : "2024-01-15 01:00:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 DA FB 5B 7E 24 2A 3C   2A 1A 56 76 27 CB A8 AB  ...[.$*<*.Vv'...
#         0010: 8A 28 0C A4                                        .(..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:17.902 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 7D 41 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:43.000 UTC",
#     "not  after"         : "2024-01-15 01:00:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:17.917 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:18.151 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.151 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:18.153 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:18.153 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.159 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.171 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:18.173 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "04 31 D1 87 F2 C5 B2 C9 2A BA 18 A8 52 DF CA A1 7B 39 95 C7 FC F6 67 50 4D 40 3A EF B8 92 EA E7",
#   "session id"          : "28 F3 A8 EA 2C D5 FC 4E D1 E8 B1 73 F4 29 D5 CF F8 A3 33 6C B7 4D B5 B2 EC 81 35 D9 2F 90 0D 47",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3F 8B E0 DD 41 40 88 A6   BA 05 3E A8 89 9A E0 DC  ?...A@....>.....
#             0010: D7 F0 12 51 75 82 DA 39   86 CA CE E6 9A 34 A6 6A  ...Qu..9.....4.j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.278 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "76 88 B1 20 E4 CB 56 4C B9 9E FE FB BB 62 1A D1 98 B0 F4 B0 EC 87 9D 2D 8D 9B DF B2 E3 D2 E1 41",
#   "session id"          : "28 F3 A8 EA 2C D5 FC 4E D1 E8 B1 73 F4 29 D5 CF F8 A3 33 6C B7 4D B5 B2 EC 81 35 D9 2F 90 0D 47",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 56 D0 77 15 AA AC 54 06   7B DC 21 55 2F 07 7F 26  V.w...T...!U/..&
#           0010: 8F 58 76 1A 7F 49 00 3C   F2 D5 4E AD AC 14 0D 1F  .Xv..I.<..N.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.279 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.279 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.280 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.280 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.280 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.281 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.284 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.284 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.284 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.286 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.286 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.293 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.295 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.296 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.301 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.301 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.302 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.303 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.303 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.303 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.304 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.304 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.308 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 57 95 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:47.000 UTC",
#       "not  after"         : "2024-01-15 01:00:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 4E 42 D6 4E D0 5D 25   88 D3 7E 58 0D 1A 68 E5  .NB.N.]%...X..h.
#           0010: 17 B8 9C D7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.308 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:18.366 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:18.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:18.367 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:01:18.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.393 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 6F AB AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 01:00:44.000 UTC",
#     "not  after"         : "2024-01-15 01:00:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#         0010: A0 D3 B5 3E                                        ...>
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#         0010: 30 DD 3A 72                                        0.:r
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.397 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B9 0A DA 38 16 A9 1A BE   45 75 36 A5 32 DC 6B 3B  ...8....Eu6.2.k;
#     0010: 21 5C F2 6A BD E7 AF 50   6F EC 6E CA 16 D5 F5 E1  !\.j...Po.n.....
#     0020: 39 AD 98 02 F8 F2 8C D8   45 0E 7B 8F BD 73 0E E6  9.......E....s..
#     0030: B0 72 1D D2 F2 15 F6 88   43 6C 3C 1A 7A CB 98 55  .r......Cl<.z..U
#     0040: FB 32 65 19 37 E8 29 00   7F 3C C4 E9 94 81 51 A2  .2e.7.)..<....Q.
#     0050: DB 3C C7 12 F2 B2 35 DA   CC AD 9B C2 F6 EF 8A B8  .<....5.........
#     0060: 3A D0 73 F0 84 6A F6 0F   B4 C5 AB 35 F6 FE DA 54  :.s..j.....5...T
#     0070: 98 C2 1F 7C 7F DD 6F F1   E0 75 7D 1D 07 3C FF B5  ......o..u...<..
#     0080: 42 8A 6E 2D 2B BA F9 84   04 BB 13 76 2A 47 37 56  B.n-+......v*G7V
#     0090: C5 AC 53 C6 86 48 09 24   C1 B2 E0 26 ED 8B 95 04  ..S..H.$...&....
#     00A0: 32 AD 01 37 E0 D1 27 5F   CB 5F 41 12 19 89 E2 3E  2..7..'_._A....>
#     00B0: 78 FA E9 9A 44 EA 47 C7   F6 3E B4 13 7E 8C EE 69  x...D.G..>.....i
#     00C0: B9 E0 5A 87 D3 20 FE 05   FC 5D 1E 34 EF AF 09 5D  ..Z.. ...].4...]
#     00D0: 8E AE 3E 85 C4 9C 12 82   A9 7B D8 EC 0E 9B 9A 18  ..>.............
#     00E0: 1C F3 55 97 65 13 66 5A   8B E1 D5 12 C8 58 09 FD  ..U.e.fZ.....X..
#     00F0: 09 CD 7D F8 85 0D 8F 42   F2 E0 84 AF 3D 08 D2 7B  .......B....=...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.398 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2F EF 7F 83 0F 17 BC 16   66 6A D0 5B D9 68 04 40  /.......fj.[.h.@
#     0010: 09 54 F2 2E BD D1 5B 7B   8C 77 1C F5 81 D3 50 5E  .T....[..w....P^
#     0020: 5B 3F F2 B6 93 6E 6E 8A   D5 C3 41 8D 9C 7C 76 DF  [?...nn...A...v.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.401 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:18.402 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.402 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:18.402 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.402 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-17 01:01:18.402 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:18.403 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.403 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.406 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 85 87 5B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:51.000 UTC",
#       "not  after"         : "2024-01-15 01:00:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 DA FB 5B 7E 24 2A 3C   2A 1A 56 76 27 CB A8 AB  ...[.$*<*.Vv'...
#           0010: 8A 28 0C A4                                        .(..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 6F AB AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:44.000 UTC",
#       "not  after"         : "2024-01-15 01:00:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#           0010: A0 D3 B5 3E                                        ...>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.433 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B C8 60 6D 5E 64 B6 69   E4 A6 F7 0F 34 40 67 5C  ;.`m^d.i....4@g\
#     0010: 73 26 43 B6 0C 0C 96 2C   EE 51 2D AE 08 B3 E0 A0  s&C....,.Q-.....
#     0020: E0 20 77 36 43 6B 2A 87   0F D0 A4 9A 7B 8F 09 8F  . w6Ck*.........
#     0030: 16 D4 F3 A6 10 B4 9A B9   1C 7F D9 04 69 F2 AE 36  ............i..6
#     0040: 1D 0C 80 DA E6 CF D3 18   2E 01 FE 08 C5 E4 B0 CB  ................
#     0050: 82 6B 76 94 59 40 6C 21   32 8E 95 A1 3C 5D EB F8  .kv.Y@l!2...<]..
#     0060: 30 B4 32 1F 9D F9 8F E4   FD 0C D7 9C BD 77 78 40  0.2..........wx@
#     0070: 88 A5 6C 85 14 08 A9 5F   3B E6 B6 7F 0B 23 25 63  ..l...._;....#%c
#     0080: 5B 1A 50 A0 CB 44 E5 D2   CD CE 52 C7 9B F2 8E A5  [.P..D....R.....
#     0090: 1D 1B A8 F0 4C C8 EC 23   35 D6 47 97 6A 60 7E C8  ....L..#5.G.j`..
#     00A0: 85 25 3C 8D 37 A6 F6 30   17 C3 1D DD B7 69 7E 69  .%<.7..0.....i.i
#     00B0: 58 86 D5 C0 71 E5 5C A8   40 E8 77 BE 15 CB 69 68  X...q.\.@.w...ih
#     00C0: 78 3B 09 E5 01 AA 58 1A   9E 27 43 CC AC 10 5C 53  x;....X..'C...\S
#     00D0: B7 F6 14 2A BA 30 58 B8   4D EE 5B 8C 1E 40 7C B5  ...*.0X.M.[..@..
#     00E0: 57 F2 5A 3E 1E 33 11 CD   AB 1B 8C 32 19 DD F4 F4  W.Z>.3.....2....
#     00F0: EB F7 01 65 49 5D DC 52   4E 7C 3E 0D E2 4F BE F0  ...eI].RN.>..O..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.434 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 97 91 65 6B 77 10 9B   44 8F 6E C9 B6 70 4F 17  ...ekw..D.n..pO.
#     0010: 29 6C 3D B3 FD D1 14 7C   BE F2 52 C1 24 CC BA A3  )l=.......R.$...
#     0020: BA 66 C5 5F 36 B4 39 F7   68 98 E7 2A A5 97 39 75  .f._6.9.h..*..9u
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.435 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:18.492 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "40 19 27 09 E6 26 BA 3C B1 69 12 FD 81 D7 92 A0 DD DB F0 DE 2A F9 75 A0 65 21 E7 C8 5D 2A 80 82",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 01:01:18.775 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 01:01:18.776 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-17 01:01:30.328; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:30.645 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 6F AB AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:44.000 UTC",
#       "not  after"         : "2024-01-15 01:00:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#           0010: A0 D3 B5 3E                                        ...>
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0E 71 BC 01 DD 95 2A 0A   03 59 52 AB A3 5A 6C 4A  .q....*..YR..ZlJ
#           0010: 30 DD 3A 72                                        0.:r
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 7D 41 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 01:00:43.000 UTC",
#       "not  after"         : "2024-01-15 01:00:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 F7 5F C3 CA 74 E2 7F   A0 DB 02 3E EF 95 93 05  u._..t.....>....
#           0010: A0 D3 B5 3E                                        ...>
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 01:01:30.660 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:30.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:30.895 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-17 01:01:30.895 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.900 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.912 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-17 01:01:30.914 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "41 81 2B 25 A1 48 ED B2 1F 23 D8 A2 0F 6F CF 89 C6 AD E4 C9 9D 21 C9 F8 60 5D 05 87 A4 65 82 08",
#     "session id"          : "EE 3A AF EC 0D 6D 35 97 21 DF 78 9C 9D E2 E3 74 F3 E4 88 3B 0D 80 4C 73 8E 72 20 66 C3 C7 19 62",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DC E0 A8 1E EC 64 0B A7   FD 4D DB 74 68 C6 4F 93  .....d...M.th.O.
#               0010: B7 49 67 56 36 A4 BF AB   36 9C 99 3C FB 68 7D 0D  .IgV6...6..<.h..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.933 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8D 3A 18 49 91 3E 0D E5 67 06 47 AA 05 A0 48 9C A5 C9 A7 49 82 6A 3F E0 23 F3 07 3C E6 EC 56 C7",
#     "session id"          : "EE 3A AF EC 0D 6D 35 97 21 DF 78 9C 9D E2 E3 74 F3 E4 88 3B 0D 80 4C 73 8E 72 20 66 C3 C7 19 62",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 69 2E 9D B2 F5 0C 7F   51 30 CE 26 9E 7F F5 A2  .i......Q0.&....
#             0010: D2 A0 13 BC EB E0 CA F0   17 91 B8 EF DB 45 2F 53  .............E/S
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.934 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.934 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.936 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.938 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.947 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.949 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.950 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:30.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:01:30.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-17 01:01:30.956 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-17 01:02:52.743 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:02:52.795 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:02:52.795 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:02:52.795 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 01:02:52.796 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39192/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28180ms
ok 65 stop command for single port in 30883ms
ok 66 status detects locally running solr in 14416ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2233ms
ok 69 copying files around in 6690ms
ok 70 upconfig in 2783ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1206ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 18s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m39s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5687 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5687/

4 tests failed.
FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server

Error Message:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>

Stack Trace:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>
	at __randomizedtesting.SeedInfo.seed([7F0F4437C64D69F5:F80FA567A3F19519]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:136)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 23 object(s) that were not released!!! [SolrZkClient, SolrZkClient, ZKServerMain, InternalHttpClient, ZkStateReader, ZkTestServer, Http2SolrClient, ZkStateReader, InternalHttpClient, InternalHttpClient, Http2SolrClient, Overseer, InternalHttpClient, ZkController, Thread, SolrZkClient, ZkStateReader, SolrZkClient, ZkController, InternalHttpClient, SolrZkClient, Http2SolrClient, Http2SolrClient]
org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkTestServer.init(ZkTestServer.java:469)
	at org.apache.solr.cloud.ZkTestServer.run(ZkTestServer.java:602)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:345)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkTestServer.init(ZkTestServer.java:448)
	at org.apache.solr.cloud.ZkTestServer.run(ZkTestServer.java:602)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:345)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.ZkTestServer$ZKServerMain:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer$ZKServerMain
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer$ZKServerMain.runFromConfig(ZkTestServer.java:308)
	at org.apache.solr.cloud.ZkTestServer$1.run(ZkTestServer.java:568)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:137)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:436)
	at org.apache.solr.client.solrj.impl.ZkClientClusterStateProvider.getZkStateReader(ZkClientClusterStateProvider.java:215)
	at org.apache.solr.common.cloud.ZkStateReader.from(ZkStateReader.java:229)
	at org.apache.solr.cloud.MiniSolrCloudCluster.getZkStateReader(MiniSolrCloudCluster.java:485)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForNode(MiniSolrCloudCluster.java:445)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForAllNodes(MiniSolrCloudCluster.java:425)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:397)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.ZkTestServer:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer.<init>(ZkTestServer.java:438)
	at org.apache.solr.cloud.ZkTestServer.<init>(ZkTestServer.java:421)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:343)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:203)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1100)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:152)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:407)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:395)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:313)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:298)
	at org.apache.solr.client.solrj.impl.CloudLegacySolrClient.<init>(CloudLegacySolrClient.java:79)
	at org.apache.solr.client.solrj.impl.CloudLegacySolrClient$Builder.build(CloudLegacySolrClient.java:402)
	at org.apache.solr.cloud.MiniSolrCloudCluster.buildSolrClient(MiniSolrCloudCluster.java:816)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:394)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:137)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:203)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1100)
	at org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:288)
	at org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:55)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:802)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.Overseer:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.Overseer
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.Overseer.start(Overseer.java:807)
	at org.apache.solr.cloud.OverseerElectionContext.runLeaderProcess(OverseerElectionContext.java:76)
	at org.apache.solr.cloud.LeaderElector.runIamLeaderProcess(LeaderElector.java:171)
	at org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:131)
	at org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
	at org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:214)
	at org.apache.solr.cloud.ZkController.init(ZkController.java:1007)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:402)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:134)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:808)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.ZkController:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkController
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:415)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:831)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:765)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:571)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:377)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:382)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1315)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting

[...truncated too long message...]

anos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:1182)
        at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:899)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  49) Thread[id=508, name=httpShardExecutor-272-thread-2, state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
        at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
        at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
        at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$334/0x000000084049d840.run(Unknown Source)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$274/0x000000084042f440.run(Unknown Source)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  50) Thread[id=506, name=httpShardExecutor-272-thread-1, state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
        at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
        at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
        at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$334/0x000000084049d840.run(Unknown Source)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$274/0x000000084042f440.run(Unknown Source)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  51) Thread[id=492, name=qtp152141774-492, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  52) Thread[id=536, name=zkConnectionManagerCallback-305-thread-1, state=WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
        at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
	at __randomizedtesting.SeedInfo.seed([7F0F4437C64D69F5]:0)




Build Log:
[...truncated 11331 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7F0F4437C64D69F5 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7F0F4437C64D69F5 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7F0F4437C64D69F5 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=7F0F4437C64D69F5 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:jwt-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 5m 55s
632 actionable tasks: 615 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m20s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5686 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5686/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42981/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 21:13:45.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:13:45.481; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 21:13:46.532; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 21:13:46.579; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22554ms
ok 61 start solr with client truststore and security manager in 24926ms
not ok 62 start solr with mTLS needed in 58214ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SrnDLd/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42981.
#
# Started Solr server on port 42981 (pid=201633). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42982.
#
# Started Solr server on port 42982 (pid=202064). Happy searching!
#
# INFO  - 2023-10-16 21:15:09.496; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:15:09.502; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:15:09.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:15:09.897; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:15:09.898; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:09.931 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 28 EE AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:45.000 UTC",
#     "not  after"         : "2024-01-14 21:14:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 EB 62 BC 1A C3 5A AA   3F 10 4E 18 29 06 C1 10  ..b...Z.?.N.)...
#         0010: B0 EC 43 32                                        ..C2
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:09.936 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 87 D1 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:37.000 UTC",
#     "not  after"         : "2024-01-14 21:14:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:09.952 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:10.303 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:10.306 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:10.307 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:10.307 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:10.455 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.455 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:10.457 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:10.457 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.463 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.474 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.475 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:10.477 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DE 44 CE 3B 99 84 EA C7 0E 8B 9D DF 32 9F 76 51 E9 D8 E4 80 8E 60 62 7B 01 C2 DB B4 FD 44 F5 07",
#   "session id"          : "32 1F 5E 98 F7 CF C9 51 B4 0F C8 B9 A8 C9 52 58 A9 48 CF 70 24 A6 BE B7 0C 5E E6 01 B9 CD 13 3B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7D 93 D0 9C C3 E4 5E 17   9F B9 C4 C2 04 A3 D0 D9  ......^.........
#             0010: 92 BA 89 46 A9 7A 6D ED   A0 64 FF 36 59 C1 50 33  ...F.zm..d.6Y.P3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.584 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A4 EE BE A2 26 12 DD 17 48 F2 7C 8B 25 F6 DC 4D 10 68 0A D2 0F 28 38 F0 41 DC D3 3D D7 74 69 66",
#   "session id"          : "32 1F 5E 98 F7 CF C9 51 B4 0F C8 B9 A8 C9 52 58 A9 48 CF 70 24 A6 BE B7 0C 5E E6 01 B9 CD 13 3B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 12 70 01 48 7E 31 A0 2E   E3 F4 B3 2F 0D FF 7F 2A  .p.H.1...../...*
#           0010: 73 1D 7D 84 77 74 78 45   71 52 17 56 36 F3 65 6D  s...wtxEqR.V6.em
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.584 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.584 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.587 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.589 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.589 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.598 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.600 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.601 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.606 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.606 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.607 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.608 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.608 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.608 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.609 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.610 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.613 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 A7 32 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:41.000 UTC",
#       "not  after"         : "2024-01-14 21:14:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2F DA E0 34 F4 6E 59   F3 EB 0A CA 35 11 04 6C  5/..4.nY....5..l
#           0010: A0 74 F5 6A                                        .t.j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.613 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.691 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.695 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A CC 03 63 3D B3 CF 19   01 DC 8C F6 6C 81 B3 3C  ...c=.......l..<
#     0010: C8 63 D5 BC C3 FF C8 57   F6 4D D3 E5 DA 76 CD 99  .c.....W.M...v..
#     0020: ED B4 AA F5 9C 90 AC 00   21 D0 97 FF 8B CD 1B 70  ........!......p
#     0030: D8 DA 32 06 96 6E DA C2   17 CC BB 70 2E 34 0C 45  ..2..n.....p.4.E
#     0040: 2E 38 26 A3 8D 88 31 7D   45 84 6B EF B2 FF 6C 37  .8&...1.E.k...l7
#     0050: BA E9 E9 09 59 E4 60 DC   58 1D 8A B1 B0 66 FE 9A  ....Y.`.X....f..
#     0060: 51 EE 92 2B 23 DB 7C F0   DB 1A E7 39 20 45 2C 19  Q..+#......9 E,.
#     0070: 68 C2 DB C0 15 9B E7 57   F9 05 8A 7E F4 D2 AD B9  h......W........
#     0080: D5 EC 62 29 5D 40 E8 59   8B FC 61 18 ED B5 10 46  ..b)]@.Y..a....F
#     0090: 88 CA 36 9E A7 80 9C 17   56 BB 31 14 D5 31 B6 AB  ..6.....V.1..1..
#     00A0: 15 CF BA 14 66 9D 8C E2   91 96 D6 30 AF 46 F0 FC  ....f......0.F..
#     00B0: 2B 24 7E 6C E1 50 37 2E   4B 18 81 EB 9C 40 F0 A3  +$.l.P7.K....@..
#     00C0: D1 34 2A 11 50 75 05 FE   D6 79 ED 7C FF 72 19 62  .4*.Pu...y...r.b
#     00D0: A3 3F AB FA BD 82 F0 5D   F9 DD 8B 76 58 A4 C1 0A  .?.....]...vX...
#     00E0: E3 6D 41 5B A8 5D C9 05   FC 91 2F 74 4F A2 96 B4  .mA[.]..../tO...
#     00F0: 3C 49 19 56 9C 9C BF C1   5D 86 C4 E3 60 7E CD 50  <I.V....]...`..P
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.697 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 97 AC 78 F0 10 0C B4   AA 87 02 AD D4 65 82 DC  ...x.........e..
#     0010: 5E 94 5D 21 44 8C F5 BE   B9 21 02 C8 B3 AC 14 C3  ^.]!D....!......
#     0020: CA 3C 75 6B 85 26 A8 9D   49 B0 D5 43 34 33 24 D8  .<uk.&..I..C43$.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.699 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:10.700 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.700 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:10.700 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.700 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:10.701 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:10.701 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.701 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.704 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 28 EE AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:45.000 UTC",
#       "not  after"         : "2024-01-14 21:14:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 EB 62 BC 1A C3 5A AA   3F 10 4E 18 29 06 C1 10  ..b...Z.?.N.)...
#           0010: B0 EC 43 32                                        ..C2
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D F9 51 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:39.000 UTC",
#       "not  after"         : "2024-01-14 21:14:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#           0010: 10 9D C8 A3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.729 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 36 CA 9D 7D BD C4 84   D3 9B B5 01 93 19 34 54  ,6............4T
#     0010: F9 86 85 F7 C3 57 C8 10   4F F9 A8 56 24 D1 AD 51  .....W..O..V$..Q
#     0020: A2 B2 AA 1B C0 E7 D3 61   12 7F D6 03 95 42 E9 3E  .......a.....B.>
#     0030: F7 49 F3 8E 10 48 9A 1E   20 50 FB 1C F3 26 1F 9D  .I...H.. P...&..
#     0040: 0C 43 B4 26 C6 3B 66 FA   C8 33 0E B9 AB 7F 4C B3  .C.&.;f..3....L.
#     0050: 57 4B 77 1B 2C 36 B0 4E   92 3F 0E 0B 19 6E 2B C1  WKw.,6.N.?...n+.
#     0060: 3F 5E 96 2E CB 99 34 02   D0 5F 58 FD 7F 6A 8A D5  ?^....4.._X..j..
#     0070: E5 F4 97 B1 3D CF 4E 1D   F3 D0 DA C3 C8 29 43 D6  ....=.N......)C.
#     0080: 4E 83 8E 09 77 86 38 77   5D 31 A0 F6 99 62 97 2E  N...w.8w]1...b..
#     0090: 27 A0 DA BA 1B 2F 4D 1D   33 88 09 1F E2 49 9E 6A  '..../M.3....I.j
#     00A0: FD 3D 24 6F 91 52 FE B4   50 1F F4 CD 78 08 96 97  .=$o.R..P...x...
#     00B0: 60 37 CA FF AF 98 26 03   1A AC E9 20 83 1C E2 38  `7....&.... ...8
#     00C0: 39 37 22 C4 04 49 8B 58   3D 3D AA E3 5F 17 24 5B  97"..I.X==.._.$[
#     00D0: 79 2D 9C 65 3A 31 CD DA   42 C8 FE B8 FC 88 83 14  y-.e:1..B.......
#     00E0: F7 8B 42 37 D9 E1 00 E4   4B 46 D5 CF 5C 79 D8 17  ..B7....KF..\y..
#     00F0: 5E D5 80 14 59 4F 3A 10   FF 96 16 48 29 32 F3 6E  ^...YO:....H)2.n
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.731 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 28 39 C7 C6 1B E5 50 56   01 AA 94 77 1D D7 9B E9  (9....PV...w....
#     0010: EE EF 32 C0 B1 AC 8F EF   05 B6 94 85 81 55 AB 71  ..2..........U.q
#     0020: E0 75 ED F3 7A 1D A6 1C   2C 1C C4 EF E9 94 C5 0A  .u..z...,.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.732 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:10.788 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B2 E5 10 F8 00 BF F4 81 B7 00 B7 EE 00 19 18 BC E1 D7 52 2A 55 1E B3 8F 83 F0 F9 73 29 81 83 D4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:15:11.093 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:15:11.094 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 21:15:12.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:15:12.042; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:15:12.411; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:15:12.414; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:15:12.415; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SrnDLd/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:12.446 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 28 EE AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:45.000 UTC",
#     "not  after"         : "2024-01-14 21:14:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 EB 62 BC 1A C3 5A AA   3F 10 4E 18 29 06 C1 10  ..b...Z.?.N.)...
#         0010: B0 EC 43 32                                        ..C2
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:12.450 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 87 D1 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:37.000 UTC",
#     "not  after"         : "2024-01-14 21:14:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:12.464 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:12.698 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:12.701 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:12.701 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.706 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.717 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.718 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.718 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:12.720 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "33 AF C5 14 1F 6E E8 1E AD 6C D9 30 03 24 69 BC DA E2 D0 C0 B0 47 56 42 03 5B 0E 53 C8 9E AF 3B",
#   "session id"          : "3E AB 84 11 64 08 41 53 F0 CE 4F 48 13 76 DA 73 39 62 61 D1 9F 64 11 D1 C8 F5 6F 9F 88 3B 75 26",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C4 ED E3 58 90 0C 67 DE   9B 60 BB 6A 10 5F F1 22  ...X..g..`.j._."
#             0010: 56 49 7C 09 39 DD 1C B8   2D 67 C3 2B 81 53 EF 62  VI..9...-g.+.S.b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.830 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1F 2C E6 19 29 30 E7 02 C2 1D F1 83 08 C1 DA D0 DD 6F DB 9B A9 27 04 99 7A 22 0D 52 B1 66 5D 34",
#   "session id"          : "3E AB 84 11 64 08 41 53 F0 CE 4F 48 13 76 DA 73 39 62 61 D1 9F 64 11 D1 C8 F5 6F 9F 88 3B 75 26",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E4 7C 31 D8 8A 22 EE 17   29 DE F2 FF 74 55 E6 9E  ..1.."..)...tU..
#           0010: F5 BB FB 5C 3F 40 B1 61   CF 7E 23 F3 1F 0D CE 79  ...\?@.a..#....y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.831 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.831 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.834 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.836 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.836 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.838 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.838 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.847 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.848 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.851 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.854 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.855 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.855 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.856 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.856 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.859 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 A7 32 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:41.000 UTC",
#       "not  after"         : "2024-01-14 21:14:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 2F DA E0 34 F4 6E 59   F3 EB 0A CA 35 11 04 6C  5/..4.nY....5..l
#           0010: A0 74 F5 6A                                        .t.j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.859 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:12.913 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:12.913 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:12.913 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:12.913 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.942 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D F9 51 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:14:39.000 UTC",
#     "not  after"         : "2024-01-14 21:14:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#         0010: 10 9D C8 A3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#         0010: FE A5 78 40                                        ..x@
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.945 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 00 75 2B 7C 70 98 E5   CC BD 2D A2 BA FD 35 E8  ..u+.p....-...5.
#     0010: A1 0B 21 3B 6E D0 6C 8A   30 52 E5 D6 B0 73 22 5C  ..!;n.l.0R...s"\
#     0020: 67 08 48 8D 1E 53 42 5F   12 35 19 75 EB 58 F6 4E  g.H..SB_.5.u.X.N
#     0030: 20 27 EE D1 CD 15 23 DE   CE 9D 5C 5C BB F8 59 02   '....#...\\..Y.
#     0040: 91 CB 37 DF 5F 8A 57 69   47 94 B0 86 20 9C E5 95  ..7._.WiG... ...
#     0050: A5 B7 C0 75 9D 42 7D 0D   02 77 41 73 5C 2C CC 3B  ...u.B...wAs\,.;
#     0060: EB 76 F8 01 BC AE 90 4A   45 EF 28 97 ED 6B CD C6  .v.....JE.(..k..
#     0070: 97 BB A2 E9 01 79 AC 1B   BC 8B 06 25 E9 FF 10 F9  .....y.....%....
#     0080: C7 EC 5D A4 7C 17 A5 B9   AB 6B FC 74 C5 F8 FF B6  ..]......k.t....
#     0090: AB 3B 95 03 2C 48 F9 19   1A 95 6F AB 95 D4 E2 31  .;..,H....o....1
#     00A0: 6C 26 0D C4 32 09 DB 7F   CA 40 D9 AC C2 9E A4 45  l&..2....@.....E
#     00B0: 25 DE 16 98 31 6A 74 18   16 CE C9 1D 3F 95 EA C5  %...1jt.....?...
#     00C0: 70 26 20 00 40 FB 11 A1   1F 18 CF 87 A7 98 F7 63  p& .@..........c
#     00D0: 90 35 13 E2 C8 37 D0 F8   23 15 76 D1 43 82 7D 2A  .5...7..#.v.C..*
#     00E0: 16 A5 42 E4 D3 57 22 73   7B 13 6F 97 C1 C6 E8 A3  ..B..W"s..o.....
#     00F0: 7E 56 9E 02 4E A2 4C 29   F0 40 C9 5D D6 6E 88 30  .V..N.L).@.].n.0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.948 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 67 4C 00 4E 4B 06 0F DD   3F 96 90 20 1F 77 22 47  gL.NK...?.. .w"G
#     0010: 72 E8 3F 3B B6 82 B5 C5   DD C6 7B AD 95 F2 64 08  r.?;..........d.
#     0020: E8 70 ED D8 9C A4 12 1A   10 DD 9F 83 CE 63 A8 FD  .p...........c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.950 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:12.951 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.951 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:12.951 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.952 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 21:15:12.952 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:12.952 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.953 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.955 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 28 EE AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:45.000 UTC",
#       "not  after"         : "2024-01-14 21:14:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 EB 62 BC 1A C3 5A AA   3F 10 4E 18 29 06 C1 10  ..b...Z.?.N.)...
#           0010: B0 EC 43 32                                        ..C2
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D F9 51 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:39.000 UTC",
#       "not  after"         : "2024-01-14 21:14:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#           0010: 10 9D C8 A3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.981 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 A0 87 11 78 E2 C0 F5   A0 78 8C C9 C4 D4 0A 0F  ....x....x......
#     0010: 2A C8 32 58 AE 4E 86 83   48 9E 10 A8 93 0D EF 2C  *.2X.N..H......,
#     0020: 3E 51 ED 7E 38 D6 7A EF   BD 12 46 87 3B EE 01 A7  >Q..8.z...F.;...
#     0030: 14 D0 38 B5 94 E0 79 C9   17 54 F5 EE E8 85 2B E0  ..8...y..T....+.
#     0040: 7E A3 AE 60 BD 58 F6 78   DC 7B 6A 9B 5C DE 5F CC  ...`.X.x..j.\._.
#     0050: AC 69 E7 3D 44 DC 12 49   81 43 3D 5C 31 1C D8 D7  .i.=D..I.C=\1...
#     0060: 0B FC 7E EE B9 1F 8A 50   CA C5 3D 66 02 96 46 75  .......P..=f..Fu
#     0070: ED 3C D4 9C 1D 50 E7 7C   5D 9C 35 CA AC 0E 7C F2  .<...P..].5.....
#     0080: 84 95 32 43 D5 BD 65 31   55 B5 7B E8 B1 66 14 8E  ..2C..e1U....f..
#     0090: 97 43 E6 05 DA 46 ED 53   E7 F0 07 7C D0 B3 92 D2  .C...F.S........
#     00A0: 05 F0 E4 BD CD AD 73 B8   7C DB FA D5 2E 66 50 49  ......s......fPI
#     00B0: 50 27 6D B2 F0 8C 42 1D   8A 25 E3 7E 77 28 4B B3  P'm...B..%..w(K.
#     00C0: A9 8C F2 4D B1 51 E7 B5   CB BD B6 87 76 13 1E CB  ...M.Q......v...
#     00D0: 92 27 77 C2 5F 17 EA 5A   1E BE 95 3C 1D 5A B8 9A  .'w._..Z...<.Z..
#     00E0: FD 1C 46 A1 F1 DB 2E C6   7B 97 C1 44 C4 DD 68 22  ..F........D..h"
#     00F0: DD CB 99 E3 F6 31 2D C5   C7 DD B9 5B 55 03 7C 80  .....1-....[U...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.983 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 71 F5 34 7B 15 22 35 64   9E 05 CC 76 7C 51 C1 E3  q.4.."5d...v.Q..
#     0010: 8D D5 0B C3 FF 4B 7C 6F   BF F2 53 61 5F 40 B5 A8  .....K.o..Sa_@..
#     0020: C7 C7 8F DD CB AA 7B 42   39 56 B1 26 87 E1 BE 7F  .......B9V.&....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:12.983 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:13.038 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5C 64 18 EE 9E FA 39 00 6C CB 9F C4 0C 62 C7 79 88 CC CB E8 1D 6A 4E 22 72 B8 53 27 03 59 DE B8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:15:13.348 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:15:13.349 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 21:15:24.777; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:25.112 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D F9 51 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:39.000 UTC",
#       "not  after"         : "2024-01-14 21:14:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#           0010: 10 9D C8 A3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DD C5 44 4B 69 C9 F2 7A   A2 40 BE 26 EE 16 91 CF  ..DKi..z.@.&....
#           0010: FE A5 78 40                                        ..x@
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 87 D1 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:14:37.000 UTC",
#       "not  after"         : "2024-01-14 21:14:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE AD 40 C5 97 16 A8 82   39 CB 92 02 40 9C D4 5D  ..@.....9...@..]
#           0010: 10 9D C8 A3                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:15:25.128 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:25.609 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:25.609 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:25.609 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:15:25.609 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:25.692 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.693 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:25.694 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 21:15:25.695 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.701 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.713 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.713 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.713 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 21:15:25.716 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F2 BA 07 C7 05 3C 8F AA B0 D4 CF 9D 56 DC 63 1A 12 FC 7C 22 A4 22 02 B4 FB 10 AB 59 4E A7 55 5E",
#     "session id"          : "55 B6 89 A1 13 18 7D 5D 80 5C 77 BA 1A 74 5E BD E1 7C D7 BD 37 31 57 0E 1C 19 8B 6C 23 46 82 FF",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 87 9C 7E C2 7C 1B A5 2B   AB 3A 7D E1 0C 7D 91 91  .......+.:......
#               0010: A5 23 12 D9 AD 96 6F AE   DF DE BB BF D2 FD 10 40  .#....o........@
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.735 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "A8 E2 B9 B5 D2 25 FD 81 81 E1 FB 4D 40 B9 E8 29 29 4F 2C 6C 63 56 DD 4E 10 AE 08 B0 7D 78 F1 81",
#     "session id"          : "55 B6 89 A1 13 18 7D 5D 80 5C 77 BA 1A 74 5E BD E1 7C D7 BD 37 31 57 0E 1C 19 8B 6C 23 46 82 FF",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 82 B4 6A 6B 85 0B C0 8A   D7 EB 29 9B 3A 5C 90 08  ..jk......).:\..
#             0010: AD 44 E7 09 71 6E BF 59   7D 6F 93 2B D0 21 A4 05  .D..qn.Y.o.+.!..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.736 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.736 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.738 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.738 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.738 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.738 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.741 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.741 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:25.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.750 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.752 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.753 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.756 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:15:25.757 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 21:15:25.759 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 21:16:45.772 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:16:45.819 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:16:45.819 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:16:45.820 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:16:45.820 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42982/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28488ms
ok 65 stop command for single port in 31609ms
ok 66 status detects locally running solr in 14373ms
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2209ms
ok 69 copying files around in 6564ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1203ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 14s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5685 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5685/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([2E856DFBF0BFF73:371CBD8454D7C92D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6156 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=2E856DFBF0BFF73 -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 55s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m22s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5684 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5684/

All tests passed

Build Log:
[...truncated 1311 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45445/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 14:40:39.644; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 14:40:39.649; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 14:40:40.865; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 14:40:40.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22610ms
ok 61 start solr with client truststore and security manager in 25119ms
not ok 62 start solr with mTLS needed in 57642ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-GCyEJv/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45445.
#
# Started Solr server on port 45445 (pid=198620). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45446.
#
# Started Solr server on port 45446 (pid=199077). Happy searching!
#
# INFO  - 2023-10-16 14:42:03.738; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 14:42:03.743; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 14:42:04.146; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 14:42:04.149; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 14:42:04.150; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:04.186 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 6F 8A 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:39.000 UTC",
#     "not  after"         : "2024-01-14 14:41:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 58 F0 21 C7 E3 A0 0A   6B 9C 85 6D 00 56 87 5E  .X.!....k..m.V.^
#         0010: 38 ED 38 7B                                        8.8.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:04.190 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 C2 72 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:31.000 UTC",
#     "not  after"         : "2024-01-14 14:41:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:04.206 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:04.708 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.709 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:04.711 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:04.711 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.717 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.729 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:04.731 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 AE 5A C2 69 9A 40 84 46 47 16 EB 62 42 ED E8 2A CD 44 25 E7 11 04 21 CE 23 A3 B1 0A 2B 17 F0",
#   "session id"          : "56 EE E5 31 19 31 15 EC 2A 05 E8 1F 0A 9F 89 55 F0 00 0B 1E 46 8A DA BC 7B 4B CE B2 09 72 29 EA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F6 96 86 CC 69 B4 EB B3   8A 54 D6 B1 8A C0 2A 9D  ....i....T....*.
#             0010: B9 B9 50 55 C5 8D A5 72   66 77 69 FF E5 E4 10 4B  ..PU...rfwi....K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.857 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A3 B0 08 4D 54 F2 D2 B3 65 A7 E4 AF 74 55 56 34 8C BF FD 28 23 EA 66 01 75 CD 08 E2 C5 F7 05 52",
#   "session id"          : "56 EE E5 31 19 31 15 EC 2A 05 E8 1F 0A 9F 89 55 F0 00 0B 1E 46 8A DA BC 7B 4B CE B2 09 72 29 EA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3E 4A D7 D1 11 B3 C1 60   A5 EC 29 1D 71 06 6E 6A  >J.....`..).q.nj
#           0010: 2E 83 8F 0E 99 CB 08 56   F1 58 67 1D 0F 1D 40 28  .......V.Xg...@(
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.858 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.858 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.859 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.859 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.859 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.860 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.860 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.860 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.860 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.860 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.863 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.863 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.863 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.863 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.864 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.864 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.864 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.864 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.864 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.865 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:04.865 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:04.865 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.865 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.865 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.873 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.875 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.876 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.880 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.880 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.880 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.880 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.881 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:04.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:04.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.883 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.884 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.884 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.884 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.885 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.887 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:04.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.890 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 9F 67 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:35.000 UTC",
#       "not  after"         : "2024-01-14 14:41:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 4D D3 5F 45 5A EA 2A   32 E1 A5 28 03 B2 B4 BE  .M._EZ.*2..(....
#           0010: 17 E3 63 FC                                        ..c.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.891 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:04.947 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:04.947 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:04.948 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:04.948 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.994 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:04.998 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 40 6A 04 42 72 29 C5   AA 2C 66 04 91 A6 04 AA  M@j.Br)..,f.....
#     0010: 32 96 BF 56 8A 19 A3 7B   4A 4A 0B A2 6B 96 1D 70  2..V....JJ..k..p
#     0020: 3E E5 81 B3 80 F5 04 4D   35 4C 37 B0 D3 A2 34 F2  >......M5L7...4.
#     0030: B7 2B A9 17 BE EE 3B 23   F6 EB B9 7B 91 7F 4F 85  .+....;#......O.
#     0040: 60 07 5C 2C 3B 4B E4 03   B9 12 2B 0B B9 9B 04 47  `.\,;K....+....G
#     0050: B9 D1 56 0F 92 25 F0 63   D0 D9 39 9B 85 9A 7D 13  ..V..%.c..9.....
#     0060: 99 F8 01 EB 4C 5D BE 2B   42 86 77 E4 A3 8B 64 00  ....L].+B.w...d.
#     0070: 75 84 3C E1 BD 0D 52 05   7A F2 DA EE 15 3E 03 89  u.<...R.z....>..
#     0080: AC E4 58 4D 50 11 28 F2   A5 8F 53 9A 3C CB 92 87  ..XMP.(...S.<...
#     0090: 11 E3 B4 7F D9 77 44 C2   5B 05 50 19 39 8B AD A4  .....wD.[.P.9...
#     00A0: 37 6D 6A D1 46 65 E1 82   18 E2 27 FB 40 F6 92 ED  7mj.Fe....'.@...
#     00B0: 01 B6 BC 31 93 1D 8F 79   6F 46 69 79 FB 77 33 5B  ...1...yoFiy.w3[
#     00C0: 21 CD 37 56 00 DF D7 CF   54 AC 62 B0 86 92 F3 F5  !.7V....T.b.....
#     00D0: 6C 19 DB 65 C4 5C 3A 17   23 7D 46 E0 80 4B EF 29  l..e.\:.#.F..K.)
#     00E0: C4 53 D2 91 D2 62 AB ED   E0 69 7D 28 F4 D3 B5 8A  .S...b...i.(....
#     00F0: BE 83 FE 68 4E 93 81 C4   B1 BB AC 46 DB 4D 83 8D  ...hN......F.M..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.000 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 B9 E7 53 2E F4 C3 1B   71 7A 02 A3 21 F8 67 35  ...S....qz..!.g5
#     0010: 48 2B 0C 18 E3 A4 A3 0F   D6 68 5F 97 37 B9 57 34  H+.......h_.7.W4
#     0020: 79 29 89 37 25 1F B2 FF   0C D8 F9 B4 62 21 95 24  y).7%.......b!.$
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.003 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:05.004 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:05.004 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:05.004 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:05.004 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:05.005 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:05.005 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.006 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.008 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 6F 8A 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:39.000 UTC",
#       "not  after"         : "2024-01-14 14:41:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 58 F0 21 C7 E3 A0 0A   6B 9C 85 6D 00 56 87 5E  .X.!....k..m.V.^
#           0010: 38 ED 38 7B                                        8.8.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 C7 45 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:33.000 UTC",
#       "not  after"         : "2024-01-14 14:41:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#           0010: 8C 7E 16 2B                                        ...+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.034 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 BA 28 2B 41 A2 42 D7   E8 E3 B5 51 79 45 0B EC  q.(+A.B....QyE..
#     0010: 77 6B 35 F5 DC BF 9F 3F   27 7F 6A A6 CD 1E 34 F2  wk5....?'.j...4.
#     0020: B8 DB 79 C1 AD F0 A0 FA   B1 68 0B D0 B8 2A 50 BE  ..y......h...*P.
#     0030: 74 AB 1F 1A 0A 9A DF D5   8D E3 82 5B E8 F1 A0 70  t..........[...p
#     0040: 2B 8F 99 08 5C C6 4A 87   32 4F 26 E2 DC 68 12 D2  +...\.J.2O&..h..
#     0050: D9 53 72 36 DA 9E 10 74   68 34 F3 D1 C6 72 46 A8  .Sr6...th4...rF.
#     0060: 64 D0 11 A2 00 DE F6 AD   D3 2E 7D CA 2A D0 69 F1  d...........*.i.
#     0070: 77 E0 98 3E C2 E8 8F 72   BF 60 AF F1 2D AF 4A 7F  w..>...r.`..-.J.
#     0080: 2B 13 63 58 04 25 5F 7A   C8 7B 30 BE F9 59 0A DB  +.cX.%_z..0..Y..
#     0090: D2 A0 0D 7A F1 91 AA D2   BB A6 0D A2 C4 97 D9 16  ...z............
#     00A0: BA 78 7D 85 71 71 F8 73   12 51 53 55 E6 64 73 AD  .x..qq.s.QSU.ds.
#     00B0: 77 4A F0 E2 3C C9 EE A4   EC 7B 22 CB 45 5F 04 65  wJ..<.....".E_.e
#     00C0: E5 51 95 36 0A 71 A2 6D   80 26 C2 83 E2 00 6C 5E  .Q.6.q.m.&....l^
#     00D0: C4 5B 0F A7 D5 9B AA 3F   DC C2 DB 1A 1F 8B BF 76  .[.....?.......v
#     00E0: D2 99 7F EB E0 E3 FB 57   CE A5 C4 44 5A 0F 4C 63  .......W...DZ.Lc
#     00F0: 1D 54 FC EE 0C BD 8E D3   8B A4 EA 1A 26 95 BE C3  .T..........&...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.035 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E7 EC D5 AF 8A C9 9A EF   8D CD 7D 0C 81 15 86 0A  ................
#     0010: 59 95 2E D4 B8 0E AE 71   54 AD 5C 74 D3 32 B2 8E  Y......qT.\t.2..
#     0020: 43 C3 D3 C2 FC 55 24 F7   D9 5D 56 5F 94 AE 71 76  C....U$..]V_..qv
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.036 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:05.099 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B2 CC E9 8F AE 4E 8A 6B 1B 34 5A 04 73 44 98 33 61 C0 FD 01 D5 48 DC EE 9F EA 89 DA FB C0 33 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 14:42:05.411 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 14:42:05.412 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 14:42:06.348; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 14:42:06.354; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 14:42:06.737; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 14:42:06.740; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 14:42:06.741; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GCyEJv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:06.777 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 6F 8A 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:39.000 UTC",
#     "not  after"         : "2024-01-14 14:41:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 58 F0 21 C7 E3 A0 0A   6B 9C 85 6D 00 56 87 5E  .X.!....k..m.V.^
#         0010: 38 ED 38 7B                                        8.8.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:06.782 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 C2 72 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:31.000 UTC",
#     "not  after"         : "2024-01-14 14:41:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:06.799 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:07.320 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:07.323 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:07.323 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.330 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.343 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.343 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.343 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:07.346 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1D 41 24 46 62 6D B9 45 72 C8 9A 4B 47 27 BB 29 00 FC 94 35 35 CA 6B 54 64 7D 03 BB A2 D3 8E 5B",
#   "session id"          : "CE 86 46 52 A0 CC 84 99 29 FD 24 D1 33 78 EB 67 B1 61 71 98 29 AA 75 04 A1 70 FC C0 7F 95 6F 29",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1B 37 05 3C 59 78 C1 59   16 4F EF A0 1C 04 FE 12  .7.<Yx.Y.O......
#             0010: 09 29 54 13 23 86 FA 77   28 CB E7 C3 E5 77 DE 53  .)T.#..w(....w.S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.442 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F2 8F 78 63 CE 71 6F BF 34 FC 77 58 E7 3C B1 AC E2 60 05 F6 40 D1 C0 2F BE 6E 24 53 BD 27 B3 B4",
#   "session id"          : "CE 86 46 52 A0 CC 84 99 29 FD 24 D1 33 78 EB 67 B1 61 71 98 29 AA 75 04 A1 70 FC C0 7F 95 6F 29",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CC 1B B8 7D 53 2B 19 D6   7C A2 12 0F FB D8 6D EF  ....S+........m.
#           0010: D2 3C A4 2F 55 B1 4F E8   A0 87 E5 88 2E 70 84 77  .<./U.O......p.w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.443 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.443 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.445 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.448 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.449 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.449 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.459 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.461 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.462 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.466 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.466 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.466 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.466 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.467 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.467 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.467 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.467 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.467 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.469 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.470 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.470 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.470 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.471 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.472 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.473 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.476 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 9F 67 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:35.000 UTC",
#       "not  after"         : "2024-01-14 14:41:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 4D D3 5F 45 5A EA 2A   32 E1 A5 28 03 B2 B4 BE  .M._EZ.*2..(....
#           0010: 17 E3 63 FC                                        ..c.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.477 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:07.525 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:07.527 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:07.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:07.527 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.563 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 C7 45 F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 14:41:33.000 UTC",
#     "not  after"         : "2024-01-14 14:41:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#         0010: 8C 7E 16 2B                                        ...+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#         0010: 07 D9 14 CC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.567 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 90 13 0D 31 CE AC 0E   BD 79 7A 12 1D BB FA 34  ....1....yz....4
#     0010: 4C B4 BF 25 F4 14 24 AC   18 C7 46 26 F6 DA 88 14  L..%..$...F&....
#     0020: 79 33 80 96 A8 D4 5B 49   76 B2 22 D1 F6 C2 5F B5  y3....[Iv."..._.
#     0030: 1C 66 1E 10 12 5A 04 9F   11 3A 62 8C F1 91 61 EF  .f...Z...:b...a.
#     0040: 25 F0 41 C2 C6 DB 94 90   91 44 F5 A3 81 D6 D8 9B  %.A......D......
#     0050: DE 3B 0B 03 AD 32 82 20   CD 2D 73 73 66 BB D0 3C  .;...2. .-ssf..<
#     0060: 83 77 8F EC 23 C5 AA 45   9C E7 06 93 27 1E 76 8B  .w..#..E....'.v.
#     0070: 57 C5 B8 A1 09 90 15 6D   35 6C 32 45 EF 0E F7 65  W......m5l2E...e
#     0080: 42 EA A4 53 88 7D B2 3F   0A 52 DA 5B 56 3D 75 DA  B..S...?.R.[V=u.
#     0090: 09 EA 54 C2 4A 70 DC EB   6A 85 83 BE 7E 13 24 E4  ..T.Jp..j.....$.
#     00A0: 7F 7F A9 0F DB 7D EF 76   BA C2 58 EF 6D 36 17 6A  .......v..X.m6.j
#     00B0: 89 C9 F4 61 F3 78 BC F1   1B 6D D0 75 5A CC 2E 49  ...a.x...m.uZ..I
#     00C0: 16 A1 35 E2 8A ED 3D 08   6B F2 9F C0 76 5A 16 56  ..5...=.k...vZ.V
#     00D0: 58 9D 08 1A 68 4F 0D EE   70 72 15 60 46 1B E6 AB  X...hO..pr.`F...
#     00E0: A3 17 4A 1A FA 6D 49 CD   CB 5D FF 9A A0 CC 36 48  ..J..mI..]....6H
#     00F0: A5 F0 DD 56 61 E4 9A E7   72 C0 E8 3A 2E C0 93 DA  ...Va...r..:....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.569 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 43 FD A4 6D 00 60 98   96 A7 88 BB 4C 00 0E E5  *C..m.`.....L...
#     0010: 98 C2 E3 B4 57 37 CA D0   15 C2 3E 02 7B E7 3E 4F  ....W7....>...>O
#     0020: B0 81 9B C3 B5 1E 06 83   D0 65 D1 7D BA 55 6A 36  .........e...Uj6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.572 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:07.573 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.574 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:07.574 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.574 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 14:42:07.574 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:07.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.575 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.578 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 6F 8A 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:39.000 UTC",
#       "not  after"         : "2024-01-14 14:41:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 58 F0 21 C7 E3 A0 0A   6B 9C 85 6D 00 56 87 5E  .X.!....k..m.V.^
#           0010: 38 ED 38 7B                                        8.8.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 C7 45 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:33.000 UTC",
#       "not  after"         : "2024-01-14 14:41:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#           0010: 8C 7E 16 2B                                        ...+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.605 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 15 18 B6 0B A8 F4 E1   0D 15 E1 14 D1 54 3B 15  .............T;.
#     0010: BA 9D 17 C0 AA 25 82 E6   B0 32 B3 2A 0A 95 28 92  .....%...2.*..(.
#     0020: C1 DE 49 E1 69 1B BB 99   72 59 5D CC 7D 92 35 8F  ..I.i...rY]...5.
#     0030: CD 03 DF E4 D7 71 96 B6   41 17 EB 37 E7 BB 2E F4  .....q..A..7....
#     0040: C1 60 C0 A9 8A 56 05 BB   4D D6 16 94 F0 66 B7 C1  .`...V..M....f..
#     0050: 3B A8 D4 94 44 1B 3A 87   75 69 F6 FB 3E FF 7A C9  ;...D.:.ui..>.z.
#     0060: FF 5C 5A 7B 30 39 6F 57   BB 73 E9 65 46 57 CF E1  .\Z.09oW.s.eFW..
#     0070: 90 96 80 EE DF BE F2 E9   DB 50 CF CD 64 DF E2 4B  .........P..d..K
#     0080: D9 97 22 BE 66 46 FC 29   99 58 2C 98 42 07 AB 4F  ..".fF.).X,.B..O
#     0090: 3A 9C 1F DE B0 9E 57 1F   75 56 CD 1B A1 77 84 62  :.....W.uV...w.b
#     00A0: F7 90 CA B1 35 81 93 77   BD EC D4 41 0C 55 40 C5  ....5..w...A.U@.
#     00B0: 71 33 15 55 96 11 82 32   71 F0 16 C3 2D EA B2 FA  q3.U...2q...-...
#     00C0: 40 52 77 9F F2 FC 95 9B   60 E0 A5 F8 E2 19 17 D6  @Rw.....`.......
#     00D0: BC 47 B3 D1 57 20 63 BD   B0 78 B3 58 0F 42 80 44  .G..W c..x.X.B.D
#     00E0: 23 5E 5C C0 C7 F1 8A 7C   A3 6C A9 CD A3 BE E6 66  #^\......l.....f
#     00F0: A6 F9 4C 7E E2 8D 72 1F   1D 8E EE B3 1A 1F 5A 12  ..L...r.......Z.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.606 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B7 25 88 C8 31 91 A1 B1   66 55 9A B6 A5 BC AF 43  .%..1...fU.....C
#     0010: 68 2E 18 3C 8A E3 87 8F   3B D8 D8 80 66 37 88 2C  h..<....;...f7.,
#     0020: F3 30 FC 49 64 20 68 E0   A5 0D 5C 04 F3 99 D6 43  .0.Id h...\....C
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.607 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:07.667 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "05 0B CE 25 A6 A4 22 D6 C2 85 38 57 F0 51 17 00 30 7D EC AC 55 7C 96 F0 06 5A 8E 3D 9A 7F FA C9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 14:42:07.944 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 14:42:07.945 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 14:42:18.929; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:19.268 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 C2 72 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:31.000 UTC",
#       "not  after"         : "2024-01-14 14:41:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#           0010: 8C 7E 16 2B                                        ...+
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 C7 45 F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 14:41:33.000 UTC",
#       "not  after"         : "2024-01-14 14:41:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 21 E7 04 76 EB 8F 17   D0 DB 3A 46 2B 4F 40 00  .!..v.....:F+O@.
#           0010: 8C 7E 16 2B                                        ...+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 85 2A 5D 65 32 BD DE   65 56 4A 18 1C 9D 24 29  ".*]e2..eVJ...$)
#           0010: 07 D9 14 CC                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 14:42:19.284 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:19.624 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:19.624 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:19.624 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:42:19.624 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:19.774 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.774 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:19.776 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 14:42:19.777 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.795 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 14:42:19.798 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "54 18 22 C8 61 C5 27 29 B1 74 51 59 6D D7 E2 D2 2F 8F 1F 9D 54 68 8B 02 8B 1D D9 F9 18 F0 8E 84",
#     "session id"          : "23 FB 9F 2C 26 0F A9 B6 DA 0B 88 C6 A7 25 D1 E3 71 AC 1D 42 A7 BE 64 83 4D D6 D1 DB 48 A9 C1 C3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D5 19 88 45 29 C2 7C CB   85 97 FD B7 55 9D 3E 46  ...E).......U.>F
#               0010: C2 7B 21 84 45 53 22 39   3C 40 70 91 5F B7 C7 28  ..!.ES"9<@p._..(
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.822 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "84 EF 0A 5F 8F BD B1 AF 48 CB 32 64 EB 9F BB CE 85 DD 64 C2 73 5F 1A FB E0 27 46 31 C1 7E 4E 48",
#     "session id"          : "23 FB 9F 2C 26 0F A9 B6 DA 0B 88 C6 A7 25 D1 E3 71 AC 1D 42 A7 BE 64 83 4D D6 D1 DB 48 A9 C1 C3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 F8 FE FB BD CF 95 CD   B7 48 57 6D 30 32 BE DE  .........HWm02..
#             0010: C0 7B C9 37 52 44 61 E0   1A D9 AA 38 05 B8 A4 69  ...7RDa....8...i
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.822 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.824 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.827 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.827 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.827 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:19.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:19.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.838 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.839 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:19.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:42:19.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 14:42:19.846 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 14:43:38.304 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:43:38.355 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:43:38.355 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:43:38.355 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 14:43:38.355 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45446/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28567ms
ok 65 stop command for single port in 31721ms
ok 66 status detects locally running solr in 14726ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2193ms
ok 69 copying files around in 6678ms
ok 70 upconfig in 2638ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 52s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m25.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5683 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5683/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([46422DB273120261:73B6C6E998CE343F]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6061 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=46422DB273120261 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 6m 36s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m6s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5682 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5682/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41387/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 10:51:08.343; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 10:51:08.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 10:51:09.627; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 10:51:09.667; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22925ms
ok 61 start solr with client truststore and security manager in 25860ms
not ok 62 start solr with mTLS needed in 58197ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-C90CYI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41387.
#
# Started Solr server on port 41387 (pid=199473). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41388.
#
# Started Solr server on port 41388 (pid=199906). Happy searching!
#
# INFO  - 2023-10-16 10:52:33.597; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 10:52:33.602; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 10:52:33.984; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 10:52:33.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 10:52:33.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:34.021 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 77 09 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:09.000 UTC",
#     "not  after"         : "2024-01-14 10:52:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 D9 18 ED CA 03 35 AF   5C BE 73 C3 B9 2B 2C 9E  C.....5.\.s..+,.
#         0010: 52 0E 98 FB                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:34.026 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 D2 55 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:01.000 UTC",
#     "not  after"         : "2024-01-14 10:52:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:34.042 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:34.369 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:34.372 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:34.377 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:34.377 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:34.538 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.538 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:34.540 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:34.540 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.546 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.559 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:34.562 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1A 50 0D B9 7C 2B 6C 1F F2 91 29 11 9D 2E DD 01 61 DD 0A 71 BB 66 B7 78 0B 86 A3 AB 20 3B 7C AC",
#   "session id"          : "20 6A A0 31 83 71 36 AE CB 8B 4A 7D F6 32 A6 76 DE 48 11 22 18 74 61 C8 F0 60 9D DA A5 27 B0 9F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9F 84 14 D5 BA E1 54 71   19 B6 0F AB 24 DE BF F3  ......Tq....$...
#             0010: 4A 44 A8 9D 99 49 40 1A   C5 5B 80 76 84 79 86 7D  JD...I@..[.v.y..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.671 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C6 6E F8 CD 0D 84 66 54 C3 DA 66 FD BF 10 3F C8 57 77 E0 4C 87 50 91 56 E7 BD F1 37 09 F1 9D C1",
#   "session id"          : "20 6A A0 31 83 71 36 AE CB 8B 4A 7D F6 32 A6 76 DE 48 11 22 18 74 61 C8 F0 60 9D DA A5 27 B0 9F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 F6 2E F2 55 15 63 2A   B8 6F BE EF 3A 09 5B 33  ....U.c*.o..:.[3
#           0010: DF 3A E2 19 A4 EE 31 BF   BD 39 08 51 50 D1 38 4D  .:....1..9.QP.8M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.671 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.671 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.673 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.676 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.677 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.678 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.678 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.685 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.687 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.688 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.692 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.692 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.692 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.692 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.692 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.694 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.695 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.695 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.695 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.696 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.697 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.700 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C F7 0F 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:05.000 UTC",
#       "not  after"         : "2024-01-14 10:52:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 13 BC B2 62 FA D2 9E   36 8B 30 C2 B8 21 E9 CD  ....b...6.0..!..
#           0010: E8 DC AB CE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.701 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.791 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.795 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AB 8D D5 0B 02 EE E9 78   03 65 54 B6 7D 55 22 0C  .......x.eT..U".
#     0010: 4A C8 3C E2 CF A4 71 A2   60 BA 9C 66 72 36 45 4A  J.<...q.`..fr6EJ
#     0020: 38 35 62 9F DA 87 49 49   E6 1E C2 91 B9 F4 A6 4D  85b...II.......M
#     0030: 8E A4 FB C7 1A 75 E9 7D   89 EC 80 D3 95 DC 2D B4  .....u........-.
#     0040: A9 28 82 FE D9 70 71 86   5A E6 2F 6F B0 EB 4C 87  .(...pq.Z./o..L.
#     0050: 1B 5D 7C 6D 4F 39 2B D6   4B 34 7F AB F2 59 38 BE  .].mO9+.K4...Y8.
#     0060: 34 4D B1 85 EE 9A 20 06   E2 CB DA 60 1E 50 DB BF  4M.... ....`.P..
#     0070: 78 91 4F 7A 81 CC CC 7D   70 8E 26 B1 50 06 1F B7  x.Oz....p.&.P...
#     0080: 6A 37 18 46 E1 DE 14 D0   4D 2D 6C E8 57 A4 EF 44  j7.F....M-l.W..D
#     0090: DE BC 0E 74 AC 05 70 C5   DD B9 4A D2 40 E3 D5 71  ...t..p...J.@..q
#     00A0: 13 5D 35 05 09 47 40 BF   CE 3E BC 97 75 A3 86 D9  .]5..G@..>..u...
#     00B0: D6 15 A9 EC 7C A7 6A 62   69 26 B9 C0 F3 3C 99 48  ......jbi&...<.H
#     00C0: 96 55 80 EF 16 7E F8 4F   28 22 04 97 C6 3C E9 CE  .U.....O("...<..
#     00D0: 67 4B 1A CF 6D 9A 4C B5   63 96 09 58 91 39 95 D1  gK..m.L.c..X.9..
#     00E0: 89 0D 9D 21 B0 F8 03 AF   0C 6B E4 0B 68 26 A1 81  ...!.....k..h&..
#     00F0: 94 1D 01 64 88 B9 DC CC   C1 30 5B 27 08 5A BA F5  ...d.....0['.Z..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.796 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8B C8 53 B0 5D 48 7D 97   EA 91 98 8B C3 D8 EA 5F  ..S.]H........._
#     0010: BF A4 E7 CF E2 80 41 A3   F8 E2 BC 94 34 6A 3B 43  ......A.....4j;C
#     0020: F5 FE 39 07 6F 41 81 72   68 9F 59 98 9E 06 9D 2E  ..9.oA.rh.Y.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.799 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:34.800 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:34.800 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:34.801 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:34.801 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.801 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.804 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 77 09 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:09.000 UTC",
#       "not  after"         : "2024-01-14 10:52:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 D9 18 ED CA 03 35 AF   5C BE 73 C3 B9 2B 2C 9E  C.....5.\.s..+,.
#           0010: 52 0E 98 FB                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 1E C2 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:03.000 UTC",
#       "not  after"         : "2024-01-14 10:52:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#           0010: B7 32 D7 F2                                        .2..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.831 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E C5 B9 CD 0D 37 E8 EE   75 38 EE 68 FA E0 25 9B  N....7..u8.h..%.
#     0010: A1 7A 8B 51 3A 41 85 0C   03 2D 79 41 A4 D4 51 E3  .z.Q:A...-yA..Q.
#     0020: EE 9B B9 C8 11 8D F9 97   F1 04 FB 94 33 B4 CB B9  ............3...
#     0030: E6 FA 8E 68 1D A6 4A 09   FC CB 9D 17 0C 26 A1 A1  ...h..J......&..
#     0040: 80 93 81 6C 50 8B 7F 35   99 2F 19 45 C8 3E B8 4F  ...lP..5./.E.>.O
#     0050: 48 28 B8 D7 F0 0E 8D EF   73 8C F3 71 90 A9 21 F8  H(......s..q..!.
#     0060: F5 5C 34 E9 EC C2 54 49   42 35 A9 14 84 53 67 37  .\4...TIB5...Sg7
#     0070: 6E 27 C4 05 48 3C F1 38   0D EA BC EB 01 6B EA 61  n'..H<.8.....k.a
#     0080: A9 2E 82 78 0E 8F E0 A1   4C BD 9B 45 39 7D 24 3F  ...x....L..E9.$?
#     0090: 2B 0F 11 F3 28 72 AB B8   1C 29 61 CB F4 8F F2 29  +...(r...)a....)
#     00A0: 60 48 88 F2 7E 35 1E ED   CD 01 A2 BE AC 2B FD 02  `H...5.......+..
#     00B0: 65 5B C5 C6 2D A3 6C BF   19 21 C0 33 7B 19 6A 9E  e[..-.l..!.3..j.
#     00C0: D9 27 88 96 2A 20 DD EC   6A 87 AE 6E 51 C0 16 28  .'..* ..j..nQ..(
#     00D0: CD C4 21 1B 33 96 37 E3   E0 07 4D BB C8 D7 8F 96  ..!.3.7...M.....
#     00E0: D0 74 34 A7 79 24 03 6E   DA F5 1B A4 FD D5 E0 54  .t4.y$.n.......T
#     00F0: E1 45 C3 1F 4B B9 53 5F   35 E8 AD BA 7A B8 9D A1  .E..K.S_5...z...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.832 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 AE 46 A3 A3 DF DC 82   55 FD 99 EE C8 7A 13 DC  ..F.....U....z..
#     0010: DB DD 2A B7 42 71 C6 92   DA 16 45 29 6E 43 C2 4F  ..*.Bq....E)nC.O
#     0020: 3F E3 9B 87 5A 0B F0 4C   AB 69 D7 34 BA 27 31 9B  ?...Z..L.i.4.'1.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.833 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:34.894 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 C0 9A 12 D9 10 54 5C 5F 73 32 C6 75 08 EB C8 71 C5 FC 27 78 3E C2 0D 7F 05 91 05 19 FA 52 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 10:52:35.192 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 10:52:35.193 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 10:52:36.167; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 10:52:36.172; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 10:52:36.548; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 10:52:36.551; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 10:52:36.552; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C90CYI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:36.586 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 77 09 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:09.000 UTC",
#     "not  after"         : "2024-01-14 10:52:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 D9 18 ED CA 03 35 AF   5C BE 73 C3 B9 2B 2C 9E  C.....5.\.s..+,.
#         0010: 52 0E 98 FB                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:36.590 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 D2 55 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:01.000 UTC",
#     "not  after"         : "2024-01-14 10:52:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:36.606 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:37.136 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.136 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:37.138 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:37.138 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.144 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.156 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.157 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.157 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:37.159 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "91 24 1E F3 DA 27 99 FB 9E AF 1A C1 0A 48 AB 93 1E 1E 0D D2 B0 86 CE 73 3F 76 95 A5 F9 97 86 EF",
#   "session id"          : "0D 66 67 44 56 AC 93 2B 52 6C 58 DC 62 6A 35 D5 1B DF 53 11 9F 9E F6 D5 69 B9 14 01 78 66 C6 FC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EE CE 34 91 C3 1C E9 F9   5A FC 5F B1 1F 23 59 C0  ..4.....Z._..#Y.
#             0010: B9 EB D0 47 F4 4E 00 29   14 89 2F 46 D3 4D 77 15  ...G.N.)../F.Mw.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.265 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1B 25 95 55 67 49 AA 0B FC 73 EE 8A D5 10 8B 23 2A FE 6A 1D 05 14 16 15 D8 14 8F 44 38 B2 77 08",
#   "session id"          : "0D 66 67 44 56 AC 93 2B 52 6C 58 DC 62 6A 35 D5 1B DF 53 11 9F 9E F6 D5 69 B9 14 01 78 66 C6 FC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0E CA 16 73 09 2E 73 49   F8 CE A2 21 A8 10 A0 18  ...s..sI...!....
#           0010: 7A E2 67 D7 78 74 64 55   57 04 57 FF 56 24 90 2D  z.g.xtdUW.W.V$.-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.266 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.266 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.267 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.267 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.268 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.268 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.268 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.268 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.269 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.269 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.272 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.272 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.272 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.272 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.282 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.284 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.285 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.289 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.289 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.290 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.290 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.290 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.291 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.291 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.293 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.293 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.293 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.293 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.295 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.296 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.300 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C F7 0F 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:05.000 UTC",
#       "not  after"         : "2024-01-14 10:52:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 00 13 BC B2 62 FA D2 9E   36 8B 30 C2 B8 21 E9 CD  ....b...6.0..!..
#           0010: E8 DC AB CE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.300 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:37.371 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:37.371 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:37.372 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:37.372 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.418 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 1E C2 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 10:52:03.000 UTC",
#     "not  after"         : "2024-01-14 10:52:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#         0010: B7 32 D7 F2                                        .2..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#         0010: A9 F3 81 16                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.421 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 80 57 B7 4F E7 3D CD   A8 C3 31 0D 8D 9F A2 F1  ..W.O.=...1.....
#     0010: EA 47 F2 63 9C 42 F3 08   89 5D 84 4B B5 D8 C1 29  .G.c.B...].K...)
#     0020: 8A DE A3 6C 33 AB 5C AC   E2 2E CC 3E 05 22 01 EA  ...l3.\....>."..
#     0030: 7A 0A B4 C5 69 9F C6 6A   F6 C7 4C F0 28 F7 0A 99  z...i..j..L.(...
#     0040: A9 07 EA B9 23 6F 9C BF   9D CE 55 1A D6 21 91 9C  ....#o....U..!..
#     0050: 8B A5 A8 48 DA 27 52 E8   B9 01 40 D0 80 22 B0 99  ...H.'R...@.."..
#     0060: F0 2D 0D 96 E1 9A C8 A2   10 7E BC 05 77 B9 B7 56  .-..........w..V
#     0070: 0F 7B F0 AE 01 34 99 45   5D AE F6 4F 30 BD 76 B0  .....4.E]..O0.v.
#     0080: 10 74 C3 87 18 6C 1C C3   09 DE 5B 01 06 1D 2B 6F  .t...l....[...+o
#     0090: FF 52 3E 1F 0E 63 2F 72   49 88 25 5A D9 31 D7 35  .R>..c/rI.%Z.1.5
#     00A0: 33 56 7E C2 16 0F A5 48   BC E1 6D 3B 33 73 F7 2D  3V.....H..m;3s.-
#     00B0: E9 93 1C 45 DC 3F 6C B8   1E 86 9C 96 14 1A 37 5D  ...E.?l.......7]
#     00C0: 0B BF 67 BA F2 26 AE 1C   26 3A CA 99 A9 D7 8C D2  ..g..&..&:......
#     00D0: 72 A7 8C 2E 79 B0 65 B6   94 E9 24 6A 27 83 98 DB  r...y.e...$j'...
#     00E0: 0B 66 CC 5D 49 34 88 FD   7D 28 46 EF AE E2 BA A1  .f.]I4...(F.....
#     00F0: B5 3C 98 20 F8 31 04 BA   24 1D 47 21 1C 2E 23 06  .<. .1..$.G!..#.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.423 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 AF 90 16 A9 73 E7 51   8E C1 FC 48 9E 9D E5 5A  a....s.Q...H...Z
#     0010: 58 A5 E8 D8 A9 37 69 C4   BB A1 7D EF DD 40 EB 01  X....7i......@..
#     0020: 89 12 B4 DD 04 AB 9C 70   58 F9 34 6F 7C A4 3B 73  .......pX.4o..;s
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.425 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:37.427 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.427 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:37.427 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.427 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 10:52:37.427 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:37.428 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.428 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.431 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 77 09 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:09.000 UTC",
#       "not  after"         : "2024-01-14 10:52:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 D9 18 ED CA 03 35 AF   5C BE 73 C3 B9 2B 2C 9E  C.....5.\.s..+,.
#           0010: 52 0E 98 FB                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 1E C2 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:03.000 UTC",
#       "not  after"         : "2024-01-14 10:52:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#           0010: B7 32 D7 F2                                        .2..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.458 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3A A2 48 D7 44 AF 07 AF   0B 7C BA 6F 02 D1 FA 4E  :.H.D......o...N
#     0010: 08 B8 6B D8 E4 92 8F FD   16 0E A2 81 79 3A CB B4  ..k.........y:..
#     0020: 31 62 79 1B 9F 5E 14 53   44 E4 9A B8 65 68 18 C6  1by..^.SD...eh..
#     0030: CE FC 0A E5 38 E6 35 9A   9B 9B 7E B1 57 8B 95 B3  ....8.5.....W...
#     0040: 60 71 7B 77 99 4D C8 83   DB FD 51 3F F7 1E 1D F3  `q.w.M....Q?....
#     0050: 11 DF 92 61 08 9A 19 4A   4F 40 37 9C 51 3F EA 35  ...a...JO@7.Q?.5
#     0060: 90 81 A7 3C 71 11 30 A1   E5 D6 EF 9E 41 FD AF C3  ...<q.0.....A...
#     0070: 89 89 47 E3 6C F3 B7 9D   FD 45 F6 5F 80 51 CB 1D  ..G.l....E._.Q..
#     0080: 8C CF CD D3 3D 0E 64 EC   D7 DE 86 45 A8 52 6E F5  ....=.d....E.Rn.
#     0090: C0 1B 13 16 F1 83 24 6B   F9 89 7B 88 9E AF 3D E5  ......$k......=.
#     00A0: 32 E5 D2 26 03 4A 8C 09   E2 CF 22 D7 8B 51 C4 7A  2..&.J...."..Q.z
#     00B0: F9 5E 33 B6 08 B0 6E F9   9D C3 D2 17 6F 5C 8D 1A  .^3...n.....o\..
#     00C0: 53 B8 27 8A 06 A3 81 E7   6C E5 04 9D AB 6D 9A 7A  S.'.....l....m.z
#     00D0: 91 8E 73 4C 23 DB 6E 2C   89 EA F6 26 C6 2A FD C2  ..sL#.n,...&.*..
#     00E0: 76 B9 73 E8 CC 3F 08 46   4F C3 8F F4 70 A1 71 95  v.s..?.FO...p.q.
#     00F0: F7 8F B8 0D 04 8B 39 C1   39 95 44 DA BE FB 36 F2  ......9.9.D...6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.459 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C4 57 AB 8A AF 0B C2 0A   DC DE B2 0F C2 5E 62 83  .W...........^b.
#     0010: BF D2 C4 D2 04 F0 A3 5C   CC 43 95 20 3F 83 32 37  .......\.C. ?.27
#     0020: B3 B3 19 45 9B 1C 5A 84   BD BB 34 C0 8B 09 FD DE  ...E..Z...4.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.459 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:37.525 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CF E8 AE 42 12 8C F6 E0 8B D9 8E F5 87 30 43 07 23 50 6C 1B 97 DE 72 0C 67 83 FC 1B 7C 2A 2E B0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 10:52:37.822 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 10:52:37.823 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 10:52:49.578; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:49.931 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 D2 55 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:01.000 UTC",
#       "not  after"         : "2024-01-14 10:52:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#           0010: B7 32 D7 F2                                        .2..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 1E C2 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 10:52:03.000 UTC",
#       "not  after"         : "2024-01-14 10:52:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B7 CD DC FC D0 D3 05   92 19 8E F1 AB 56 B4 C2  .............V..
#           0010: B7 32 D7 F2                                        .2..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 52 47 7B 6F 3F 6C   3B 2C EE 5F 43 0F C2 F5  ..RG.o?l;,._C...
#           0010: A9 F3 81 16                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 10:52:49.948 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:50.295 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:50.295 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:50.295 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:52:50.295 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:50.455 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.455 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:50.457 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 10:52:50.458 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.464 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.476 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 10:52:50.479 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "84 1D 0D 65 26 91 C2 35 3F C6 6E 6C 24 F7 FC 15 26 67 28 D8 75 FE 25 11 0D AD 45 50 0E 05 BF 83",
#     "session id"          : "CA 7D 57 61 37 F9 C8 2D 68 53 35 F5 EA EB C3 18 9F 64 E7 75 52 87 75 61 30 08 3A F7 A3 18 4E 28",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6B 1A 3E B9 6D 9A 0B 52   E4 FC 59 DA 75 EE B0 5B  k.>.m..R..Y.u..[
#               0010: B9 79 4F 41 8A BE 71 50   B4 DB CC 27 AE C7 6D 43  .yOA..qP...'..mC
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.501 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "6C 7D 56 1B A2 C4 63 80 E8 15 46 0A 73 F2 69 29 53 A5 A5 9B 6A 77 69 FC BB 74 E1 77 75 91 50 0A",
#     "session id"          : "CA 7D 57 61 37 F9 C8 2D 68 53 35 F5 EA EB C3 18 9F 64 E7 75 52 87 75 61 30 08 3A F7 A3 18 4E 28",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 73 D7 69 91 2E D2 5C   BC F1 41 C0 FF 8D 73 D7  Ys.i...\..A...s.
#             0010: 2F 21 76 83 F0 BB D0 40   85 B7 53 DC 16 CB 4A 19  /!v....@..S...J.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.501 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.501 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.502 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.504 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.506 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.506 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.515 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.517 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.518 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.522 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.522 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.522 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.522 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.523 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:50.523 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:52:50.523 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 10:52:50.525 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 10:54:09.915 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:54:09.956 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:54:09.957 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:54:09.957 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 10:54:09.957 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41388/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28174ms
ok 65 stop command for single port in 31443ms
ok 66 status detects locally running solr in 14760ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2171ms
ok 69 copying files around in 6699ms
ok 70 upconfig in 2695ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 52s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m21.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5681 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5681/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45165/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 08:38:49.828; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 08:38:49.834; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 08:38:50.755; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 08:38:50.792; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22694ms
ok 61 start solr with client truststore and security manager in 25037ms
not ok 62 start solr with mTLS needed in 58910ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-pUKiAn/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45165.
#
# Started Solr server on port 45165 (pid=199440). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45166.
#
# Started Solr server on port 45166 (pid=199897). Happy searching!
#
# INFO  - 2023-10-16 08:40:13.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 08:40:13.478; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 08:40:13.847; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 08:40:13.851; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 08:40:13.851; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:13.885 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 F1 3F A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:49.000 UTC",
#     "not  after"         : "2024-01-14 08:39:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 2A B5 E4 EC 68 82 4F   42 FC 5D 01 39 BE D4 C5  r*...h.OB.].9...
#         0010: 57 59 88 05                                        WY..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:13.890 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 3A B0 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:41.000 UTC",
#     "not  after"         : "2024-01-14 08:39:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:13.905 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:14.410 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:14.412 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:14.413 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.431 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.431 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.431 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:14.434 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "99 4C 6C 5E 92 97 C2 9B 76 CB 04 A5 93 44 39 3E B6 96 0D F1 0D DA FF D6 AE EC 88 D1 4C 72 20 F9",
#   "session id"          : "3D A6 B4 F7 41 AA 06 E4 D5 B2 8F E4 BC DE 67 02 E3 9F A1 4E C2 D3 09 89 AE 47 67 EE 15 55 45 41",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E2 E4 79 52 F2 93 76 79   A5 D3 39 72 27 71 47 25  ..yR..vy..9r'qG%
#             0010: 55 E5 EF DB 70 82 E4 9D   32 6C 02 B8 83 4E B1 7D  U...p...2l...N..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.543 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "00 30 52 31 AF A3 64 FA EF 52 21 69 BA 03 7D 36 E5 1E 05 63 A6 9C 54 46 6F CB 89 08 D2 DF E4 EB",
#   "session id"          : "3D A6 B4 F7 41 AA 06 E4 D5 B2 8F E4 BC DE 67 02 E3 9F A1 4E C2 D3 09 89 AE 47 67 EE 15 55 45 41",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E0 81 C3 BF 17 6C 4B 96   DD 61 D7 5E 62 FD 91 90  .....lK..a.^b...
#           0010: CF BC 35 C2 C0 D4 86 DA   73 67 EE D6 EC 13 4A 14  ..5.....sg....J.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.543 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.543 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.546 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.546 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.548 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.548 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.548 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.558 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.560 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.561 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.565 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.565 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.566 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.566 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.568 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.568 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.569 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.569 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.570 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.575 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 04 EE E6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:45.000 UTC",
#       "not  after"         : "2024-01-14 08:39:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 7F 88 CA AA A0 77 9D   2B 7E 99 07 6D 3D F0 65  $.....w.+...m=.e
#           0010: BB CD 25 C0                                        ..%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:14.616 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:14.616 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:14.617 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:14.617 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.663 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.667 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 A8 1A E9 AC 28 3D 17   77 B4 0F CB 8B 4E EF 9C  .....(=.w....N..
#     0010: 3A 54 E6 74 47 0F 61 0D   5B 87 D4 19 EB 99 45 9C  :T.tG.a.[.....E.
#     0020: C9 A7 99 9B BF B7 B5 59   BD 2D 11 5F 62 5D 84 6E  .......Y.-._b].n
#     0030: B6 2D 4D 6D D7 55 A4 34   6A 3D 82 3E 5D D9 1F 1E  .-Mm.U.4j=.>]...
#     0040: DF 2C 7E 8D 37 CD 40 5B   11 34 48 37 E4 AA 23 56  .,..7.@[.4H7..#V
#     0050: 01 C7 62 AA 67 CB 9D B2   1A FD 00 46 58 F3 03 44  ..b.g......FX..D
#     0060: 2E AA 9B CD E9 A0 94 0F   36 FC AA B5 E3 AD 1D 91  ........6.......
#     0070: 39 57 5E DD CB 1F 4E B3   6F E3 AC 89 F5 DB 4D 5F  9W^...N.o.....M_
#     0080: B0 CB DC 46 18 2C 2F A9   54 53 1F D9 C0 31 FF 8E  ...F.,/.TS...1..
#     0090: F0 71 FD 92 06 94 C8 06   FE EB A7 8E F4 90 4D BC  .q............M.
#     00A0: D5 1E B0 3E 70 F7 0C AF   64 DD FF B6 0A DA D5 E5  ...>p...d.......
#     00B0: 54 E4 06 93 84 94 2C E9   47 FA A9 82 57 3C C8 1B  T.....,.G...W<..
#     00C0: BB 6E F8 01 CB A3 64 B6   1A 5A 6E 19 C2 1B 78 2C  .n....d..Zn...x,
#     00D0: 68 CE 7F 35 2D 4C 82 F5   52 9B 94 E2 EE 55 8B 63  h..5-L..R....U.c
#     00E0: 57 0A 71 49 16 BF 39 C4   93 C2 4E E2 AE 1F 89 13  W.qI..9...N.....
#     00F0: FC 46 AF A2 1C 19 7A 38   09 5E 90 35 BC B5 BC 9E  .F....z8.^.5....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.669 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE 97 1D F6 14 A3 41 F5   0E 53 12 DC BF 8F 75 78  ......A..S....ux
#     0010: FE 4D 2C BE 73 5D 0E B3   57 13 A0 DA 02 68 29 7C  .M,.s]..W....h).
#     0020: 27 72 A2 26 F3 51 8F 8C   A7 45 B0 F7 B4 0E 60 46  'r.&.Q...E....`F
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.671 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:14.672 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.672 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:14.673 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.673 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:14.673 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:14.673 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.674 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.676 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 F1 3F A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:49.000 UTC",
#       "not  after"         : "2024-01-14 08:39:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 2A B5 E4 EC 68 82 4F   42 FC 5D 01 39 BE D4 C5  r*...h.OB.].9...
#           0010: 57 59 88 05                                        WY..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 96 26 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:43.000 UTC",
#       "not  after"         : "2024-01-14 08:39:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#           0010: 49 53 53 E9                                        ISS.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.703 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E E4 8A 76 29 5D 29 B1   20 EC BD 2C D8 7A 4F 03  ...v)]). ..,.zO.
#     0010: 48 5D C3 CF B2 82 47 9C   3F 5F 55 62 16 97 4B 9C  H]....G.?_Ub..K.
#     0020: CC 1C 1A 02 69 FA 12 60   5F 3E 08 36 2F 06 4D 1C  ....i..`_>.6/.M.
#     0030: C4 46 68 9F A1 E7 19 EE   1F 37 FC D2 BE B2 CC 0D  .Fh......7......
#     0040: A0 80 C7 6F 60 DA 0A 1A   2E 45 21 36 11 E2 D6 8B  ...o`....E!6....
#     0050: 5C 79 A6 DF F0 09 D5 10   C6 C5 3B 04 C1 89 ED C3  \y........;.....
#     0060: 34 D8 77 61 A4 D1 C6 0E   9C 18 A2 4F 3D CE 73 78  4.wa.......O=.sx
#     0070: DB 09 3F 6D F4 A7 33 E2   B8 63 CC 1F 30 19 81 0D  ..?m..3..c..0...
#     0080: 2A 4D AB B7 00 8C DC 20   3F A7 06 6E 66 56 1C 97  *M..... ?..nfV..
#     0090: D2 6B 88 76 FA 88 7C C9   0A 7A 05 8B 78 D5 9A 9D  .k.v.....z..x...
#     00A0: 2D 6A 74 69 70 F6 D3 70   23 77 99 3C B7 A3 7C 57  -jtip..p#w.<...W
#     00B0: 34 97 3A 66 2B 73 8E 60   00 9E 1D 96 7A A7 FE 11  4.:f+s.`....z...
#     00C0: 11 DC C8 F9 02 49 2F 68   3F 0C 10 46 74 07 49 40  .....I/h?..Ft.I@
#     00D0: 4F A5 A5 FB 1B C1 FE E5   A2 F8 E4 40 9E 68 F0 C6  O..........@.h..
#     00E0: 9B 6D 90 42 22 38 2A 22   EB 6F D1 27 2E 14 8F 4A  .m.B"8*".o.'...J
#     00F0: D0 1F 00 75 4D 44 58 84   E5 F5 99 8C 90 62 05 C2  ...uMDX......b..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.704 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A6 C9 50 AB 59 1D 0F D9   D2 DE A1 96 9B 7F 22 CB  ..P.Y.........".
#     0010: 8A 28 C2 87 21 02 08 10   58 ED 55 93 31 C3 A0 55  .(..!...X.U.1..U
#     0020: 7A 6D D2 43 9E 40 91 76   CA 6A 24 74 E7 20 7B 5E  zm.C.@.v.j$t. .^
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.704 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:14.766 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FD 1A C4 81 F6 11 A3 74 31 B9 9E D2 87 2E DF EA AB F8 06 E0 B4 D0 D1 1D 6A 24 EA EB 2E AF D5 EC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 08:40:15.073 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 08:40:15.074 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 08:40:16.031; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 08:40:16.036; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 08:40:16.405; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 08:40:16.408; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 08:40:16.409; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-pUKiAn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:16.440 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 F1 3F A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:49.000 UTC",
#     "not  after"         : "2024-01-14 08:39:49.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 2A B5 E4 EC 68 82 4F   42 FC 5D 01 39 BE D4 C5  r*...h.OB.].9...
#         0010: 57 59 88 05                                        WY..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:16.444 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 3A B0 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:41.000 UTC",
#     "not  after"         : "2024-01-14 08:39:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:16.459 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:16.970 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:16.972 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:16.972 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.989 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:16.992 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 AF E1 CF 7C D4 C9 B3 A8 9D 51 D0 18 9E 46 B4 1D C1 40 90 CD 17 B2 5B E7 B2 85 AB 6D 8F A6 BA",
#   "session id"          : "F4 E1 5E 62 BF 5B 79 0F 2D 98 E6 89 8A CE 1C 6F 99 D8 CA FE DC 93 87 ED 91 23 C5 7C 53 1C 82 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC AA 77 CB D7 9A 73 BC   2A 58 4F A7 B1 E9 1E 89  ..w...s.*XO.....
#             0010: 99 DF 18 7F 2F D5 7F 79   FA 95 11 CD 62 53 6A 3F  ..../..y....bSj?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.092 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9B D2 65 B7 77 31 8F 4B 48 7A DF B3 62 67 DF 0B BF ED A7 B9 55 81 FA 87 BB 87 58 E9 2D FC CF 65",
#   "session id"          : "F4 E1 5E 62 BF 5B 79 0F 2D 98 E6 89 8A CE 1C 6F 99 D8 CA FE DC 93 87 ED 91 23 C5 7C 53 1C 82 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 08 62 1A E6 9B 70 8C DA   49 F2 B7 AD 1B 53 3A 7C  .b...p..I....S:.
#           0010: 37 4B B2 8E 67 7C BB 09   84 12 A7 8F CB 23 64 4C  7K..g........#dL
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.092 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.093 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.093 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.095 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.097 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.097 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.106 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.107 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.108 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.112 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.112 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.112 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.115 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.115 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.115 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.116 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.116 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.117 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.117 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.120 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 04 EE E6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:45.000 UTC",
#       "not  after"         : "2024-01-14 08:39:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 7F 88 CA AA A0 77 9D   2B 7E 99 07 6D 3D F0 65  $.....w.+...m=.e
#           0010: BB CD 25 C0                                        ..%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.120 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:17.189 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:17.189 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:17.189 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:40:17.190 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.235 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 96 26 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 08:39:43.000 UTC",
#     "not  after"         : "2024-01-14 08:39:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#         0010: 49 53 53 E9                                        ISS.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#         0010: BD 84 9C 0A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.239 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 96 AA 0A 85 41 A6 80 4F   26 94 C5 12 6B A7 27 5F  ....A..O&...k.'_
#     0010: DD 10 96 03 3E CC 01 B4   6D 4E F8 5E 94 56 C5 77  ....>...mN.^.V.w
#     0020: 81 2A EC D0 D3 AC B4 9E   1E 80 38 85 DD 1D F5 BD  .*........8.....
#     0030: D2 BC DD CC DB E2 6C 4E   C6 7D 00 0B 27 65 4C C8  ......lN....'eL.
#     0040: 0D 6B 17 DD BC 85 9F 1B   EE FE B0 6F AB F3 B8 D7  .k.........o....
#     0050: CD BB 19 5B 30 5C F5 BF   3D 2A 8D B7 52 61 47 94  ...[0\..=*..RaG.
#     0060: 1F BA 5D C4 47 7C 64 B5   FF FD E0 91 4E 84 2A AC  ..].G.d.....N.*.
#     0070: B3 86 5D 09 54 A8 6A C9   D8 D8 CE 92 82 D3 FB FC  ..].T.j.........
#     0080: DF 33 3C 01 50 A4 C9 3F   EC 56 CF 3B 25 79 3A 73  .3<.P..?.V.;%y:s
#     0090: 8D 22 CD 52 5C 61 B0 B2   EA EA DE 06 40 B6 BB 0B  .".R\a......@...
#     00A0: 97 4B 94 63 B4 4D B7 B9   2F AE 26 DD 34 7E 44 CF  .K.c.M../.&.4.D.
#     00B0: FF 03 41 B7 F3 66 E6 7B   E1 13 47 88 12 E4 4E B3  ..A..f....G...N.
#     00C0: F2 CC 84 46 9F 21 D2 4E   54 D6 65 DC 0E 4E BE 5B  ...F.!.NT.e..N.[
#     00D0: A4 94 6D 94 01 CF F4 38   55 8A 4C 00 E8 75 4E E5  ..m....8U.L..uN.
#     00E0: FC 3C F5 52 0C EC 89 FF   C6 A9 BB 29 6B 23 A1 BB  .<.R.......)k#..
#     00F0: 9C 90 90 7C 5D E7 08 3B   DA 0D 27 90 80 21 5F 60  ....]..;..'..!_`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.241 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 64 46 58 9C 9B CD 2D   4B 5C E6 03 66 99 07 07  6dFX...-K\..f...
#     0010: A1 EF B2 69 B6 74 AB DD   CE FA 4C 79 21 33 E3 8F  ...i.t....Ly!3..
#     0020: DF B9 75 C2 ED B3 71 6A   3E 09 14 75 FC F1 50 83  ..u...qj>..u..P.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.243 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:17.244 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.244 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:17.245 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.245 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 08:40:17.245 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:17.245 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.246 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.249 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 F1 3F A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:49.000 UTC",
#       "not  after"         : "2024-01-14 08:39:49.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 2A B5 E4 EC 68 82 4F   42 FC 5D 01 39 BE D4 C5  r*...h.OB.].9...
#           0010: 57 59 88 05                                        WY..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 96 26 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:43.000 UTC",
#       "not  after"         : "2024-01-14 08:39:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#           0010: 49 53 53 E9                                        ISS.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.276 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A F5 6E 74 D2 76 8A C9   30 AE 19 00 92 8B 78 B8  z.nt.v..0.....x.
#     0010: 52 0C 2B E2 D2 11 32 89   B8 68 2D DF 34 0C 52 95  R.+...2..h-.4.R.
#     0020: F1 CF CD B4 24 51 4F 2B   F5 FF 46 F0 34 91 48 DD  ....$QO+..F.4.H.
#     0030: 03 52 FE E9 EF C4 35 C5   10 3D C5 17 21 1B 5F 79  .R....5..=..!._y
#     0040: F7 98 E0 6D 9D FE 06 45   FD E5 29 55 1A 49 B8 4F  ...m...E..)U.I.O
#     0050: D7 F4 64 A8 27 DC CC D3   44 BB 41 4C AE 4F BF 4C  ..d.'...D.AL.O.L
#     0060: 1F A7 07 9A DB 2C 75 BC   84 06 04 96 75 A9 59 2E  .....,u.....u.Y.
#     0070: F2 22 2B 2A C7 6D D6 AF   90 93 63 59 0A 89 C9 6B  ."+*.m....cY...k
#     0080: BD C2 F8 8C F9 17 91 6F   CD 2A BE 17 B5 02 42 BF  .......o.*....B.
#     0090: 2A 46 25 66 99 35 73 38   D4 5C 6B 2F 2C 6B 4E 53  *F%f.5s8.\k/,kNS
#     00A0: 19 2F 28 E0 0D E0 6A 1D   60 A5 74 3A 7F 85 D8 40  ./(...j.`.t:...@
#     00B0: 5C A3 BF 71 24 BE A2 BB   D6 FD A2 54 33 FB AB 46  \..q$......T3..F
#     00C0: 7A 60 36 A7 5B 1C AE 75   D2 FC 06 2B 38 09 28 13  z`6.[..u...+8.(.
#     00D0: C4 7A EC 60 B9 AE A8 83   1A 60 80 E4 2E 05 9D B7  .z.`.....`......
#     00E0: 3C E4 CA B6 85 F1 0E 33   64 50 61 10 56 84 0C 6F  <......3dPa.V..o
#     00F0: 02 6F CB 70 24 F8 B4 31   B2 82 9C 1C 3D 1C EC A1  .o.p$..1....=...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.277 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 32 69 3C 26 F4 A3 F5   76 02 B8 12 F8 06 2F 03  .2i<&...v...../.
#     0010: 1A 86 7D 8A 2A 22 74 C2   5C 08 B2 43 2E 8D B7 51  ....*"t.\..C...Q
#     0020: 5F 1B C0 74 60 88 63 B2   40 9B 8B A9 95 0B 0A 28  _..t`.c.@......(
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.278 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:17.334 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EC 6D D7 B3 B4 E5 35 B8 6B 39 E3 87 3E 1F A7 A1 7A B9 F2 DE BF 37 4B 79 00 04 2F 01 F1 6A 7E 04",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 08:40:17.612 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 08:40:17.612 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 08:40:28.412; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:28.734 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 3A B0 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:41.000 UTC",
#       "not  after"         : "2024-01-14 08:39:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#           0010: 49 53 53 E9                                        ISS.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 96 26 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 08:39:43.000 UTC",
#       "not  after"         : "2024-01-14 08:39:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 C6 28 47 4F A5 9D 83   60 D9 5A 50 6B 49 80 EA  x.(GO...`.ZPkI..
#           0010: 49 53 53 E9                                        ISS.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 61 7F 8C 48 01 62 B6   4C FD EC FC 6E 3E 59 6A  .a..H.b.L...n>Yj
#           0010: BD 84 9C 0A                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 08:40:28.749 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:28.974 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.974 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:28.976 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 08:40:28.976 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.981 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.993 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 08:40:28.995 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "61 4A C6 F2 66 97 86 0A 1C 2F 42 0A CB 3D 85 B5 3D 31 E4 ED 01 92 D0 7C 54 ED 50 3B BD 13 E0 0A",
#     "session id"          : "BD 44 41 40 2C 5B C8 9E 5C 80 D9 53 FE E6 B4 38 A3 A9 6A 59 7F 55 83 30 CE E2 ED C7 61 0E CD 5E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 8C FB BB BB CF E5 C5 C4   D2 72 C5 0E 17 0C 3A 9B  .........r....:.
#               0010: 86 6F 79 9D 65 14 3C A2   35 93 21 47 B2 48 50 0C  .oy.e.<.5.!G.HP.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.018 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "75 FA CF 13 07 2A 24 C9 6F 59 F0 FD 86 C4 5A 94 17 31 63 D1 8D 47 88 1B CA D8 D6 78 6A 36 BB 81",
#     "session id"          : "BD 44 41 40 2C 5B C8 9E 5C 80 D9 53 FE E6 B4 38 A3 A9 6A 59 7F 55 83 30 CE E2 ED C7 61 0E CD 5E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 56 03 D4 28 63 AB D1 A2   6D 8F E1 0B 1A D9 DA C2  V..(c...m.......
#             0010: B5 EF 41 0C 7C E7 86 93   14 1F 8D 85 C3 5A 05 1F  ..A..........Z..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.018 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.019 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.019 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.021 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.023 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.023 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.023 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.023 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.023 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.031 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.032 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.034 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.037 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.037 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:40:29.038 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 08:40:29.040 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 08:41:50.013 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:41:50.065 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:41:50.065 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:41:50.065 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 08:41:50.066 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45166/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28498ms
ok 65 stop command for single port in 31028ms
ok 66 status detects locally running solr in 14646ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2226ms
ok 69 copying files around in 6595ms
ok 70 upconfig in 2628ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 25s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m54s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5680 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5680/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40009/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 05:36:09.873; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 05:36:09.878; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 05:36:10.831; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 05:36:10.871; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23290ms
ok 61 start solr with client truststore and security manager in 25568ms
not ok 62 start solr with mTLS needed in 57088ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-TGe0F5/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40009.
#
# Started Solr server on port 40009 (pid=199901). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40010.
#
# Started Solr server on port 40010 (pid=200353). Happy searching!
#
# INFO  - 2023-10-16 05:37:34.733; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 05:37:34.738; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 05:37:35.134; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 05:37:35.137; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 05:37:35.137; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:35.169 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 1D F0 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:10.000 UTC",
#     "not  after"         : "2024-01-14 05:37:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 15 4D 7C 69 B4 99 FE   5F 15 F4 BF 70 CD A7 19  ..M.i..._...p...
#         0010: AD CD 48 58                                        ..HX
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:35.173 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B DB 66 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:02.000 UTC",
#     "not  after"         : "2024-01-14 05:37:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:35.188 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:35.271 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:35.272 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:35.272 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:35.272 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:35.420 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.420 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:35.422 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:35.422 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.439 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:35.441 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9D D9 E9 BA DB 24 96 62 F2 CB D0 24 4F 90 7F F2 99 AF 88 71 4A D7 E1 2F BD E9 3E CA F0 B1 0A 68",
#   "session id"          : "5C 94 E0 D5 5D 84 DB 04 19 57 00 35 48 AF 60 9D 3C 36 2D 1E 2D 40 26 A0 63 06 C9 51 42 6C 65 F2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AF 06 BD DE 12 DF EA 31   A3 E9 8E 1B 18 F2 14 AE  .......1........
#             0010: E2 64 FE 36 AE B7 99 85   33 58 20 B9 46 15 75 3C  .d.6....3X .F.u<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.565 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AA E6 84 20 97 76 31 6A 40 93 C9 BD 17 33 03 A5 95 7C 9E 8E 58 BD EC 8C 0B CD F5 D0 24 41 8A D7",
#   "session id"          : "5C 94 E0 D5 5D 84 DB 04 19 57 00 35 48 AF 60 9D 3C 36 2D 1E 2D 40 26 A0 63 06 C9 51 42 6C 65 F2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0E 57 72 72 57 96 B2 20   BC 69 F7 C6 90 CF FF 78  .WrrW.. .i.....x
#           0010: D7 9B 5C DB 5E C5 14 D8   EF 88 49 F5 60 7F EF 1F  ..\.^.....I.`...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.565 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.565 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.567 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.570 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.570 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.570 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.571 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.579 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.580 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.581 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.585 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.585 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.585 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.588 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.588 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.588 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.589 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.590 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.590 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.593 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 F9 1B 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:07.000 UTC",
#       "not  after"         : "2024-01-14 05:37:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A1 3C 57 8F B4 26 3F   FE BC 1D 9A AC E3 78 7A  B.<W..&?......xz
#           0010: 47 93 5D 80                                        G.].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.593 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.670 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.674 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 7D DF F3 2D D5 FF 03   58 F7 0F 32 3C 32 67 6C  F...-...X..2<2gl
#     0010: 85 19 CC C4 F0 6E 65 E8   D5 04 34 BD 68 16 E6 18  .....ne...4.h...
#     0020: DB 18 29 71 F8 E4 AF D9   2C 50 F2 17 64 DA CF 1A  ..)q....,P..d...
#     0030: 83 D3 41 3F 0A 31 32 7E   25 BD 9B 26 5D 91 57 B0  ..A?.12.%..&].W.
#     0040: A0 67 E6 4A F9 A9 9D FD   05 BF 42 F1 27 D3 D1 EE  .g.J......B.'...
#     0050: 4F 25 95 80 49 99 62 45   C4 CD 04 73 49 86 10 8F  O%..I.bE...sI...
#     0060: 82 B7 33 B9 BC E3 34 02   8B AC 40 B7 1E 0E 95 26  ..3...4...@....&
#     0070: A0 3F 8A DC 24 1C 45 0F   6C 1C 5D 74 3C 5D 77 A3  .?..$.E.l.]t<]w.
#     0080: B1 A4 24 61 EA A0 C7 9B   14 18 EC 46 70 7B AE F5  ..$a.......Fp...
#     0090: 24 59 46 C4 C6 F1 53 4E   72 AF D9 33 6A 5A B7 7A  $YF...SNr..3jZ.z
#     00A0: 9E D2 9E 23 A8 A7 5F 38   2C 69 EC B4 17 2C 6F A8  ...#.._8,i...,o.
#     00B0: 22 EF 54 E1 C5 CF E5 FE   0A 91 53 A7 44 03 73 83  ".T.......S.D.s.
#     00C0: EB F9 56 BD CC 93 10 2B   06 46 FB 91 6C 69 1A A0  ..V....+.F..li..
#     00D0: 97 10 9B C1 C2 B8 7D 48   A7 E4 BB BF E3 54 BF 0A  .......H.....T..
#     00E0: AF DF 72 5C 88 26 D3 C6   A6 6C 7E AB 96 97 E3 D9  ..r\.&...l......
#     00F0: E6 8D AF 99 60 1E 94 8B   0A 87 C0 47 3A 60 CC 58  ....`......G:`.X
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.676 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 06 30 80 61 ED 92 D8 D4   62 77 98 1C 67 F1 E6 28  .0.a....bw..g..(
#     0010: 37 DF FB C0 42 15 41 F4   8B B1 59 EC C9 98 6C B2  7...B.A...Y...l.
#     0020: F4 AE 0D DA 1B B4 C6 2D   88 D0 AA FD 65 7C 75 F4  .......-....e.u.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.679 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:35.679 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.680 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:35.680 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.680 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:35.680 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:35.681 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.681 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.684 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 1D F0 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:10.000 UTC",
#       "not  after"         : "2024-01-14 05:37:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 15 4D 7C 69 B4 99 FE   5F 15 F4 BF 70 CD A7 19  ..M.i..._...p...
#           0010: AD CD 48 58                                        ..HX
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 2C 2D 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:04.000 UTC",
#       "not  after"         : "2024-01-14 05:37:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#           0010: DA 0C 4F 72                                        ..Or
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.710 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6B D9 F5 85 1E 2B 80 43   A0 0D FE 39 12 49 67 7F  k....+.C...9.Ig.
#     0010: DF C1 D6 D9 3D 54 68 0C   88 A2 4E A3 74 81 BC B1  ....=Th...N.t...
#     0020: D7 01 20 30 8E D8 D7 96   54 1E 70 FC AE 7F C4 CE  .. 0....T.p.....
#     0030: 73 F4 C5 30 AB DF FC 79   6F 92 ED 74 76 07 B2 F3  s..0...yo..tv...
#     0040: A7 28 31 C8 D3 C9 17 04   E5 B9 00 27 DB 85 2B 86  .(1........'..+.
#     0050: 77 23 4C C6 10 01 BC 13   0D B8 1E 4A 43 59 85 D1  w#L........JCY..
#     0060: 3A 6A 9C D9 26 E8 A6 2E   EC A6 CF D6 1C B3 CC B8  :j..&...........
#     0070: 5D 07 BE 09 83 F8 CE 81   1E 16 C6 10 43 1E A9 CD  ]...........C...
#     0080: 59 8D 98 AD DB 82 EE 91   5B 28 8C 40 47 DA 03 16  Y.......[(.@G...
#     0090: 39 6D 81 F1 ED 07 72 3E   8E 4A 28 E0 25 22 58 7B  9m....r>.J(.%"X.
#     00A0: A4 E1 7C 08 85 73 BA 54   31 C8 01 A2 56 5A F3 01  .....s.T1...VZ..
#     00B0: 1B 40 78 A2 AA 28 79 98   59 81 98 A4 E4 B9 20 6E  .@x..(y.Y..... n
#     00C0: DC F3 88 75 9D 79 41 36   8A 26 27 B9 E5 74 12 13  ...u.yA6.&'..t..
#     00D0: A9 8F C5 59 62 80 F8 CE   D4 1B F3 A7 1D 0C 02 D4  ...Yb...........
#     00E0: 99 F5 D8 1D 75 2F CD 82   5A D2 D1 B7 E4 B4 9C 29  ....u/..Z......)
#     00F0: 77 17 28 75 D7 B7 05 29   1B 53 FA 55 D6 F8 13 3E  w.(u...).S.U...>
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.711 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 2D DE FA 1D A0 52 FF   D9 80 7F 5F DF 32 2F F7  .-....R...._.2/.
#     0010: 35 F5 D5 2D C2 DB 4B C9   C9 7D 00 C1 31 69 CB BB  5..-..K.....1i..
#     0020: 7A D3 28 94 9E 4B 30 49   25 4F C2 7E 1E 32 CF 07  z.(..K0I%O...2..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.711 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:35.768 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "06 94 BB 72 AF C0 00 D5 CD F7 02 49 9D B2 FE 54 9E CD 86 1D B4 6E 5F 47 E6 55 FB 70 AF 64 9C 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 05:37:36.137 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 05:37:36.138 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 05:37:37.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 05:37:37.095; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 05:37:37.459; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 05:37:37.462; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 05:37:37.462; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TGe0F5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:37.495 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 1D F0 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:10.000 UTC",
#     "not  after"         : "2024-01-14 05:37:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 15 4D 7C 69 B4 99 FE   5F 15 F4 BF 70 CD A7 19  ..M.i..._...p...
#         0010: AD CD 48 58                                        ..HX
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:37.500 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B DB 66 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:02.000 UTC",
#     "not  after"         : "2024-01-14 05:37:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:37.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:37.996 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:37.997 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:37.999 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:37.999 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:38.006 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:38.018 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:38.018 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:38.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:38.021 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "71 E7 C1 A9 D9 CC 01 19 B5 8D 46 B0 0B FD 07 42 07 47 2D AD 8D FD 0E 00 5C 26 E2 4C A8 B7 8B 50",
#   "session id"          : "02 9A 53 84 52 80 AD 9D 0D AE 5F 76 BA 32 8A FD EB B7 1B DC 2B D6 A5 99 B8 30 DA BE C4 98 7D 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7B 20 CC 18 F8 B0 D0 24   7D 55 2F DE E5 46 42 19  . .....$.U/..FB.
#             0010: C4 75 8D EB C1 FB AE 0C   7B B9 74 DF 41 73 B3 15  .u........t.As..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.113 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FC 3F 37 05 0D 57 5A 6D 70 7D 73 09 7C D8 67 00 72 CE D4 D7 63 AE 9D EA 7B AF 3B 82 EE 30 94 5D",
#   "session id"          : "02 9A 53 84 52 80 AD 9D 0D AE 5F 76 BA 32 8A FD EB B7 1B DC 2B D6 A5 99 B8 30 DA BE C4 98 7D 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EB 21 82 4D F3 E7 9B 97   DD FB 9C 35 F1 C1 DC 7A  .!.M.......5...z
#           0010: F9 FA B7 17 F2 E0 5A 79   33 C9 DD B4 FA FD F8 70  ......Zy3......p
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.113 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.114 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.115 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.116 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.116 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.118 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.119 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.119 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.119 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.119 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.128 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.129 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.130 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.134 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.134 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.134 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.134 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.134 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.135 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.135 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.136 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.137 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.137 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.137 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.138 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.139 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.139 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.143 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 F9 1B 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:07.000 UTC",
#       "not  after"         : "2024-01-14 05:37:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A1 3C 57 8F B4 26 3F   FE BC 1D 9A AC E3 78 7A  B.<W..&?......xz
#           0010: 47 93 5D 80                                        G.].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.144 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:38.184 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:38.186 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:38.186 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:37:38.186 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.231 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 2C 2D 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 05:37:04.000 UTC",
#     "not  after"         : "2024-01-14 05:37:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#         0010: DA 0C 4F 72                                        ..Or
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#         0010: 94 94 A6 F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.235 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 65 EE 7A D4 98 EC DE   BE AD 2D 8D F2 D1 80 C8  Pe.z......-.....
#     0010: 77 E6 25 7E 8F EB 68 FE   71 77 FC 20 C6 99 BE B6  w.%...h.qw. ....
#     0020: 8C C9 E7 E4 74 4D 44 CF   A7 FE C4 CD EA 1A FD 64  ....tMD........d
#     0030: 6B C9 65 38 77 F9 4A A8   84 8A 74 8F 47 27 00 17  k.e8w.J...t.G'..
#     0040: 77 7D 12 98 D5 47 DD 88   73 B3 E9 43 5D B7 D0 0D  w....G..s..C]...
#     0050: 3B A3 44 0A 66 27 C7 D4   82 2F 95 16 36 7B 30 3C  ;.D.f'.../..6.0<
#     0060: BC C1 41 CF DE 54 D8 A8   6E BD 20 9C 3B 12 84 0E  ..A..T..n. .;...
#     0070: 9D 47 E7 45 7C 0B 1B 9F   5A C5 6A 0B 67 6A F0 11  .G.E....Z.j.gj..
#     0080: 40 B2 84 A8 90 59 72 A0   A6 E0 28 DB BC 2D DF 75  @....Yr...(..-.u
#     0090: 60 54 97 9D 2E 87 32 D4   3F 29 27 FF DB 9A 10 1A  `T....2.?)'.....
#     00A0: 1E 1E AD 28 31 CF CA 8B   A6 0D 10 BB 41 5A CB E4  ...(1.......AZ..
#     00B0: D1 44 19 A2 3B D4 4B 9D   78 50 12 53 5E E6 39 D0  .D..;.K.xP.S^.9.
#     00C0: A7 61 7D 98 86 AA DA F2   C2 F2 34 CA 36 C0 16 7F  .a........4.6...
#     00D0: 68 3E 84 13 17 44 CB AB   8C C9 00 BE A9 1A 48 3D  h>...D........H=
#     00E0: 18 08 46 B4 22 9A DD B1   59 80 F4 84 DB 1B E9 84  ..F."...Y.......
#     00F0: 22 33 C8 82 41 E0 0D 8B   F2 06 1D B2 91 BA 3F 54  "3..A.........?T
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.237 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 53 EE 8B 8C DF 14 BB B9   1D CE D2 F5 46 77 A8 1E  S...........Fw..
#     0010: C3 FF D6 6B 92 CB AE BE   A6 A0 08 B8 75 90 E0 3A  ...k........u..:
#     0020: B9 1A 6D C9 8F 26 B4 57   B7 5A 3A 22 30 0F 79 5F  ..m..&.W.Z:"0.y_
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.239 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:38.240 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.241 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:38.241 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.241 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 05:37:38.241 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:38.242 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.242 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.245 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 1D F0 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:10.000 UTC",
#       "not  after"         : "2024-01-14 05:37:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 15 4D 7C 69 B4 99 FE   5F 15 F4 BF 70 CD A7 19  ..M.i..._...p...
#           0010: AD CD 48 58                                        ..HX
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 2C 2D 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:04.000 UTC",
#       "not  after"         : "2024-01-14 05:37:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#           0010: DA 0C 4F 72                                        ..Or
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.270 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 4C 31 FD F3 89 A6 DD   19 EB 9A D9 9B F4 6E 0B  EL1...........n.
#     0010: A6 12 F8 B6 B0 2A 1A 2B   FB 21 76 7D 72 39 E0 37  .....*.+.!v.r9.7
#     0020: 2D 2F 33 CE 7A 8A 7C 2E   E1 A3 AE 89 19 75 87 F9  -/3.z........u..
#     0030: 57 71 99 46 D7 60 DA 71   18 D3 DA 9C 1D 74 0E 1B  Wq.F.`.q.....t..
#     0040: 86 8A 6D 34 83 D0 DB 5E   C5 23 A0 A2 AA 42 D5 22  ..m4...^.#...B."
#     0050: C1 22 F0 17 E6 5C E0 21   26 AF 4E FF 04 81 F6 4B  ."...\.!&.N....K
#     0060: 2E 34 7A B2 E6 4F BB FE   32 D6 75 CF 5C 5A C6 5A  .4z..O..2.u.\Z.Z
#     0070: F7 22 43 4A 2A 62 31 62   03 3C D6 8B A5 F1 B2 CD  ."CJ*b1b.<......
#     0080: 6C F3 B2 CF B8 2E 28 C9   36 4F F5 F4 98 BC 47 7F  l.....(.6O....G.
#     0090: 80 9B 73 0C B6 53 4B 0E   69 1A 2D AE 46 DC 58 59  ..s..SK.i.-.F.XY
#     00A0: B3 51 4D D9 72 63 C8 84   62 BE D4 A1 B7 BB AA AD  .QM.rc..b.......
#     00B0: B4 47 FF D9 27 68 94 52   DF 4F 45 EA 5A AD 6D 75  .G..'h.R.OE.Z.mu
#     00C0: 0E 2F B0 5F E1 2A DD 5E   20 A8 85 5C 5D 51 D1 25  ./._.*.^ ..\]Q.%
#     00D0: 14 6C 4F 3C 54 46 2A 2E   A8 7E 29 A5 DA 32 DF 47  .lO<TF*...)..2.G
#     00E0: 9E 48 C1 B3 70 B3 3A F9   51 B5 40 E0 73 E3 93 2E  .H..p.:.Q.@.s...
#     00F0: CF B5 2E BB 44 92 80 B4   09 1C 5F 5A 76 20 B3 56  ....D....._Zv .V
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.271 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 55 AE 89 49 AB 52 64 91   DC 92 36 65 15 3B 5E E8  U..I.Rd...6e.;^.
#     0010: AB 4E FF 97 8F 05 97 45   0F F8 1F 59 C9 2D DC D8  .N.....E...Y.-..
#     0020: C7 B6 0D BB 07 E2 95 D9   4C D7 36 3A E8 3D B9 4C  ........L.6:.=.L
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.272 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:38.330 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "47 FB 7F 5A 50 3C CD 49 72 31 3E CD A9 CE BA 9F 22 D4 FF 06 3F D7 BB 41 02 BC 8A 0E 3B 6D E5 FE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 05:37:38.606 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 05:37:38.607 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 05:37:49.827; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:50.164 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B DB 66 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:02.000 UTC",
#       "not  after"         : "2024-01-14 05:37:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#           0010: DA 0C 4F 72                                        ..Or
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 2C 2D 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 05:37:04.000 UTC",
#       "not  after"         : "2024-01-14 05:37:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7F 71 3F 2A F9 89 64   D7 1C 88 56 BE 05 1D 74  *.q?*..d...V...t
#           0010: DA 0C 4F 72                                        ..Or
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 22 F4 2D 4F 40 64 91   DA C5 05 E8 6D 41 2B 01  .".-O@d.....mA+.
#           0010: 94 94 A6 F2                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 05:37:50.179 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:50.405 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:50.407 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 05:37:50.408 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.413 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.425 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 05:37:50.427 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "04 6F AA 20 EB 8F B5 3B A7 37 23 2F CA 18 65 6D 44 C4 AA 96 86 EF 46 3D 50 91 BE 9A 33 E4 AE 45",
#     "session id"          : "3E E1 FC ED F5 68 CD E2 0F F8 18 7B 38 E3 0D BC 2E 73 FA 62 04 59 54 A4 68 8B B6 77 AB 50 72 AB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 80 66 C2 84 C4 A5 92 02   A7 B2 59 B6 13 A0 E8 CD  .f........Y.....
#               0010: 0D D4 CB 55 58 95 0A 87   29 61 E5 F6 1C CB 60 47  ...UX...)a....`G
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.449 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "40 06 6D 33 0C C6 32 97 98 BD 89 07 8A 13 2F 07 E6 68 07 4C 3F 47 83 8F B7 BB 4B BF 9B E7 66 C9",
#     "session id"          : "3E E1 FC ED F5 68 CD E2 0F F8 18 7B 38 E3 0D BC 2E 73 FA 62 04 59 54 A4 68 8B B6 77 AB 50 72 AB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F9 81 EC FF 39 D8 AC 25   B9 C7 51 D7 40 DD AB 5E  ....9..%..Q.@..^
#             0010: D4 27 25 92 FC C8 8B 53   F7 74 4F 26 B0 5C 6C 2D  .'%....S.tO&.\l-
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.450 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.454 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.463 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.465 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.466 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.469 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:37:50.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 05:37:50.472 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 05:39:09.300 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:39:09.340 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:39:09.340 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:39:09.340 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 05:39:09.340 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40010/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28105ms
ok 65 stop command for single port in 31383ms
ok 66 status detects locally running solr in 14648ms
ok 67 status does not expose cli parameters to end user in 215ms
ok 68 listing out files in 2164ms
ok 69 copying files around in 6566ms
ok 70 upconfig in 2603ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 25s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m53s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5679 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5679/

2 tests failed.
FAILED:  org.apache.solr.pkg.TestPackages.testPluginLoading

Error Message:
java.lang.Exception: Test abandoned because suite timeout was reached.

Stack Trace:
java.lang.Exception: Test abandoned because suite timeout was reached.
	at __randomizedtesting.SeedInfo.seed([AFE0F9653028D7B1]:0)


FAILED:  org.apache.solr.pkg.TestPackages.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([AFE0F9653028D7B1]:0)




Build Log:
[...truncated 1281 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35439/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-16 00:23:38.208; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:23:38.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-16 00:23:39.122; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 00:23:39.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22824ms
ok 61 start solr with client truststore and security manager in 25585ms
not ok 62 start solr with mTLS needed in 56804ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lI8WeQ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35439.
#
# Started Solr server on port 35439 (pid=199177). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35440.
#
# Started Solr server on port 35440 (pid=199606). Happy searching!
#
# INFO  - 2023-10-16 00:25:02.904; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:25:02.909; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 00:25:03.298; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:25:03.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:25:03.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:03.334 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 72 BE 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:39.000 UTC",
#     "not  after"         : "2024-01-14 24:24:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 D8 17 CD D8 3F 8C 3A   99 8E F9 CD F7 C7 FF 49  .....?.:.......I
#         0010: E5 DF DF 5E                                        ...^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:03.338 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 E0 26 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:30.000 UTC",
#     "not  after"         : "2024-01-14 24:24:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:03.352 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:03.542 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:03.544 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:03.544 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.549 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.561 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:03.563 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D9 C8 86 8D A3 39 72 03 B0 71 76 3A B9 98 12 3C 9C 20 F7 34 B6 A4 2A 85 AB 0E 5E 9D FB 86 11 01",
#   "session id"          : "28 A9 93 9D 3F C5 5A EA F7 D1 28 05 14 36 6B 44 B4 4B 68 3A 6F EC B1 DD 7F E7 E8 EA 81 0B 57 23",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E7 35 63 55 4A 18 B3 63   97 23 DB 2B 9B 16 C9 CF  .5cUJ..c.#.+....
#             0010: 71 13 F9 B7 DB A0 06 80   78 CA 99 7A 1C FF DD 5A  q.......x..z...Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.665 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6C B1 DE 4B C9 57 59 98 5B ED C0 17 ED E3 B2 FF 59 AE CF 38 CB 72 12 7A B2 26 6E C4 18 FD 45 D2",
#   "session id"          : "28 A9 93 9D 3F C5 5A EA F7 D1 28 05 14 36 6B 44 B4 4B 68 3A 6F EC B1 DD 7F E7 E8 EA 81 0B 57 23",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 0B B9 21 DE 6B 7F 46   F7 D6 B1 80 DF DD F9 57  `..!.k.F.......W
#           0010: B7 6D 48 26 09 C2 BB D5   41 6B F2 8E EA CF 01 3D  .mH&....Ak.....=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.666 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.666 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.667 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.668 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.670 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.680 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.686 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.686 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.687 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.687 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.687 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.688 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.689 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.689 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.689 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.690 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.691 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.691 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.694 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 4D 49 EA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:35.000 UTC",
#       "not  after"         : "2024-01-14 24:24:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 69 6D 85 5A 0A 5C 51   67 D0 18 A2 27 CC 7B 26  ?im.Z.\Qg...'..&
#           0010: E6 12 51 CE                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.694 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:03.730 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:03.732 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:03.732 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:03.732 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.772 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.776 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 84 27 BB FC 41 DB A1   7C A2 C5 0B 3D D3 43 17  *.'..A......=.C.
#     0010: 90 8A 85 E2 55 1E A2 50   AF 1C F6 51 BF 61 96 F5  ....U..P...Q.a..
#     0020: 74 1C 34 65 3F 7F F4 29   1E 14 47 59 0F 11 22 9B  t.4e?..)..GY..".
#     0030: FE 0D 8A 07 B5 67 AA 80   8A B2 79 D4 07 B0 06 31  .....g....y....1
#     0040: 0F 72 D2 07 41 98 C9 9B   2B E6 89 F7 06 8D 54 78  .r..A...+.....Tx
#     0050: C7 4C 3B B0 BC 6A 6C ED   8D 16 41 D3 26 2E DD 47  .L;..jl...A.&..G
#     0060: 3C CB 82 DB 5C B3 B2 5C   16 B1 4D 90 68 60 F4 37  <...\..\..M.h`.7
#     0070: 4C 3A 9A 20 85 78 56 B0   8A 3D 95 B2 81 61 64 5B  L:. .xV..=...ad[
#     0080: 1B 99 46 94 CF FD 54 9A   92 C1 8D 12 52 F9 96 73  ..F...T.....R..s
#     0090: 46 31 F2 4A 58 5B E6 3A   51 B8 57 85 05 AB 49 29  F1.JX[.:Q.W...I)
#     00A0: 0B AC 06 7F 0F 09 73 17   38 06 A6 3B D3 76 6A D7  ......s.8..;.vj.
#     00B0: C7 48 E6 9C FF AE 7C 6B   F8 09 7E DD 8C 45 30 C4  .H.....k.....E0.
#     00C0: 62 92 62 CF C3 F6 30 22   9D D3 DC 09 F0 98 3C 8C  b.b...0"......<.
#     00D0: A0 E9 8F 57 4D 13 77 1B   13 24 5D 85 EF 8A 77 85  ...WM.w..$]...w.
#     00E0: F5 7F 30 A9 FC 19 B7 41   6B 92 F6 9B 1C 72 C2 ED  ..0....Ak....r..
#     00F0: 8D 10 33 D2 03 36 82 54   45 32 DD 8F E3 A4 BA 76  ..3..6.TE2.....v
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.777 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E 9B 7D 88 86 8A CA 72   03 4A 42 29 E5 7D EF B2  .......r.JB)....
#     0010: CE 9A 47 CA B2 BE F1 2C   26 DE D0 DB 6D 4A 05 96  ..G....,&...mJ..
#     0020: 9D F2 FF C1 F3 17 C6 93   23 04 BD CB 6D 55 C9 69  ........#...mU.i
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.779 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:03.780 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.781 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:03.781 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.781 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:03.781 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:03.781 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.782 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.784 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 72 BE 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:39.000 UTC",
#       "not  after"         : "2024-01-14 24:24:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 D8 17 CD D8 3F 8C 3A   99 8E F9 CD F7 C7 FF 49  .....?.:.......I
#           0010: E5 DF DF 5E                                        ...^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D D2 A1 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:32.000 UTC",
#       "not  after"         : "2024-01-14 24:24:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#           0010: 8E 11 B3 45                                        ...E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.811 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D 12 25 19 50 42 46 82   9D 3B 8C 46 C1 C8 5A CD  ..%.PBF..;.F..Z.
#     0010: 78 96 A9 15 FA 47 82 F4   34 3C 55 37 D1 CD BA E1  x....G..4<U7....
#     0020: E7 40 ED E2 5D D8 B8 32   7A 2F D3 90 8F F2 8E D5  .@..]..2z/......
#     0030: A4 A3 9C 1F 69 DA 29 14   BD 49 22 D3 B8 58 26 0C  ....i.)..I"..X&.
#     0040: AA C4 89 EF 4D D1 3B 37   35 04 DA 10 E7 E5 C4 92  ....M.;75.......
#     0050: E7 93 4B 7B 0D 0C 78 5F   DA 9B 50 06 F2 D4 1D ED  ..K...x_..P.....
#     0060: E9 B6 FC 90 9C 96 E4 7A   FF D0 A3 73 1C 9B 86 91  .......z...s....
#     0070: 40 45 F1 D6 B9 2D B1 DA   C1 81 E9 A0 B5 DF 6B B3  @E...-........k.
#     0080: 6B 9B 4A 0D 30 3B 86 02   53 A1 A7 23 21 A4 C7 48  k.J.0;..S..#!..H
#     0090: A3 93 A0 3A 52 50 5C 01   0D 66 A9 57 EC 8F 76 5D  ...:RP\..f.W..v]
#     00A0: 42 25 60 B7 90 B8 58 E0   46 2F F6 DA B6 51 32 EF  B%`...X.F/...Q2.
#     00B0: EE 66 77 56 37 EC 3A A9   EA 84 69 1F 37 FB A0 C0  .fwV7.:...i.7...
#     00C0: 37 9E F8 40 55 43 00 D1   4B 23 8A 0A 19 78 FC AD  7..@UC..K#...x..
#     00D0: 15 2C 17 E6 99 18 02 F2   27 0A D8 A9 21 B6 AE 7D  .,......'...!...
#     00E0: 8D 7D 36 15 5C EB E6 83   56 96 F6 D3 87 CF 01 20  ..6.\...V......
#     00F0: 37 18 95 34 19 37 91 B7   0C 34 8B A7 AB B0 C5 42  7..4.7...4.....B
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.812 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7B B3 66 34 3D DF 72 F1   DD 73 52 6E 0E CC FD 59  ..f4=.r..sRn...Y
#     0010: BC E5 D0 C9 40 5C B9 F9   FB B2 17 8F 3B A5 FE D4  ....@\......;...
#     0020: 53 AB DF 60 C2 31 2D A0   40 1B FB 62 28 98 BC EC  S..`.1-.@..b(...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.813 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:03.868 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 D1 05 EB 1B B2 BF C5 6E 3B BF 24 17 3E 3E 26 20 C8 34 67 12 5C EE 16 5B B8 8E 94 4C 16 0D F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 24:25:04.131 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 24:25:04.132 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 00:25:05.080; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 00:25:05.086; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 00:25:05.457; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:25:05.461; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 00:25:05.461; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lI8WeQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:05.495 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 72 BE 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:39.000 UTC",
#     "not  after"         : "2024-01-14 24:24:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 D8 17 CD D8 3F 8C 3A   99 8E F9 CD F7 C7 FF 49  .....?.:.......I
#         0010: E5 DF DF 5E                                        ...^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:05.500 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 E0 26 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:30.000 UTC",
#     "not  after"         : "2024-01-14 24:24:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:05.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:06.002 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:06.004 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:06.004 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.010 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.021 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:06.024 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 61 10 64 F4 C9 58 46 1C CD C8 BD FD 13 78 3D 44 57 9C 64 8C 4D 70 EB 0A F4 C8 68 DA C5 9D 96",
#   "session id"          : "23 87 D8 4C 05 66 A1 98 26 AE 9E 13 24 6F 62 29 68 26 50 FE 78 DA 57 2D 6C E9 8C 64 DF D9 E5 45",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 98 54 F2 9A 0F 60 D6 E9   8B 12 5A E9 96 17 31 79  .T...`....Z...1y
#             0010: C9 F1 1B CF F8 B0 32 40   D6 4F B3 66 8A E9 21 6F  ......2@.O.f..!o
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.126 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9F CE 11 B8 FD D4 35 E9 73 9B D9 4A 30 19 DF 2E DA 11 88 98 50 DC 64 07 DF 93 0A 29 DE 85 A0 BE",
#   "session id"          : "23 87 D8 4C 05 66 A1 98 26 AE 9E 13 24 6F 62 29 68 26 50 FE 78 DA 57 2D 6C E9 8C 64 DF D9 E5 45",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C1 53 BA D3 7A 8B 79 6A   18 95 58 08 AD 44 FF 07  .S..z.yj..X..D..
#           0010: EB 52 48 53 EA 59 26 BC   DA B6 3F 00 9F 5E C6 54  .RHS.Y&...?..^.T
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.127 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.127 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.129 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.129 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.131 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.132 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.134 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.134 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.134 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.142 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.143 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.144 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.148 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.149 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.149 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.149 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.150 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.150 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.151 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.152 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.152 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.152 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.154 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.155 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.158 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 4D 49 EA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:35.000 UTC",
#       "not  after"         : "2024-01-14 24:24:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 69 6D 85 5A 0A 5C 51   67 D0 18 A2 27 CC 7B 26  ?im.Z.\Qg...'..&
#           0010: E6 12 51 CE                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.159 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:06.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:06.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:06.206 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 24:25:06.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.247 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D D2 A1 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 24:24:32.000 UTC",
#     "not  after"         : "2024-01-14 24:24:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#         0010: 8E 11 B3 45                                        ...E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#         0010: 74 48 6B 76                                        tHkv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.251 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C CF 9F B7 A4 8E 53 01   B1 96 AD 9C 47 3A 33 65  ,.....S.....G:3e
#     0010: CE 25 C4 36 EC 64 FA 93   22 D6 15 ED A5 8A 07 57  .%.6.d.."......W
#     0020: 0B 00 B1 09 13 1D BB 5F   49 A6 C0 9B D9 48 53 E6  ......._I....HS.
#     0030: A8 4E 6D CD 65 ED 3C 5B   A8 94 34 99 A6 EF 0E 08  .Nm.e.<[..4.....
#     0040: 76 4B 12 71 8A E9 5B 7B   5F 74 BB E8 BE D9 80 F7  vK.q..[._t......
#     0050: 4B 04 C5 FB BD AD 59 EE   20 84 9A 0E 62 5E 03 A5  K.....Y. ...b^..
#     0060: 6B BD CD 49 BD 1A AA EA   81 2A BB 83 F0 DC B0 E1  k..I.....*......
#     0070: 35 17 B9 5F 38 80 5D 75   2F 17 3A 98 F8 ED 45 BC  5.._8.]u/.:...E.
#     0080: 5B CE 82 D3 04 CB 9A 8D   4D F8 07 EF 2C F5 1E AA  [.......M...,...
#     0090: 16 FD E0 1D B1 B3 61 B2   4E 6A 2E 3B C5 F6 01 DC  ......a.Nj.;....
#     00A0: C0 05 8F CA F3 EC E4 F8   B2 AB 75 79 42 07 AD 29  ..........uyB..)
#     00B0: C5 08 EA 7B 0E F0 FC 44   D1 5B F7 B5 68 19 15 87  .......D.[..h...
#     00C0: E5 06 21 BE 67 67 36 AD   33 F0 BF AB C4 03 8C 2A  ..!.gg6.3......*
#     00D0: 58 83 41 C1 D1 B4 CF 95   0A FF 4C 92 AD 7C F2 A2  X.A.......L.....
#     00E0: C6 E6 15 DB 56 3A 3F 46   32 34 12 40 C4 A8 BE 88  ....V:?F24.@....
#     00F0: E3 7E 5B E2 5E F4 74 89   95 FD E9 50 EC F0 09 06  ..[.^.t....P....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.253 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 9D 23 0A 3A 56 85 65   44 FB D7 DD 3D 1B AA 28  a.#.:V.eD...=..(
#     0010: 14 04 9C 54 08 49 DE 07   51 F3 BD 4A C2 46 9E C6  ...T.I..Q..J.F..
#     0020: F0 6F 62 F7 0E E4 FF AD   96 6F 2D B4 0C 06 AC 20  .ob......o-....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.256 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:06.257 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.257 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:06.258 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.258 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-16 24:25:06.258 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:06.258 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.259 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.262 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 72 BE 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:39.000 UTC",
#       "not  after"         : "2024-01-14 24:24:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 D8 17 CD D8 3F 8C 3A   99 8E F9 CD F7 C7 FF 49  .....?.:.......I
#           0010: E5 DF DF 5E                                        ...^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D D2 A1 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:32.000 UTC",
#       "not  after"         : "2024-01-14 24:24:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#           0010: 8E 11 B3 45                                        ...E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.288 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E FD E9 96 97 31 3D C7   E7 4F 29 6E 9B 57 CA DB  .....1=..O)n.W..
#     0010: 5D 0D F9 D5 6F C0 19 67   F3 6F 54 D8 A9 63 32 E4  ]...o..g.oT..c2.
#     0020: DF 5B 3D 31 CF B4 E4 32   60 87 AE 99 EE 20 4A 1F  .[=1...2`.... J.
#     0030: 95 77 18 09 54 83 B6 4B   75 28 93 F5 A6 01 13 1E  .w..T..Ku(......
#     0040: 2A B4 B2 5D BB E2 E0 E9   74 FA C9 E6 D4 06 CC 28  *..]....t......(
#     0050: E0 58 FA 99 84 D0 67 FE   52 23 26 43 02 2F 76 9C  .X....g.R#&C./v.
#     0060: A9 E7 9A AF 35 C1 79 88   0E 6B C7 51 B4 DF 5C 8C  ....5.y..k.Q..\.
#     0070: 6D 86 53 34 05 64 EA 73   A9 A7 94 8C 6A 38 2F 75  m.S4.d.s....j8/u
#     0080: 13 96 A8 85 B1 2D BA B7   50 15 0A 0D DF 07 47 27  .....-..P.....G'
#     0090: 8E 37 E9 95 61 E9 99 FF   35 C8 A1 12 A7 32 2A 6F  .7..a...5....2*o
#     00A0: CE 59 78 8D BD 0E 89 77   DC 9D 02 E8 78 D4 7E 5C  .Yx....w....x..\
#     00B0: 78 9C B6 31 19 2D C0 EC   04 0D D0 E6 C2 AF 99 FE  x..1.-..........
#     00C0: 3F 19 AF D4 67 88 1B 12   CF 55 AC 7F BD 89 0A 96  ?...g....U......
#     00D0: 01 3D 1E A2 E3 CC 2E 24   14 16 03 46 7B 93 DA C6  .=.....$...F....
#     00E0: DB 5E 02 AE D6 6D 56 23   87 00 2E B8 4F 97 31 28  .^...mV#....O.1(
#     00F0: B7 77 77 3D B7 7E 73 7D   64 E7 45 EF 1C 70 D6 AD  .ww=..s.d.E..p..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.289 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4B 8C 84 EF 00 30 6F BF   1C 9D A0 E2 E6 3F 6A AD  K....0o......?j.
#     0010: 59 F8 7F 81 F4 D4 FF 31   02 B4 4D 7E E2 A6 C9 B1  Y......1..M.....
#     0020: 4C 6D DD 94 12 BE F3 3A   38 18 BB 5F 62 63 7E 89  Lm.....:8.._bc..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.290 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:06.348 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "37 C0 4D 89 E3 D0 88 47 3C 28 2C 89 A1 45 A4 C0 09 3B FF FC 77 D4 84 9C 3A F7 22 96 DC F9 AD E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 24:25:06.654 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 24:25:06.655 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 00:25:17.639; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:17.959 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 E0 26 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:30.000 UTC",
#       "not  after"         : "2024-01-14 24:24:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#           0010: 8E 11 B3 45                                        ...E
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D D2 A1 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 24:24:32.000 UTC",
#       "not  after"         : "2024-01-14 24:24:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 3B 43 E0 E0 C0 B0 CC   26 C1 58 2F C5 65 FA 12  .;C.....&.X/.e..
#           0010: 8E 11 B3 45                                        ...E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F8 83 87 17 8E 26 8E   E7 D8 8C A2 38 14 18 46  ......&.....8..F
#           0010: 74 48 6B 76                                        tHkv
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 24:25:17.974 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:18.203 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.204 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:18.205 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-16 24:25:18.205 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.210 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.222 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.222 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.222 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-16 24:25:18.224 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 C8 09 38 F9 D3 BE 73 F2 57 15 5F 1A AE A4 77 9C 08 21 CE 4D 09 A9 C5 76 72 F8 E5 DB F2 EF 46",
#     "session id"          : "A0 C6 C8 E7 D3 2B 64 B0 BE 79 75 1C 0A E4 22 C5 EC FE AC 6C 6F DA 16 BA FA C4 29 9E 8A A9 6A 84",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CA CA 84 DA 42 95 FE E6   A3 0B 09 3F B1 79 67 56  ....B......?.ygV
#               0010: 66 00 C5 AF E1 C7 B4 AC   9F FB 96 65 0F 0D 04 48  f..........e...H
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.243 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "71 A3 65 CD CA 49 C7 EE AC 5E F3 29 1F CD 61 FD 47 70 EB F0 27 06 6A D1 EE 4F DB 40 F6 64 7A 8D",
#     "session id"          : "A0 C6 C8 E7 D3 2B 64 B0 BE 79 75 1C 0A E4 22 C5 EC FE AC 6C 6F DA 16 BA FA C4 29 9E 8A A9 6A 84",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 43 50 23 95 96 DB 77 2B   DC 01 7D 02 35 32 9A A2  CP#...w+....52..
#             0010: 5E ED 44 62 AB 1B 51 97   50 D0 55 BF ED F3 15 26  ^.Db..Q.P.U....&
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.243 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.244 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.246 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.248 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.248 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.248 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.256 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.258 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.259 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.263 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.264 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:18.264 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-16 24:25:18.264 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-16 24:25:18.265 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",

[...truncated too long message...]

  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
  2>         at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
  2>         at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$344/0x0000000840470440.run(Unknown Source)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   71) Thread[id=1670, name=qtp175646856-1670, state=TIMED_WAITING, group=TGRP-TestPackages]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   72) Thread[id=1659, name=zkConnectionManagerCallback-1008-thread-1, state=WAITING, group=TGRP-TestPackages]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
  2>         at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   73) Thread[id=1655, name=NIOWorkerThread-3, state=WAITING, group=TGRP-TestPackages]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
  2>         at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   74) Thread[id=1682, name=qtp1487324927-1682, state=TIMED_WAITING, group=TGRP-TestPackages]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   75) Thread[id=1702, name=Session-HouseKeeper-3b0633f1-1, state=TIMED_WAITING, group=TGRP-TestPackages]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:1182)
  2>         at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:899)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
   >     java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
   >         at __randomizedtesting.SeedInfo.seed([AFE0F9653028D7B1]:0)
  2> NOTE: test params are: codec=Lucene95, sim=Asserting(RandomSimilarity(queryNorm=false): {}), locale=fa, timezone=GB
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=87,free=68637312,total=381681664
  2> NOTE: All tests run in this JVM: [TestCharFilters, ReplaceNodeTest, ShardSplitTest, TestHealthCheckHandlerLegacyMode, CustomHighlightComponentTest, TestPackages]
  2> NOTE: reproduce with: gradlew test --tests TestPackages -Dtests.seed=AFE0F9653028D7B1 -Dtests.locale=fa -Dtests.timezone=GB -Dtests.asserts=true -Dtests.file.encoding=UTF-8

:solr:core:test (FAILURE): 4897 test(s), 2 failure(s), 222 skipped

4897 tests completed, 2 failed, 222 skipped

> Task :solr:core:test FAILED
> Task :solr:core:wipeTaskTemp

ERROR: The following test(s) have failed:
  - org.apache.solr.pkg.TestPackages.testPluginLoading (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.pkg.TestPackages.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.pkg.TestPackages.testPluginLoading" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AFE0F9653028D7B1 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.pkg.TestPackages.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.pkg.TestPackages.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.pkg.TestPackages.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AFE0F9653028D7B1 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

BUILD FAILED in 2h 5m 14s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 2h5m41.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5678 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5678/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37105/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 22:12:10.158; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 22:12:10.164; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 22:12:11.213; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 22:12:11.253; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22227ms
ok 61 start solr with client truststore and security manager in 26007ms
not ok 62 start solr with mTLS needed in 59375ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PIJfn3/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37105.
#
# Started Solr server on port 37105 (pid=199915). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37106.
#
# Started Solr server on port 37106 (pid=200346). Happy searching!
#
# INFO  - 2023-10-15 22:13:34.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 22:13:34.461; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 22:13:34.839; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 22:13:34.843; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 22:13:34.843; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:34.877 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 E5 2D 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:10.000 UTC",
#     "not  after"         : "2024-01-13 22:13:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 CC 93 70 77 CD A8 95   C2 CD C7 10 A6 74 24 4D  ...pw........t$M
#         0010: 54 57 2A EF                                        TW*.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:34.882 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E2 23 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:02.000 UTC",
#     "not  after"         : "2024-01-13 22:13:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:34.897 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:35.218 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:35.218 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:35.218 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:35.219 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:35.391 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.391 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:35.393 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:35.393 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.412 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.412 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.412 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:35.415 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FE 3B 9A 14 67 69 7D 66 BF 72 65 87 C6 55 78 B6 28 98 61 B3 B0 E8 2B EA 6A 88 B7 85 1B 5F 76 9B",
#   "session id"          : "14 AE 7A 89 4E EB F8 9C B1 F3 96 F7 1A 2A B2 B3 C3 64 3C BE 9D 73 BB 91 93 7B FC E8 D7 C9 E4 A3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 52 25 93 1C 0B E3 9A 18   BD B1 42 CD 6D 20 14 69  R%........B.m .i
#             0010: 75 F7 87 C2 74 44 36 81   39 A4 79 10 F2 4D 6F 50  u...tD6.9.y..MoP
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.517 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "73 48 5B 24 D6 89 F8 5C C4 C7 95 B4 7B AE 27 C2 28 D9 14 25 05 1D C5 D3 A4 AA D7 68 3C BB 49 9C",
#   "session id"          : "14 AE 7A 89 4E EB F8 9C B1 F3 96 F7 1A 2A B2 B3 C3 64 3C BE 9D 73 BB 91 93 7B FC E8 D7 C9 E4 A3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4A 09 AD 12 66 AB 6C 1C   2B 2E 32 C0 2D F8 10 FD  J...f.l.+.2.-...
#           0010: 45 9B CD AD 63 5D C3 E3   EE B4 E9 4D 49 B7 D3 52  E...c].....MI..R
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.517 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.520 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.522 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.522 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.524 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.524 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.531 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.533 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.534 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.538 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.538 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.538 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.538 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.538 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.539 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.539 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.541 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.541 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.541 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.542 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.543 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.544 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.544 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.548 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 AB 5A F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:06.000 UTC",
#       "not  after"         : "2024-01-13 22:13:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 7A 08 58 60 99 DF 92   65 BF 28 51 D0 8D E5 33  .z.X`...e.(Q...3
#           0010: 52 E8 55 08                                        R.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.548 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.642 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.645 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9C E4 00 EE AE D7 D4 30   04 34 9D E9 3C 72 C5 04  .......0.4..<r..
#     0010: 5E 54 18 A5 9C 99 3B EC   56 8A 02 0C B6 9F 9A 5D  ^T....;.V......]
#     0020: 56 FA DD 7B 41 41 55 8E   38 C9 CB EB 4B 67 95 A0  V...AAU.8...Kg..
#     0030: 2C EA 4B 88 69 68 E1 6B   56 78 15 D5 99 EF 67 B8  ,.K.ih.kVx....g.
#     0040: F9 EF BB F7 1B 0E A1 36   94 28 0B 85 96 C2 7A C1  .......6.(....z.
#     0050: 02 EF 4D 8A 47 52 AD 84   F2 BF 9B 55 08 AE 64 D8  ..M.GR.....U..d.
#     0060: FD E0 A6 04 07 61 25 64   2B 15 55 4B 78 29 5E F8  .....a%d+.UKx)^.
#     0070: CE 68 F0 69 75 D0 3F CA   91 58 97 8A 05 8E 0A 78  .h.iu.?..X.....x
#     0080: 3E BF B1 45 2A 98 AD 07   CF 9D 9C A2 98 3E 34 01  >..E*........>4.
#     0090: 16 DC E1 57 16 ED 4F AC   F4 7D 27 D6 CC 01 15 C2  ...W..O...'.....
#     00A0: 6E 8A 21 7B EE 7B 5B 77   9A 10 B9 8B FE 44 1D 8D  n.!...[w.....D..
#     00B0: 1B D4 99 56 FB 29 3B FC   D2 DF 5A 12 8A EA 68 9E  ...V.);...Z...h.
#     00C0: 6D C0 1B 70 DE 22 86 0C   F6 F2 C2 C6 90 90 BB 27  m..p.".........'
#     00D0: 7D ED 0B 60 27 0F 1E 80   17 51 41 7E 1A 31 52 C9  ...`'....QA..1R.
#     00E0: FD 71 E2 C7 87 CB 22 E9   2E 25 FE 4F E1 1A B3 69  .q...."..%.O...i
#     00F0: 98 3C 69 1B EE 9E 80 CD   49 03 B6 E9 F4 F5 43 FC  .<i.....I.....C.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.647 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 CA 56 F9 A9 B9 F3 1F   FD E9 F2 B2 3A 65 A2 1A  R.V.........:e..
#     0010: 63 80 35 B3 9F 81 C9 37   1E 1C 8B 90 7C 3B D5 5E  c.5....7.....;.^
#     0020: 31 FC 8A CA EC 85 5F FF   55 CE 6F 9A C0 D2 51 17  1....._.U.o...Q.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.650 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:35.651 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.651 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:35.651 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.651 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:35.652 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:35.652 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.653 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.656 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 E5 2D 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:10.000 UTC",
#       "not  after"         : "2024-01-13 22:13:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 CC 93 70 77 CD A8 95   C2 CD C7 10 A6 74 24 4D  ...pw........t$M
#           0010: 54 57 2A EF                                        TW*.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 42 C2 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:04.000 UTC",
#       "not  after"         : "2024-01-13 22:13:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#           0010: 18 56 63 77                                        .Vcw
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.684 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 49 AD E3 48 D6 A2 7F   FC 77 67 26 18 AD 98 24  fI..H....wg&...$
#     0010: 1D 60 56 39 2F 21 45 70   67 C2 DA 7B 04 8C 2A 28  .`V9/!Epg.....*(
#     0020: 3D 7D A1 AB C0 F6 97 48   9B A2 EC 3B 67 AC 4B B5  =......H...;g.K.
#     0030: 1E 78 81 DF 11 E7 18 66   30 3C 25 8C E9 C3 30 57  .x.....f0<%...0W
#     0040: 36 55 B0 47 98 E8 75 1E   01 B7 31 10 92 AE 02 36  6U.G..u...1....6
#     0050: 9A 04 24 F8 9F 3C B2 C0   91 16 70 1E C0 54 BB 79  ..$..<....p..T.y
#     0060: 8B 3B 4F C0 1F BB 47 99   DC 35 2E 0E 0D 40 C0 2F  .;O...G..5...@./
#     0070: D1 3D 0A 8B A0 9F DE 3C   8C D0 71 CF B7 70 FC 6A  .=.....<..q..p.j
#     0080: 46 E5 12 5B 64 52 A9 88   DC 6C 45 A3 F9 48 F4 4C  F..[dR...lE..H.L
#     0090: 51 E0 E3 D0 49 E2 A7 CC   ED F6 94 C2 EC BE 84 F4  Q...I...........
#     00A0: 2C 4D D4 CF 5C 42 D1 2A   EC A3 34 AE AA 79 C0 10  ,M..\B.*..4..y..
#     00B0: 4A 50 24 42 3F E0 6C A7   29 2C FB FC 55 96 D6 72  JP$B?.l.),..U..r
#     00C0: EA 5B F7 14 47 4E 96 94   68 44 97 4D 83 3B 23 37  .[..GN..hD.M.;#7
#     00D0: 65 71 1F 85 ED 78 BF 10   79 B8 4C A0 36 A5 98 C1  eq...x..y.L.6...
#     00E0: 61 6C 41 36 FD AD CE 3D   2A F7 CB B5 E4 4D 74 50  alA6...=*....MtP
#     00F0: D2 FE 59 CC 2B 25 E0 0E   C2 A9 95 3A F6 A9 73 32  ..Y.+%.....:..s2
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.685 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FD 9D 5A 5F A9 99 02 8B   BE 8A C9 F3 8F 81 6D 8D  ..Z_..........m.
#     0010: 4F 16 7B 31 C5 5A 5B 83   12 05 18 DB 46 B0 2A 04  O..1.Z[.....F.*.
#     0020: 7C 70 F0 EC F7 1D E1 D3   0A F4 CB C7 AB C8 97 03  .p..............
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.686 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:35.748 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9B 48 53 07 2E 28 CA 98 93 32 07 1E 45 75 FA F9 A1 B6 CD 74 72 95 3E 48 E3 5B 9E 5B 92 38 B9 15",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 22:13:36.024 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 22:13:36.025 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 22:13:36.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 22:13:36.992; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 22:13:37.633; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 22:13:37.637; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 22:13:37.637; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PIJfn3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:37.669 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 E5 2D 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:10.000 UTC",
#     "not  after"         : "2024-01-13 22:13:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 CC 93 70 77 CD A8 95   C2 CD C7 10 A6 74 24 4D  ...pw........t$M
#         0010: 54 57 2A EF                                        TW*.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:37.674 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E2 23 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:02.000 UTC",
#     "not  after"         : "2024-01-13 22:13:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:37.688 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:37.888 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.889 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:37.891 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:37.891 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.897 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.908 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.909 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.909 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:37.911 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E0 72 A3 16 7B 0D C9 DF F3 30 FD E5 83 3B 5E 15 8F D4 5C B6 6B BB 0F 76 00 51 D8 C4 CE 25 83 C0",
#   "session id"          : "62 52 3E 62 F5 32 1A 2E 81 17 06 9E 03 94 2D CF 3B BD CB 65 64 ED A2 2C FE 79 8E 2A E9 F9 54 3B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 47 E0 EE 6C 51 DD 5F 1D   A6 D0 19 68 19 F7 B1 D1  G..lQ._....h....
#             0010: BC 67 D1 F8 54 CE C3 DF   B9 82 99 F1 5B AC 34 26  .g..T.......[.4&
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.012 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CE 99 16 36 EB 60 8B 4A 82 F8 10 2F 34 F1 67 15 1D F3 53 CD 01 CC BD B4 83 41 84 EE 88 F4 10 9B",
#   "session id"          : "62 52 3E 62 F5 32 1A 2E 81 17 06 9E 03 94 2D CF 3B BD CB 65 64 ED A2 2C FE 79 8E 2A E9 F9 54 3B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E2 50 71 B3 6A 75 59 65   DB AD 04 45 07 81 50 E1  .Pq.juYe...E..P.
#           0010: EA 3A 66 72 C9 51 29 4E   FC 64 53 15 D6 4E C2 63  .:fr.Q)N.dS..N.c
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.013 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.013 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.015 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.018 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.018 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.020 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.027 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.028 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.029 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.033 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.033 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.033 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.034 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.036 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.036 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.036 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.037 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.037 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.038 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.038 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.041 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 AB 5A F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:06.000 UTC",
#       "not  after"         : "2024-01-13 22:13:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 7A 08 58 60 99 DF 92   65 BF 28 51 D0 8D E5 33  .z.X`...e.(Q...3
#           0010: 52 E8 55 08                                        R.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.041 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:38.087 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:38.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:38.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:13:38.089 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.133 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 42 C2 C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 22:13:04.000 UTC",
#     "not  after"         : "2024-01-13 22:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#         0010: 18 56 63 77                                        .Vcw
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#         0010: 6E F1 91 DC                                        n...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.136 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 43 1E 69 B0 57 39 DD   E2 15 07 AA 86 00 83 F9  @C.i.W9.........
#     0010: 79 F9 EB 06 60 B3 AF E2   C7 5E 7B FD 6A D8 16 64  y...`....^..j..d
#     0020: 42 64 F1 ED CF 30 6F CB   37 AC 60 DD 1D 8C 42 22  Bd...0o.7.`...B"
#     0030: 3B 60 74 27 EA 5B 70 1C   B4 67 C0 67 41 0D 0C 84  ;`t'.[p..g.gA...
#     0040: 7B C0 30 FA 25 E2 04 58   5C 27 A6 CE 11 94 C9 8A  ..0.%..X\'......
#     0050: 7D 7E BD DA B7 18 A8 B2   DC 88 1B EB A0 BE C4 D0  ................
#     0060: 96 C6 D9 FB A3 4F 54 CD   76 C0 A1 F8 E4 9B FA 92  .....OT.v.......
#     0070: 6C B4 36 AE 94 45 ED 2C   C4 5F 5D 2D 0F B3 D9 2E  l.6..E.,._]-....
#     0080: 67 47 E7 02 D6 EC AF 39   31 F5 83 8E C9 02 70 CA  gG.....91.....p.
#     0090: C3 AD EF DA 10 A7 22 D9   00 CD 73 D6 44 34 11 61  ......"...s.D4.a
#     00A0: 23 70 6A 85 BB 01 1A AC   44 6E 4E D9 95 A5 10 9E  #pj.....DnN.....
#     00B0: 0C CE 0A 74 7D 8C 4F 9A   07 30 93 6B 5F 27 39 5C  ...t..O..0.k_'9\
#     00C0: 74 23 46 09 6A 16 56 9E   65 FE 44 87 12 0F 6F 4A  t#F.j.V.e.D...oJ
#     00D0: C6 8D FF 4D 49 9D AD E2   B3 3D DC 3D 63 54 4F F5  ...MI....=.=cTO.
#     00E0: 5A 31 1D DE 95 49 73 46   64 FE E5 41 F8 B0 1E 0C  Z1...IsFd..A....
#     00F0: E4 A2 A6 2B B8 ED 85 FA   D8 CA 29 6C 80 B7 2E 39  ...+......)l...9
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.138 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C 93 9B F9 C7 4C AE B7   02 64 F0 3C 25 F0 B1 1C  l....L...d.<%...
#     0010: 11 5F 05 BB 28 21 28 D9   B5 E2 8F 6E B3 4F 54 05  ._..(!(....n.OT.
#     0020: 37 AA 98 A3 F7 6B 29 51   22 08 4E C0 B0 0F 7C FF  7....k)Q".N.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.141 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:38.141 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.142 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:38.142 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.142 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 22:13:38.142 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:38.143 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.143 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.145 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 E5 2D 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:10.000 UTC",
#       "not  after"         : "2024-01-13 22:13:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 CC 93 70 77 CD A8 95   C2 CD C7 10 A6 74 24 4D  ...pw........t$M
#           0010: 54 57 2A EF                                        TW*.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 42 C2 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:04.000 UTC",
#       "not  after"         : "2024-01-13 22:13:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#           0010: 18 56 63 77                                        .Vcw
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.170 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 FB 7F 32 7C A9 EE 03   7A 80 6C E6 85 0A B3 F1  7..2....z.l.....
#     0010: 28 F4 7E C8 95 73 6B F8   C8 23 A0 88 0B E1 22 07  (....sk..#....".
#     0020: 63 3A 8C C1 F0 A5 1C 60   39 EF 2F 90 22 5F 57 08  c:.....`9./."_W.
#     0030: 9F 56 11 92 3B 67 E3 88   08 20 CE 10 2F 62 83 B3  .V..;g... ../b..
#     0040: EA 45 22 63 BE 02 D8 DF   97 1F 7C 60 1A 7D E3 95  .E"c.......`....
#     0050: 7D 9A A1 2E F7 BE F3 80   31 9F 3A 2F A6 F0 03 ED  ........1.:/....
#     0060: 40 B8 37 83 84 C2 76 47   3C 07 AD 97 53 EC 35 CA  @.7...vG<...S.5.
#     0070: E2 9D 24 62 39 CA 77 16   38 2A 81 D4 77 21 E4 60  ..$b9.w.8*..w!.`
#     0080: 10 5D D5 A0 24 90 FB D1   87 B4 B3 89 92 32 BA B3  .]..$........2..
#     0090: 98 F6 A2 CB D0 79 4D 74   0F 4A F7 12 DF 5F 54 27  .....yMt.J..._T'
#     00A0: 0B 6D 19 96 37 98 38 7B   F4 42 8F 01 F9 3E 71 D7  .m..7.8..B...>q.
#     00B0: F9 EE 01 64 8F D1 0E 24   63 EE 05 9C 40 F3 57 60  ...d...$c...@.W`
#     00C0: A6 AD 7A 8D 54 E6 E7 A9   ED 1E F1 3B 83 E0 72 EE  ..z.T......;..r.
#     00D0: E5 25 17 69 BD 40 63 14   AD B0 48 7E 00 57 47 52  .%.i.@c...H..WGR
#     00E0: 8E 1C C9 14 D2 59 16 C7   73 8F 73 91 AC 7F 7C AD  .....Y..s.s.....
#     00F0: ED 3B 60 09 31 95 92 D8   FD F5 05 04 2E D0 F9 43  .;`.1..........C
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.171 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DE 81 BF 65 2B 5A A0 F2   AA 18 AF F0 7D 6E C1 9B  ...e+Z.......n..
#     0010: 8E 90 03 A2 E6 5D 5E D0   86 33 F6 86 4C A4 16 41  .....]^..3..L..A
#     0020: AF 92 36 10 F1 51 E7 84   87 C5 F6 9A CF 2C E8 9F  ..6..Q.......,..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.171 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:38.227 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B0 2B 78 7A B4 E8 EE 15 EB 21 0F FD B2 47 D8 CD B9 D7 2D 78 B4 56 AD 7A 7A 49 F2 A9 8B 76 44 00",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 22:13:38.510 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 22:13:38.511 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 22:13:49.841; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:50.153 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E2 23 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:02.000 UTC",
#       "not  after"         : "2024-01-13 22:13:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#           0010: 18 56 63 77                                        .Vcw
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 42 C2 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 22:13:04.000 UTC",
#       "not  after"         : "2024-01-13 22:13:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 2F EB C9 9F 30 FB F6   A4 40 BB 5D 3E 1F 2D E6  o/...0...@.]>.-.
#           0010: 18 56 63 77                                        .Vcw
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 2B 3D 49 62 62 4E 1F   E3 9C 3F 9D CF 56 2C 7B  "+=IbbN...?..V,.
#           0010: 6E F1 91 DC                                        n...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 22:13:50.168 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:50.399 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:50.401 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 22:13:50.401 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.418 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.418 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 22:13:50.421 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B6 4E BF 9D 97 4B 58 3E 1E A8 20 A3 B5 44 0C 13 29 E8 C9 5F A4 A9 5A 85 E5 D9 A6 35 94 6B 4E 31",
#     "session id"          : "0B 80 D0 35 CF 4A 74 3D 69 9A D6 D5 77 0D 95 CB 0E B2 F2 64 0D 15 CA 4B 8E 0C E3 B3 F6 E2 98 DE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5F 3E 5A DF 33 4A 3E 65   52 F5 5F B1 62 6C E6 0C  _>Z.3J>eR._.bl..
#               0010: 36 39 05 FC 6C F9 C8 F7   FD BE E3 4D 06 20 A1 0A  69..l......M. ..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.441 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "9D DD FB CD 97 7F 02 83 EB 0F A6 4D 34 2E 85 B4 6B 9A D1 6A 01 BC 8C 7D 10 76 AD 3B D9 44 EA 76",
#     "session id"          : "0B 80 D0 35 CF 4A 74 3D 69 9A D6 D5 77 0D 95 CB 0E B2 F2 64 0D 15 CA 4B 8E 0C E3 B3 F6 E2 98 DE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 4F 2C AB 60 2E 74 B3   F5 52 7F 9A 6C 8A 10 D9  7O,.`.t..R..l...
#             0010: DB EC 03 5F D5 55 10 86   32 C6 FB 88 89 E4 78 0E  ..._.U..2.....x.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.441 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.441 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.442 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.442 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.443 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.445 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.445 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.453 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.455 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.456 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.461 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.461 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.461 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.461 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.462 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:50.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:13:50.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 22:13:50.463 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsa

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 22:15:12.415 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:15:12.466 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:15:12.466 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:15:12.467 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 22:15:12.467 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37106/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28409ms
ok 65 stop command for single port in 31074ms
ok 66 status detects locally running solr in 14695ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2162ms
ok 69 copying files around in 6582ms
ok 70 upconfig in 2640ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 32s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m0s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5677 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5677/

1 tests failed.
FAILED:  org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample

Error Message:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36863/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr

Starting up Solr on port 36863 using command:
"/tmp/src/solr/solr/bin/solr" start -cloud -p 36863 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr"



Stack Trace:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36863/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr

Starting up Solr on port 36863 using command:
"/tmp/src/solr/solr/bin/solr" start -cloud -p 36863 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr"


	at __randomizedtesting.SeedInfo.seed([9B14CA538F1CC934:40652A99B8690C52]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1285 lines...]
  2> ERROR: java.lang.Exception: Error starting up MiniSolrCloudCluster
  2> 
  2> 7136 INFO  (TEST-TestSolrCLIRunExample.testInteractiveSolrCloudExample-seed#[9B14CA538F1CC934]) [] o.a.s.SolrTestCaseJ4 ###Ending testInteractiveSolrCloudExample
   >     java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36863/solr; tool output: 
   >     Welcome to the SolrCloud example!
   > 
   >     This interactive session will help you launch a SolrCloud cluster on your local workstation.
   >     To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
   >     Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
   >     Please enter the port for node1 [8983]: 
   >     Creating Solr home directory /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr
   > 
   >     Starting up Solr on port 36863 using command:
   >     "/tmp/src/solr/solr/bin/solr" start -cloud -p 36863 -s "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-001/cloud/node1/solr"
   >         at __randomizedtesting.SeedInfo.seed([9B14CA538F1CC934:40652A99B8690C52]:0)
   >         at org.junit.Assert.fail(Assert.java:89)
   >         at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
   >         at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   >         at java.base/java.lang.reflect.Method.invoke(Method.java:566)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
   >         at java.base/java.lang.Thread.run(Thread.java:829)
  2> NOTE: reproduce with: gradlew test --tests TestSolrCLIRunExample.testInteractiveSolrCloudExample -Dtests.seed=9B14CA538F1CC934 -Dtests.locale=ar-JO -Dtests.timezone=Europe/Amsterdam -Dtests.asserts=true -Dtests.file.encoding=UTF-8
  2> 7242 INFO  (TEST-TestSolrCLIRunExample.testFailExecuteScript-seed#[9B14CA538F1CC934]) [] o.a.s.SolrTestCaseJ4 ###Starting testFailExecuteScript
  2> 
  2> ERROR: access denied ("java.io.FilePermission" "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001/tempDir-003/failExecuteScript" "execute")
  2> 
  2> 7264 INFO  (TEST-TestSolrCLIRunExample.testFailExecuteScript-seed#[9B14CA538F1CC934]) [] o.a.s.SolrTestCaseJ4 ###Ending testFailExecuteScript
  2> 7276 INFO  (SUITE-TestSolrCLIRunExample-seed#[9B14CA538F1CC934]-worker) [] o.a.s.u.ErrorLogMuter Closing ErrorLogMuter-regex-1 after mutting 0 log messages
  2> 7277 INFO  (SUITE-TestSolrCLIRunExample-seed#[9B14CA538F1CC934]-worker) [] o.a.s.u.ErrorLogMuter Creating ErrorLogMuter-regex-2 for ERROR logs matching regex: ignore_exception
  2> NOTE: leaving temporary files on disk at: /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_9B14CA538F1CC934-001
  2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{}, maxPointsInLeafNode=1265, maxMBSortInHeap=6.073669565460505, sim=Asserting(RandomSimilarity(queryNorm=true): {}), locale=ar-JO, timezone=Europe/Amsterdam
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=1,free=227394232,total=324534272
  2> NOTE: All tests run in this JVM: [TestSolrCLIRunExample]

WARNING: Test org.apache.solr.TestRandomFaceting wrote 12,017,127 bytes of output.

> Task :solr:modules:hdfs:test
:solr:modules:hdfs:test (SUCCESS): 103 test(s), 45 skipped

> Task :solr:modules:hdfs:wipeTaskTemp
> Task :solr:modules:hdfs:check
> Task :solr:modules:hdfs:assemblePackaging
> Task :solr:packaging:installFullDist

> Task :solr:packaging:integrationTests
Running BATS tests with Solr base port 39907
1..73
ok 1 auth rejects blockUnknown option with invalid boolean in 3476ms

> Task :solr:core:test
WARNING: Test org.apache.solr.search.facet.TestCloudJSONFacetSKGEquiv wrote 15,221,401 bytes of output.
WARNING: Test org.apache.solr.schema.TestCloudSchemaless wrote 13,520,760 bytes of output.
WARNING: Test org.apache.solr.update.TestInPlaceUpdatesStandalone wrote 11,151,920 bytes of output.

> Task :solr:packaging:integrationTests
ok 2 auth rejects updateIncludeFileOnly option with invalid boolean in 3352ms
ok 3 nothing in 11ms
ok 4 create for non cloud mode in 16052ms
ok 5 create for cloud mode in 16778ms
ok 6 create collection in 7843ms
ok 7 reject d option with invalid config dir in 1242ms
ok 8 accept d option with builtin config in 6159ms

> Task :solr:core:test
:solr:core:test (FAILURE): 4897 test(s), 1 failure(s), 215 skipped

4897 tests completed, 1 failed, 215 skipped

> Task :solr:core:test FAILED
> Task :solr:core:wipeTaskTemp

> Task :solr:packaging:integrationTests
ok 9 accept d option with explicit path to config in 6199ms
ok 10 accept n option as config name in 6312ms
ok 11 allow config reuse when n option specifies same config in 11051ms
ok 12 create multisharded collections when s provided in 6326ms
ok 13 create replicated collections when rf provided in 6868ms
ok 14 can delete collections in 9576ms
ok 15 collection delete also deletes zk config in 7900ms
ok 16 deletes accompanying zk config with nondefault name in 8013ms
ok 17 deleteConfig option can opt to leave config in zk in 8203ms
ok 18 SOLR-16755 test works with noprompt in 34291ms
ok 19 Check export command in 28881ms
ok 20 export fails on non cloud mode in 17399ms
ok 21 using curl to extract a single pdf file in 24032ms
ok 22 using the bin/solr post tool to extract content from pdf in 24195ms
ok 23 using the bin/solr post tool to crawl web site in 25842ms
ok 24 healthcheck on cloud solr in 36372ms
ok 25 start help flag prints help in 154ms
ok 26 stop help flag prints help in 143ms
ok 27 restart help flag prints help in 155ms
ok 28 status help flag prints help in 49ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 145ms
ok 30 create help flag prints help in 142ms
ok 31 createcore help flag prints help in 143ms
ok 32 createcollection help flag prints help in 144ms
ok 33 delete help flag prints help in 142ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 149ms
ok 36 auth help flag prints help in 145ms
ok 37 assert help flag prints help in 986ms
ok 38 post help flag prints help in 988ms
ok 39 SQL Module in 24527ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26133ms
ok 41 icu collation in analysis-extras module in 20004ms
ok 42 package detects no running solr in 229ms
ok 43 lifecycle of package in 16808ms
ok 44 deploying and undeploying a collection level package in 19990ms
ok 45 Affinity placement plugin using sysprop in 22391ms
ok 46 Random placement plugin using ENV in 22727ms
ok 47 Check help command in 2884ms
ok 48 basic post with a type specified in 5733ms
ok 49 basic post WITHOUT a type specified in 12370ms
ok 50 crawling a directory in 4559ms
ok 51 crawling a web site in 5806ms
ok 52 commit and optimize and delete in 4338ms
ok 53 args mode in 6872ms
ok 54 stdin mode in 3494ms
ok 55 post solr log into solr via script in 9352ms
ok 56 post solr log into solr via cli in 7417ms
ok 57 allowPaths - backup in 23525ms
ok 58 start solr with ssl in 25133ms
not ok 59 use different hostname when not checking peer-name in 26918ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39907.
#
# Started Solr server on port 39907 (pid=193530). Happy searching!
#
# INFO  - 2023-10-15 18:39:49.331; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 18:39:49.336; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 18:39:49.680; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@436bc36(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@576f63f6[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 18:39:49.760; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@576f63f6[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 18:39:49.760; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@576f63f6[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-15 18:39:59.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 18:39:59.025; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-15 18:39:59.378; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39907/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 18:40:00.892; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 18:40:00.897; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 18:40:01.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 18:40:01.858; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22716ms
ok 61 start solr with client truststore and security manager in 25342ms
not ok 62 start solr with mTLS needed in 57185ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-zuGty1/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39907.
#
# Started Solr server on port 39907 (pid=198422). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39908.
#
# Started Solr server on port 39908 (pid=198871). Happy searching!
#
# INFO  - 2023-10-15 18:41:25.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 18:41:25.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 18:41:25.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 18:41:25.433; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 18:41:25.434; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:25.465 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 65 E3 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:41:01.000 UTC",
#     "not  after"         : "2024-01-13 18:41:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D6 5F 7D 26 4C 87 57   48 98 07 BF A3 B9 DD ED  .._.&L.WH.......
#         0010: 0E D2 85 DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:25.470 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 5B 80 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:53.000 UTC",
#     "not  after"         : "2024-01-13 18:40:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:25.484 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:25.708 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:25.710 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:25.710 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.728 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.728 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.728 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:25.730 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 F7 5D 20 86 CE 72 43 3F 29 5B 91 BD 90 0A BD A2 AB AF A7 D3 46 93 C3 66 56 83 79 57 4E CC F6",
#   "session id"          : "0E 22 35 25 C9 1D DB 81 29 57 89 20 85 60 72 98 97 2B 46 FA 78 6D 95 37 69 99 78 36 2F 2D DE A7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9B BF 9C C5 1D 43 89 4F   9E 33 1A BA 7D 05 1C 4A  .....C.O.3.....J
#             0010: 03 7B 26 F6 E2 0B 34 04   2C CE 07 21 66 AB CD 16  ..&...4.,..!f...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.836 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "76 12 E3 2A B8 A7 A6 85 EC AD 4F D4 DC 18 61 A1 EE 94 5C 7F 48 88 B9 CA 0A 67 1C 17 EA AF 59 61",
#   "session id"          : "0E 22 35 25 C9 1D DB 81 29 57 89 20 85 60 72 98 97 2B 46 FA 78 6D 95 37 69 99 78 36 2F 2D DE A7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3B D3 32 C6 9E 88 92 21   6F F2 31 BE 53 8D AF 0B  ;.2....!o.1.S...
#           0010: BA D2 60 0C 12 14 9E 78   65 51 BA 33 A8 1E 33 52  ..`....xeQ.3..3R
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.836 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.836 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.837 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.838 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.839 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.841 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.841 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.842 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.850 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.852 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.853 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.856 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.856 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.859 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.859 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.859 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.860 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.860 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.861 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.864 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 69 13 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 18:40:57.000 UTC",
#       "not  after"         : "2024-01-13 18:40:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#           0010: 1D D4 1D AC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 92 07 1D F0 EF D9 30   74 B8 D0 EB 0C B5 1D 50  g......0t......P
#           0010: CE 37 6D C7                                        .7m.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.864 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:25.906 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:25.908 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:25.908 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:25.908 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.944 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.948 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7F 9C 6A E4 65 EA 18 8D   4C 7C 22 8C 69 D5 79 24  ..j.e...L.".i.y$
#     0010: 3A 3B F7 41 8F F0 AF 11   36 D6 9A 3C FF 49 4F 2A  :;.A....6..<.IO*
#     0020: 95 01 C7 6D 36 E1 55 B5   7E CE 05 BF 69 BD 4B 4A  ...m6.U.....i.KJ
#     0030: DB CD A5 14 47 41 43 E7   F1 C5 7C 7E 06 31 C1 E3  ....GAC......1..
#     0040: 9C A7 1F EE 8F 10 42 10   0E AE A9 D6 E1 5E F6 59  ......B......^.Y
#     0050: 96 17 80 92 20 98 3F 9F   50 59 11 ED 2D 11 AF F9  .... .?.PY..-...
#     0060: E9 96 EE 67 B2 E3 AD 3F   CF 2F AD F4 8C 14 21 BA  ...g...?./....!.
#     0070: D7 F7 E9 9F 7F 39 30 67   4D 2B 77 D9 A4 2A 4B C2  .....90gM+w..*K.
#     0080: 78 D5 EA 70 44 27 92 E7   78 79 19 3B 7F 53 40 AC  x..pD'..xy.;.S@.
#     0090: CB 9D 24 74 BA F9 FC CA   A5 9E 3D DA F7 5C A2 90  ..$t......=..\..
#     00A0: 10 A0 A5 ED 4F 0C 80 44   95 59 ED 05 D8 D8 87 E7  ....O..D.Y......
#     00B0: 68 BF 95 DB 88 EE 2B 35   E3 32 14 FA F5 15 34 8E  h.....+5.2....4.
#     00C0: 80 FF 02 D0 70 18 F9 31   03 2C CB 44 D6 3F 4D 7E  ....p..1.,.D.?M.
#     00D0: 35 2F D4 CA 0A BC 2F F7   4F A0 4D 17 13 84 0F 31  5/..../.O.M....1
#     00E0: 89 AC D7 2C 09 4F EE A8   14 F9 76 FD E2 12 A2 30  ...,.O....v....0
#     00F0: C5 47 E9 48 4E 24 19 88   A4 DF 31 0E D3 C3 D1 C3  .G.HN$....1.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.950 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C 73 57 06 66 77 1E FF   9F 3E 1E 82 4F B6 85 9E  lsW.fw...>..O...
#     0010: B4 11 C3 57 E4 CF 75 D3   5A 86 9B 74 1C 92 F7 B2  ...W..u.Z..t....
#     0020: 75 B7 0E D6 BB D5 39 1A   E5 76 1E 6C 9B E3 49 8E  u.....9..v.l..I.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.952 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:25.953 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.953 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:25.954 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.954 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:25.954 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:25.954 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.955 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.957 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 65 E3 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 18:41:01.000 UTC",
#       "not  after"         : "2024-01-13 18:41:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#           0010: 1D D4 1D AC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 D6 5F 7D 26 4C 87 57   48 98 07 BF A3 B9 DD ED  .._.&L.WH.......
#           0010: 0E D2 85 DD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 8B 2F BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 18:40:54.000 UTC",
#       "not  after"         : "2024-01-13 18:40:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#           0010: 65 87 51 BF                                        e.Q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#           0010: 1D D4 1D AC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.983 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 40 FB C1 DC F0 5B EA   A8 AD 42 8B A6 96 09 D9  p@....[...B.....
#     0010: 8D CF 6E 97 BC EC 07 49   16 BC 0A 85 86 E1 F1 D2  ..n....I........
#     0020: D8 CC FF 69 74 77 4A 10   3E 84 BF 65 C4 A2 0F 5D  ...itwJ.>..e...]
#     0030: 19 23 4A 73 2F 21 C1 FA   80 D1 FD 76 28 D7 27 8D  .#Js/!.....v(.'.
#     0040: D3 CA CA 44 66 E9 C4 D1   3B 2E 77 13 3E 13 08 50  ...Df...;.w.>..P
#     0050: DC EA B5 FE 32 14 3B C0   32 AD 5A 96 D6 43 2E 5F  ....2.;.2.Z..C._
#     0060: 25 60 E3 4C BE 03 00 BB   70 1E B6 78 80 41 77 CA  %`.L....p..x.Aw.
#     0070: B3 D5 45 B4 41 91 53 5C   4C 1B E2 F9 67 84 36 DB  ..E.A.S\L...g.6.
#     0080: 38 30 F0 A8 6A 78 66 85   21 28 0E 91 5B A0 1B 3C  80..jxf.!(..[..<
#     0090: 22 EB 31 9D A1 28 68 62   73 86 65 A9 57 F7 7B AE  ".1..(hbs.e.W...
#     00A0: 41 1C EB 64 CE 37 4A 4B   C0 0B 2F 29 DB FF 15 C9  A..d.7JK../)....
#     00B0: 80 BD 80 04 8C F9 78 DD   D1 FC 2E FE 1D 6B 4B 83  ......x......kK.
#     00C0: C3 56 1E DD EA 20 EF 59   FC 65 60 14 BC 5C 1E F2  .V... .Y.e`..\..
#     00D0: C8 27 AB DA 3B 4C 9E BC   D1 06 CB 49 62 6A 86 51  .'..;L.....Ibj.Q
#     00E0: B2 62 56 D7 34 3A 4B C1   3D C5 A2 12 1B 27 C2 D7  .bV.4:K.=....'..
#     00F0: 85 F3 41 B7 95 64 C7 96   F9 C8 4D 53 EC 47 2B 68  ..A..d....MS.G+h
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.984 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9A 02 4C 18 C9 BB 9A 80   E3 0E 83 CE E3 3C 33 ED  ..L..........<3.
#     0010: 3A D6 3D 5F 19 49 AD B8   FE 43 C3 4E 60 E7 C3 82  :.=_.I...C.N`...
#     0020: 22 19 4F 68 95 5C 6D 85   2A 8C 29 EE 5C E5 E5 76  ".Oh.\m.*.).\..v
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:25.985 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:26.041 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "11 E8 71 7F 92 23 86 AE BB D4 05 AC 74 BA 51 80 3D 26 A8 C1 79 2C A8 BC 79 59 C6 D7 E5 FC FB 82",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 18:41:26.331 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 18:41:26.332 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 18:41:27.259; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 18:41:27.264; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 18:41:27.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 18:41:27.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 18:41:27.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zuGty1/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:27.695 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 65 E3 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:41:01.000 UTC",
#     "not  after"         : "2024-01-13 18:41:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D6 5F 7D 26 4C 87 57   48 98 07 BF A3 B9 DD ED  .._.&L.WH.......
#         0010: 0E D2 85 DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:27.699 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 5B 80 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:53.000 UTC",
#     "not  after"         : "2024-01-13 18:40:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 18:41:27.713 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:27.941 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.942 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:27.944 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 18:41:27.944 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.950 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.961 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 18:41:27.963 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EA 49 A4 F7 7D 66 04 74 DB 81 DB 96 1A 17 58 AB 09 55 F0 1A 3F 4E D3 97 B9 93 DA E5 92 3D C4 5B",
#   "session id"          : "69 77 98 9B 5F 37 52 C4 E7 C5 60 12 72 AB 99 25 0E B1 25 FF 2D 24 2D 53 B1 E9 D9 8F 09 FB A0 0B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1C 56 D8 32 20 F6 9B B9   08 6A 04 9F 71 3D 00 A0  .V.2 ....j..q=..
#             0010: DD E8 91 DE 07 EA 61 21   CE 39 94 4C 9A 44 A6 24  ......a!.9.L.D.$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.063 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "42 1D 24 1B 0F 73 D8 20 20 E2 1F 35 3A 10 16 D2 69 98 F7 11 6C 8E 4E D6 C3 C9 13 35 BB 9E E9 BD",
#   "session id"          : "69 77 98 9B 5F 37 52 C4 E7 C5 60 12 72 AB 99 25 0E B1 25 FF 2D 24 2D 53 B1 E9 D9 8F 09 FB A0 0B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 7C AE AA BD E4 34 C5   A6 6D 15 35 5F 22 7B 61  `.....4..m.5_".a
#           0010: 50 08 E3 D1 F8 3A B6 91   15 A4 B6 7A 5E 9F 2A 41  P....:.....z^.*A
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.064 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.064 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.069 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.069 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.080 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.081 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.084 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.085 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.087 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.087 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.088 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.088 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.089 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.090 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.093 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 69 13 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 18:40:57.000 UTC",
#       "not  after"         : "2024-01-13 18:40:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#           0010: 1D D4 1D AC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 92 07 1D F0 EF D9 30   74 B8 D0 EB 0C B5 1D 50  g......0t......P
#           0010: CE 37 6D C7                                        .7m.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.093 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:28.143 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:28.144 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:28.145 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:41:28.145 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.180 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 8B 2F BA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 18:40:54.000 UTC",
#     "not  after"         : "2024-01-13 18:40:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 29 05 A0 7C F0 42 9E   9E CA 4A 14 F2 9F 8A F0  9)....B...J.....
#         0010: 65 87 51 BF                                        e.Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#         0010: 1D D4 1D AC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.184 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 84 C3 55 CF 55 25 FE   69 3D 71 F1 34 AF D6 BD  ...U.U%.i=q.4...
#     0010: 81 1A 5D EC 17 DC 16 EE   21 2A 13 C1 99 A7 A1 7F  ..].....!*......
#     0020: FA 1E 83 98 9B 1E 4C 1A   E9 FF 35 93 38 04 11 B8  ......L...5.8...
#     0030: 10 EC C9 D3 AA D5 FA CD   9E CE 92 E9 C5 87 EF 42  ...............B
#     0040: B3 6E 96 04 61 70 A3 0B   11 95 AE 37 2B D4 85 D1  .n..ap.....7+...
#     0050: B3 E0 D0 BB 21 5C F7 5D   18 74 4B CD 3B DD 7F 1A  ....!\.].tK.;...
#     0060: 82 69 2F DA 8D 13 86 A1   6B 33 74 14 62 8E 20 DA  .i/.....k3t.b. .
#     0070: 24 2A 3B 3C EF 69 47 68   9B 52 AF 92 08 85 A3 44  $*;<.iGh.R.....D
#     0080: 9B 46 35 8C FA 14 19 0F   03 D9 46 A4 9E E7 BC 2C  .F5.......F....,
#     0090: DA C1 FC 3A 92 B3 7F FE   5C 5F 99 7F 11 DF AA C6  ...:....\_......
#     00A0: C3 B3 AC 57 A1 5E A5 6B   0A 54 96 52 EA 41 C4 38  ...W.^.k.T.R.A.8
#     00B0: 2B F9 76 FA 36 BF E2 9B   FA 27 83 32 87 E8 19 1E  +.v.6....'.2....
#     00C0: 7F 05 BD E8 A7 F3 76 BF   68 B2 05 CC 22 80 A2 72  ......v.h..."..r
#     00D0: 47 65 6D E4 04 8B 68 0B   FF FF D9 38 BF 36 5D 97  Gem...h....8.6].
#     00E0: B1 70 6B BB 8F 93 A0 74   08 07 B2 79 30 B4 7B 7C  .pk....t...y0...
#     00F0: 55 4B D9 0D 4E DE 24 67   B0 F2 7D 66 CB 70 DF 43  UK..N.$g...f.p.C
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.186 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D 68 C7 2E C3 88 72 DE   96 E0 39 6F E1 08 2E 52  .h....r...9o...R
#     0010: D3 47 0A C4 E1 42 2C 00   61 D4 F1 8E 56 FA C0 11  .G...B,.a...V...
#     0020: 94 5C 56 F7 BB 28 07 65   9F 66 2B FB AF FB 89 CE  .\V..(.e.f+.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.188 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:28.189 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.189 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:28.190 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.190 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 18:41:28.190 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:41:28.190 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.191 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 18:41:28.193 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 65 E3 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 18:41:01.000 UTC",
#       "not  after"         : "2024-01-13 18:41:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF D8 4C 02 96 98 74 EC   D5 8B 30 97 C1 D5 96 09  ..L...t...0.....
#           0010: 1D D4 1D AC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Cr

[...truncated too long message...]

Build(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 18:42:59.838 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:42:59.883 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:42:59.884 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:42:59.884 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 18:42:59.884 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39908/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28303ms
ok 65 stop command for single port in 31356ms
ok 66 status detects locally running solr in 14461ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2193ms
ok 69 copying files around in 6606ms
ok 70 upconfig in 2669ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cli.TestSolrCLIRunExample.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9B14CA538F1CC934 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 21m 18s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m46s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5676 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5676/

All tests passed

Build Log:
[...truncated 1307 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44233/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 15:25:00.860; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 15:25:00.866; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 15:25:01.791; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 15:25:01.829; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22464ms
ok 61 start solr with client truststore and security manager in 25919ms
not ok 62 start solr with mTLS needed in 57320ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-GcTbJG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44233.
#
# Started Solr server on port 44233 (pid=200548). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44234.
#
# Started Solr server on port 44234 (pid=200997). Happy searching!
#
# INFO  - 2023-10-15 15:26:25.331; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 15:26:25.337; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 15:26:25.716; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 15:26:25.720; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 15:26:25.720; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:25.754 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C B7 07 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:26:01.000 UTC",
#     "not  after"         : "2024-01-13 15:26:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D7 A7 B4 09 6E FD 25   5A 2E FB 73 0B 70 D4 6B  .....n.%Z..s.p.k
#         0010: 8A 8A CB 00                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:25.759 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A2 4E 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:53.000 UTC",
#     "not  after"         : "2024-01-13 15:25:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:25.774 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:26.117 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:26.118 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:26.118 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:26.118 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:26.285 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:26.288 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:26.288 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.306 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.307 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.307 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:26.310 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F5 43 92 9D 4A A9 8C 14 58 6B D3 AE 1D B7 4B 40 60 46 A3 97 E8 FB F3 40 1B 42 C2 F9 0C C5 85 A7",
#   "session id"          : "9B E1 F0 94 67 95 2C 9A 38 34 B7 56 25 9B BB 7A 05 7D 84 92 2C 8F 2A A6 9B E7 28 1C F2 50 29 BC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 03 BC 78 C1 F3 9C EA 76   65 50 E5 EA B5 B3 60 82  ..x....veP....`.
#             0010: 95 C8 EC 91 57 91 45 3E   17 B8 92 B0 AF 87 53 4E  ....W.E>......SN
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.424 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "55 C3 A5 D0 B7 C7 73 66 81 25 65 B8 D4 B4 AE AD 3D 6D 1C 9B 38 87 F6 39 CA 19 16 75 C0 4D C6 1A",
#   "session id"          : "9B E1 F0 94 67 95 2C 9A 38 34 B7 56 25 9B BB 7A 05 7D 84 92 2C 8F 2A A6 9B E7 28 1C F2 50 29 BC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4A 4E 25 81 5F 0B D6 37   26 26 5D 59 CF 64 7F C7  JN%._..7&&]Y.d..
#           0010: A9 7C 34 22 FC 3C 93 CD   76 D7 53 D8 C7 E1 4B 6F  ..4".<..v.S...Ko
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.425 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.425 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.426 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.427 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.429 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.430 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.432 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.439 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.441 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.442 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.446 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.446 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.446 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.446 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.447 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.447 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.449 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.450 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.450 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.450 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.452 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.453 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.453 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.457 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 58 1A 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:57.000 UTC",
#       "not  after"         : "2024-01-13 15:25:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF A3 98 15 78 7D 0A A2   89 3E 35 B7 1B 42 07 83  ....x....>5..B..
#           0010: 24 9E EA F6                                        $...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.457 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.543 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.547 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 25 38 27 16 21 17 93   94 E8 DD 24 45 AA 53 50  .%8'.!.....$E.SP
#     0010: 7F CD 14 71 A4 60 9A 57   D9 D6 5F 1A 49 FA 7D 76  ...q.`.W.._.I..v
#     0020: D5 4B 94 48 A1 DA AF CF   96 BD 67 E0 98 A5 E6 FE  .K.H......g.....
#     0030: 22 D9 89 EC 67 E9 1C A0   BA 8B E8 49 5D 36 5D 91  "...g......I]6].
#     0040: FD 1B 06 A3 50 AF 59 37   1C 4E 5A 2B 34 C3 13 F1  ....P.Y7.NZ+4...
#     0050: EF 6C 77 A2 44 D7 CE EB   A8 74 64 47 8E D9 F6 29  .lw.D....tdG...)
#     0060: 15 44 75 1C 7E 45 FB 9E   7B 97 7C 81 C2 A9 CD 05  .Du..E..........
#     0070: 7A 14 DD BB 02 A7 BD EF   94 01 51 E0 34 0C EE 83  z.........Q.4...
#     0080: 59 0B CC 5A 52 A7 D6 56   DA 12 00 EF 2B EB E1 A2  Y..ZR..V....+...
#     0090: 07 E2 B5 17 E3 BC 0D 51   C7 D4 AE 3B 3A BB DF 4C  .......Q...;:..L
#     00A0: 1E 0A D5 8F 97 F4 EA 22   CA 2C 81 EB AA 35 1F B9  .......".,...5..
#     00B0: 49 96 FD 63 53 73 EE EF   FD 40 12 DA BB E2 3D C7  I..cSs...@....=.
#     00C0: 88 DC 06 61 47 AD E0 E0   23 1A DE 76 88 7A 34 E5  ...aG...#..v.z4.
#     00D0: 78 2A C6 26 10 F8 78 9B   3E B2 83 B8 28 49 81 DD  x*.&..x.>...(I..
#     00E0: 4B 92 A7 38 EA 58 3A C2   5E 8A 58 C8 6B C0 FA F0  K..8.X:.^.X.k...
#     00F0: 11 E3 7B 95 EF 77 0D 17   0B 79 0A 1C 61 2C FC BE  .....w...y..a,..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.548 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B 70 3B 6C D5 19 FD 89   85 2E 35 F3 26 B6 24 AC  .p;l......5.&.$.
#     0010: 53 8B 81 3A 9D 22 F0 29   E8 75 88 CE 61 47 39 D4  S..:.".).u..aG9.
#     0020: 15 52 9E C1 25 75 4C 4E   A7 AE BC 7B 78 30 BC 9C  .R..%uLN....x0..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.550 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:26.551 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.552 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:26.552 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.552 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:26.552 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:26.553 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.553 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.556 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C B7 07 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:26:01.000 UTC",
#       "not  after"         : "2024-01-13 15:26:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 D7 A7 B4 09 6E FD 25   5A 2E FB 73 0B 70 D4 6B  .....n.%Z..s.p.k
#           0010: 8A 8A CB 00                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 6B 0A 94",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:55.000 UTC",
#       "not  after"         : "2024-01-13 15:25:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#           0010: AF 36 B6 CF                                        .6..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.584 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C4 17 A6 FB D7 D3 A6 C8   8E 44 19 35 C4 81 97 56  .........D.5...V
#     0010: EA 7D F8 A3 6A 19 5B AF   85 14 69 EB 47 77 F4 72  ....j.[...i.Gw.r
#     0020: 35 99 77 CB 50 BC 19 99   31 F4 41 65 B0 A8 5B D6  5.w.P...1.Ae..[.
#     0030: DC 27 29 46 DE FE A6 2F   38 2F 31 B3 2B BF 3D 12  .')F.../8/1.+.=.
#     0040: 57 8F 1C 2A B9 78 46 6E   34 38 1A 44 06 B8 B3 1B  W..*.xFn48.D....
#     0050: CF E4 B0 6C A2 95 A5 07   13 B4 3C 1C F3 6C E5 B4  ...l......<..l..
#     0060: 07 23 3A 2F 50 63 EA 6E   36 6B 14 53 70 D4 72 50  .#:/Pc.n6k.Sp.rP
#     0070: 0F 61 C7 F3 6F 3D B8 DD   46 92 58 78 98 7D 05 EE  .a..o=..F.Xx....
#     0080: DC D7 7F 98 AF E4 58 71   EA D1 D7 9F F7 66 05 10  ......Xq.....f..
#     0090: 97 23 5F 79 3C 3D 46 B1   6E 27 C1 E1 E6 43 38 21  .#_y<=F.n'...C8!
#     00A0: 57 1C 62 6A 6C EF AC C7   58 8C E4 67 4D 86 88 68  W.bjl...X..gM..h
#     00B0: AB 75 99 2E 56 D7 2D A5   18 77 A3 B6 2B 1C FA C4  .u..V.-..w..+...
#     00C0: 74 4D C8 AA EC A1 42 5D   8D 46 C2 FF DC 7E 2C A5  tM....B].F....,.
#     00D0: 3A 0A 8A DD 91 90 F9 B8   A7 AD 38 43 62 76 B9 B9  :.........8Cbv..
#     00E0: EA 2F 36 FA CD F1 87 6D   CC DD 09 F0 F3 54 33 DF  ./6....m.....T3.
#     00F0: AD 1A E6 A5 5A D8 AB 1A   28 DE AA 6E 19 33 EB 28  ....Z...(..n.3.(
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.585 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1F 09 E9 65 06 3A FA E5   43 17 6C E6 D3 D8 15 68  ...e.:..C.l....h
#     0010: 00 DB 7B 8E 7F 8C 9B B2   51 D1 C4 27 A4 26 60 E1  ........Q..'.&`.
#     0020: F8 C2 E6 7B 90 C4 57 B8   1B A3 11 B6 45 83 C6 BA  ......W.....E...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.586 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:26.657 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "50 57 8E EA 1F 14 5C 88 B4 A3 96 53 3E 83 32 EF 04 8E CF DC E1 4A 7D D8 CD A0 C4 D9 9E D8 AA BC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 15:26:26.950 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 15:26:26.951 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 15:26:27.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 15:26:27.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 15:26:28.250; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 15:26:28.253; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 15:26:28.253; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GcTbJG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:28.285 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C B7 07 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:26:01.000 UTC",
#     "not  after"         : "2024-01-13 15:26:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D7 A7 B4 09 6E FD 25   5A 2E FB 73 0B 70 D4 6B  .....n.%Z..s.p.k
#         0010: 8A 8A CB 00                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:28.289 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A2 4E 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:53.000 UTC",
#     "not  after"         : "2024-01-13 15:25:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:28.304 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:28.533 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.533 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:28.535 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:28.535 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.540 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.552 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:28.555 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4E 30 6F 4E F0 B0 3F FB 9C 5D 84 8D 10 AD 03 E3 3A 2B 85 93 5A 5E 43 AF 4C B6 15 EC 8D 57 6B 09",
#   "session id"          : "57 E2 DC F6 E8 7B 93 8C A3 A9 BD 8C 23 AE C8 85 B5 DA 15 34 27 44 9F AF BF 6A 51 D8 A1 14 1A 03",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 78 72 F1 C4 66 41 1F 5D   E4 96 15 A7 75 AA F2 12  xr..fA.]....u...
#             0010: FA 53 28 56 D0 E8 9F AC   5D F9 80 06 8F A0 7B 08  .S(V....].......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F0 3B F5 1E 8F 7A 59 06 45 43 0E 71 54 52 97 B1 D1 43 EB 79 D8 65 63 AA B3 BA 86 B6 80 C0 FC D2",
#   "session id"          : "57 E2 DC F6 E8 7B 93 8C A3 A9 BD 8C 23 AE C8 85 B5 DA 15 34 27 44 9F AF BF 6A 51 D8 A1 14 1A 03",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 C7 6F 25 19 AA DD 6F   6D 48 65 B5 08 E5 EE 48  ..o%...omHe....H
#           0010: 34 F6 AE 36 1D 3E 19 72   BB 40 BC 47 BF B6 0D 2A  4..6.>.r.@.G...*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.647 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.647 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.652 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.653 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.662 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.664 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.667 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.670 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.670 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.671 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.671 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.672 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.675 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 58 1A 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:57.000 UTC",
#       "not  after"         : "2024-01-13 15:25:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF A3 98 15 78 7D 0A A2   89 3E 35 B7 1B 42 07 83  ....x....>5..B..
#           0010: 24 9E EA F6                                        $...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.675 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:28.725 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:28.725 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:28.726 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:28.726 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.756 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 6B 0A 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 15:25:55.000 UTC",
#     "not  after"         : "2024-01-13 15:25:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#         0010: AF 36 B6 CF                                        .6..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#         0010: F7 90 76 5C                                        ..v\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.759 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 45 88 29 48 08 00 16   6F A6 7D C4 E8 71 92 77  EE.)H...o....q.w
#     0010: A3 3A DA A4 DB E7 47 63   FA 20 A4 42 D7 03 DF 62  .:....Gc. .B...b
#     0020: 4E B4 2B 12 E8 88 C5 AB   70 0A 5D 6E 51 D2 C9 48  N.+.....p.]nQ..H
#     0030: FF 74 D9 B4 E1 56 1B D0   30 FC 64 9C 34 AB E7 1E  .t...V..0.d.4...
#     0040: 05 80 42 F3 37 AC BC 7E   E1 CF 0E 74 11 BC DC 31  ..B.7......t...1
#     0050: C8 14 E7 85 F2 AC 79 E9   B0 70 75 7C D0 76 7A 51  ......y..pu..vzQ
#     0060: 30 83 B2 0F BF A7 13 79   7C 95 C1 35 32 A2 F7 C6  0......y...52...
#     0070: C1 F5 E8 C7 08 02 EC 27   90 AD 3C D6 83 0C B3 96  .......'..<.....
#     0080: 61 69 DF 66 FB E8 EE C3   AC CC 73 E7 5C F6 D9 38  ai.f......s.\..8
#     0090: 3A F4 8B 98 29 B8 58 12   7D EE F1 2E 5E A2 DE 0C  :...).X.....^...
#     00A0: F6 F7 05 FA 60 6A 1C CE   86 79 90 58 83 D9 98 6A  ....`j...y.X...j
#     00B0: 9C 23 65 41 9B B5 61 12   95 A0 E6 EA 09 A7 E9 15  .#eA..a.........
#     00C0: 22 BE CD 92 14 6B 69 89   94 04 B6 0F 70 DB EC 57  "....ki.....p..W
#     00D0: E5 1E 37 0A 1D 9C 42 14   B8 80 86 1F 2C 8B E5 FC  ..7...B.....,...
#     00E0: 90 AB AE C5 34 68 42 2D   04 FF 52 CD E3 1B A4 5B  ....4hB-..R....[
#     00F0: 0D ED D2 F8 AC 08 E9 FC   6D E2 C2 6B B6 E9 C9 2F  ........m..k.../
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.761 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 E2 26 F7 79 0D 7B B0   84 DF 2F 13 12 14 B7 1A  ..&.y...../.....
#     0010: 55 1F 24 2D 3C D1 86 C1   9D E9 42 19 B8 A6 7F A5  U.$-<.....B.....
#     0020: 7B 3D 5E 0F 64 D2 AC CC   8A 77 FE EB DA 3B 3A 20  .=^.d....w...;:
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.763 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:28.764 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.764 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:28.765 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.765 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 15:26:28.765 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:28.765 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.766 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.768 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C B7 07 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:26:01.000 UTC",
#       "not  after"         : "2024-01-13 15:26:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 D7 A7 B4 09 6E FD 25   5A 2E FB 73 0B 70 D4 6B  .....n.%Z..s.p.k
#           0010: 8A 8A CB 00                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 6B 0A 94",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:55.000 UTC",
#       "not  after"         : "2024-01-13 15:25:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#           0010: AF 36 B6 CF                                        .6..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.794 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 C2 13 AE 16 8E 72 10   B6 4D 18 00 77 EA C0 4F  ......r..M..w..O
#     0010: C2 25 CC 1B C3 B6 0F 19   3D 41 34 DB 0A 15 2F B7  .%......=A4.../.
#     0020: A9 15 46 4B EF A3 1F BD   43 E1 03 C4 0B B7 F3 E5  ..FK....C.......
#     0030: F9 F6 3D A2 E5 D2 2A 01   D8 8F 0A 50 62 8F 48 14  ..=...*....Pb.H.
#     0040: 75 B3 98 62 9F 08 65 DB   C3 29 C6 FA DE FC CC 2C  u..b..e..).....,
#     0050: F7 BA CC 65 7C 30 78 ED   B5 5D B7 8D 8F 9A FD 42  ...e.0x..].....B
#     0060: 9B C3 2D 5F 47 DB 8F BD   88 8E 27 AC 6B 2B 08 82  ..-_G.....'.k+..
#     0070: 09 BF 88 B7 FD 29 CE 4D   70 2B 6C 30 AE A5 E0 BA  .....).Mp+l0....
#     0080: FF 0A BC 9B 91 33 E6 99   70 34 22 D3 CB 9A DF 46  .....3..p4"....F
#     0090: FE CB 6F B9 35 7A 52 86   65 44 B2 0C A7 88 A7 E1  ..o.5zR.eD......
#     00A0: 70 5C B8 9D 0E 15 57 D8   EE 0F 85 77 19 5D D3 78  p\....W....w.].x
#     00B0: 4D 2C 12 F2 DD 45 29 85   E4 1E BA 7A 16 90 A7 7E  M,...E)....z....
#     00C0: 07 3A E8 BA 9C C2 36 CC   C0 31 11 BD 16 8D 29 3E  .:....6..1....)>
#     00D0: 36 0C EA 0B 17 36 17 B7   8C 24 D0 C5 CC 8B 55 D2  6....6...$....U.
#     00E0: 6D 73 CB 10 E0 24 71 E6   E2 79 E3 97 7F CC 90 86  ms...$q..y......
#     00F0: 4E DE 74 83 E1 EE F9 75   C9 42 42 3F 5C FB 1A E2  N.t....u.BB?\...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.795 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 45 28 C5 9E F8 55 14 D8   0A 8D E0 44 E0 A0 4C C6  E(...U.....D..L.
#     0010: D9 35 E1 A8 D3 18 8F C5   AD 5C C9 FE 34 50 35 EB  .5.......\..4P5.
#     0020: 7A 68 D7 B8 11 D0 B5 D6   55 1F 55 A2 5B BE 0F A7  zh......U.U.[...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.795 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:28.851 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7B 6E 8F BA 6B E0 5B FD 87 14 C7 78 02 9C 48 2C C5 09 45 B9 96 B2 A7 36 4E 05 75 1C BC 84 F9 D0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 15:26:29.134 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 15:26:29.134 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 15:26:40.406; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:40.736 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A2 4E 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:53.000 UTC",
#       "not  after"         : "2024-01-13 15:25:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#           0010: AF 36 B6 CF                                        .6..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 6B 0A 94",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 15:25:55.000 UTC",
#       "not  after"         : "2024-01-13 15:25:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 25 7A 07 96 BD 37 D7   1B BC EE 04 DE C2 23 B5  W%z...7.......#.
#           0010: AF 36 B6 CF                                        .6..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 15 7C C6 9B 25 2E 6F   A7 B3 42 28 FD 17 13 C4  .....%.o..B(....
#           0010: F7 90 76 5C                                        ..v\
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 15:26:40.751 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:40.867 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:40.869 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:40.870 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:26:40.870 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:40.997 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:40.998 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:41.000 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 15:26:41.000 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:41.006 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:41.018 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:41.018 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:41.018 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 15:26:41.020 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "38 95 B0 2F 95 F4 1E 12 31 DE 45 ED D3 6C 93 90 0F EA B1 AC FA A9 B4 6A B8 A5 FE 0D BA 2B DF 9A",
#     "session id"          : "4C 87 C4 47 39 16 C1 6A 7D 7E BC B8 3E 87 EB 36 26 A9 18 5C 16 4D 28 9B B4 CA 0B 06 57 66 8D 4F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 87 51 71 0A EC 7E F7 60   05 29 67 04 EE B2 08 F9  .Qq....`.)g.....
#               0010: 80 DD 97 FC 68 E1 70 CB   39 44 46 AE D5 B8 4F 39  ....h.p.9DF...O9
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.039 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "51 6A 59 86 24 6C 8E 75 DA 59 1E DC 9D 37 07 6D 49 B0 18 3A 9D B5 CC 03 63 5C 75 43 AE D6 DA 7C",
#     "session id"          : "4C 87 C4 47 39 16 C1 6A 7D 7E BC B8 3E 87 EB 36 26 A9 18 5C 16 4D 28 9B B4 CA 0B 06 57 66 8D 4F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4B 2E 11 CB A1 3A 48 87   B6 72 AE 93 75 46 75 B4  K....:H..r..uFu.
#             0010: 6F 5B 06 72 91 5A 3E 49   A7 31 E8 DE F4 42 3D 5A  o[.r.Z>I.1...B=Z
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.040 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.040 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.042 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.042 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.042 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.042 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.044 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:41.046 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:41.046 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.053 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.055 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.056 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.059 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:26:41.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 15:26:41.062 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sche

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 15:28:00.771 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:28:00.818 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:28:00.822 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:28:00.823 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 15:28:00.823 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44234/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28439ms
ok 65 stop command for single port in 31448ms
ok 66 status detects locally running solr in 14383ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2202ms
ok 69 copying files around in 6623ms
ok 70 upconfig in 2659ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 39s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m6s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5675 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5675/

1 tests failed.
FAILED:  org.apache.solr.bench.DockMakerTest.testBasicCardinalityAlpha

Error Message:
java.lang.AssertionError: [lsyho] expected:<2> but was:<1>

Stack Trace:
java.lang.AssertionError: [lsyho] expected:<2> but was:<1>
	at __randomizedtesting.SeedInfo.seed([223A336EE01D7191:7C559F9A3A640300]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.bench.DockMakerTest.testBasicCardinalityAlpha(DockMakerTest.java:69)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2245 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.bench.DockMakerTest.testBasicCardinalityAlpha (:solr:benchmark)
    Test output: /tmp/src/solr/solr/benchmark/build/test-results/test/outputs/OUTPUT-org.apache.solr.bench.DockMakerTest.txt
    Reproduce with: gradlew :solr:benchmark:test --tests "org.apache.solr.bench.DockMakerTest.testBasicCardinalityAlpha" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=223A336EE01D7191 -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:benchmark:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/benchmark/build/test-results/test/

* Try:
> Run with --scan to get full insights.

BUILD FAILED in 5m 49s
629 actionable tasks: 612 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m17.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5674 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5674/

1 tests failed.
FAILED:  org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod

Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=321, name=zkConnectionManagerCallback-172-thread-1-EventThread, state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
        at app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:560)
        at app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
        at app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
        at app//org.apache.solr.cloud.ZkController$$Lambda$545/0x00000008403abc40.command(Unknown Source)
        at app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
        at app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
        at app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)

Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=321, name=zkConnectionManagerCallback-172-thread-1-EventThread, state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
        at app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:560)
        at app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
        at app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
        at app//org.apache.solr.cloud.ZkController$$Lambda$545/0x00000008403abc40.command(Unknown Source)
        at app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
        at app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
        at app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
	at __randomizedtesting.SeedInfo.seed([ABA1E5A73DEA291C]:0)




Build Log:
[...truncated 2292 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44835/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 10:20:59.566; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:20:59.571; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 10:21:00.477; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 10:21:00.513; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22943ms
ok 61 start solr with client truststore and security manager in 25326ms
not ok 62 start solr with mTLS needed in 61368ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vh6VtP/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44835.
#
# Started Solr server on port 44835 (pid=199893). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44836.
#
# Started Solr server on port 44836 (pid=200324). Happy searching!
#
# INFO  - 2023-10-15 10:22:23.686; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:22:23.692; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 10:22:24.077; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:22:24.080; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:22:24.081; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.114 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 37 C8 A7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:59.000 UTC",
#     "not  after"         : "2024-01-13 10:21:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 E6 66 19 85 14 7F 7C   8D 0C 53 8F DC 38 4B 22  ..f.......S..8K"
#         0010: CE BA 52 DB                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.118 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 FB 4D 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:51.000 UTC",
#     "not  after"         : "2024-01-13 10:21:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:24.132 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.610 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.613 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:24.613 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.619 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.631 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.632 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:24.635 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "43 03 E1 16 78 38 CA 1B 1A 34 00 AA 36 2C 61 FE 94 6E DE 48 E9 9A F4 88 53 59 9C 7A EA 0D FA D8",
#   "session id"          : "62 45 B9 80 A5 6A 57 79 FA 3D AE 41 C9 0A D9 EE FB 5D E1 D3 8B C7 D9 40 C1 9E FF CE C5 80 E4 FB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 16 B4 EE CC 9F 95 CC   43 64 8E 17 25 D1 B0 E4  5.......Cd..%...
#             0010: C2 CC 30 D4 82 3B 39 AD   31 D1 DF AC 68 C1 A2 31  ..0..;9.1...h..1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 A8 A8 90 9C 3E 2A DA 88 1C 8E 42 66 3C 87 E4 6B 3A 66 0A 8C 0B 16 EE FF 76 73 CA 33 BB E3 C2",
#   "session id"          : "62 45 B9 80 A5 6A 57 79 FA 3D AE 41 C9 0A D9 EE FB 5D E1 D3 8B C7 D9 40 C1 9E FF CE C5 80 E4 FB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 62 FB 42 87 3A A7 0E A1   94 22 8A 2B 00 08 5B 91  b.B.:....".+..[.
#           0010: C7 B2 6D 06 34 2B 88 E8   C0 FE F4 28 49 8E F8 3E  ..m.4+.....(I..>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.737 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.738 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.740 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.740 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.742 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.752 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.754 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.755 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.759 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.760 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.762 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.763 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.764 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.765 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.769 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 10 C4 A1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:56.000 UTC",
#       "not  after"         : "2024-01-13 10:21:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 5E 3F 81 90 0C 26 62   A8 06 6B 41 BE 56 BA 1C  .^?...&b..kA.V..
#           0010: B7 E8 92 26                                        ...&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.769 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.809 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.811 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:24.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.856 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.859 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6B C2 87 BF 8D B7 A9 9F   87 0B 23 44 D3 74 88 72  k.........#D.t.r
#     0010: 03 4E A4 67 39 7D E1 E6   5E 2E E6 32 D3 F2 77 4F  .N.g9...^..2..wO
#     0020: E1 7B 0F A9 46 BC B6 64   EA 8E 8D 82 EB E0 BC CF  ....F..d........
#     0030: A1 8F 54 53 BD C3 41 73   21 F9 45 96 B2 D8 3E F3  ..TS..As!.E...>.
#     0040: 5B 2D 67 19 DE 4B 2F 96   6A 38 15 36 FF B2 DE B5  [-g..K/.j8.6....
#     0050: 8C D0 E6 AB FF A7 B4 74   05 5A 56 01 29 F6 3A 67  .......t.ZV.).:g
#     0060: 18 A8 D8 1F 3E 72 2E 8C   DC 31 B7 63 18 A5 CE ED  ....>r...1.c....
#     0070: 64 7B 2E 0E 06 7D 30 CA   6B 02 BB 81 DF 43 82 14  d.....0.k....C..
#     0080: 9A 50 6D 03 10 36 C1 E7   03 68 E1 E4 3A D2 3D 79  .Pm..6...h..:.=y
#     0090: DD E9 A5 C7 AA 72 68 9E   8A B8 09 05 03 B3 89 8B  .....rh.........
#     00A0: D5 2B 57 D8 0B B4 8A DC   FE 21 2A 87 92 C2 B1 CA  .+W......!*.....
#     00B0: 95 E6 7B 45 B0 04 7D 97   35 E5 76 31 37 70 E1 E3  ...E....5.v17p..
#     00C0: C8 7F 74 6D 87 87 B7 63   96 EF E5 C6 EE 9C 54 E5  ..tm...c......T.
#     00D0: 53 74 FF 1C DE 32 67 CE   1A D6 6A AD 46 23 43 3B  St...2g...j.F#C;
#     00E0: BD 55 F2 8E E0 1D DE AA   68 4E 28 30 0F F5 21 03  .U......hN(0..!.
#     00F0: 7A 8C 99 21 75 3C A0 BE   F4 25 80 17 BF F6 04 86  z..!u<...%......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.861 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3A DC 40 44 F9 26 51 D5   CD BB 2A C3 67 3C FA 4E  :.@D.&Q...*.g<.N
#     0010: D2 16 50 8C 2A 0F 78 DB   D6 89 8D 56 78 D4 2C 65  ..P.*.x....Vx.,e
#     0020: AF B9 E6 F2 9C E1 0C C2   3D B7 D2 B9 F7 8F 6C 36  ........=.....l6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.864 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.865 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.865 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:24.865 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:24.866 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.866 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.869 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 37 C8 A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:59.000 UTC",
#       "not  after"         : "2024-01-13 10:21:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 E6 66 19 85 14 7F 7C   8D 0C 53 8F DC 38 4B 22  ..f.......S..8K"
#           0010: CE BA 52 DB                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 34 A9 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:53.000 UTC",
#       "not  after"         : "2024-01-13 10:21:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#           0010: 5B 3E 2A 89                                        [>*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.894 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E 54 18 2A 52 34 93 CE   2D E0 40 CE 54 D3 CC D7  NT.*R4..-.@.T...
#     0010: 4C 41 7F 6E 52 12 79 AA   12 00 87 4F 41 5B BF 23  LA.nR.y....OA[.#
#     0020: 0C 2D C5 6B B3 E8 7D F0   E1 CA 7D 78 97 A7 CC E4  .-.k.......x....
#     0030: 1D 5E 12 8C 80 66 6E CF   9C 58 C8 3C BD 13 A1 E2  .^...fn..X.<....
#     0040: 15 8C 06 FE 90 9A 5B 3E   1E FF A9 26 7F 17 B2 2B  ......[>...&...+
#     0050: 8E 82 41 47 92 AC 9C 1F   31 93 37 39 9C 9A 18 DF  ..AG....1.79....
#     0060: 56 A5 48 84 DD FB D9 F5   9F D6 7E CC C0 62 8C DF  V.H..........b..
#     0070: DF C7 A0 25 25 85 4B DC   30 BA D9 62 BC DA EB DB  ...%%.K.0..b....
#     0080: FE 76 77 C0 78 FF 09 E2   66 D8 2A 8F D7 CA 74 A7  .vw.x...f.*...t.
#     0090: E3 3B 8B A4 EB BD FB 9E   9C 01 C3 12 3C 9B EC D4  .;..........<...
#     00A0: F8 DE 03 7B 1B 5B 7F 9E   B4 92 1E 11 2B 84 DB DF  .....[......+...
#     00B0: 01 B8 95 82 08 AC B7 C2   BC 23 61 87 AA 13 80 08  .........#a.....
#     00C0: CD BD 86 10 9E 27 FE EE   C8 4E BD C1 47 B5 3A 39  .....'...N..G.:9
#     00D0: FE B2 B2 61 75 35 E9 C5   98 38 4A C2 E7 7F E2 1E  ...au5...8J.....
#     00E0: 3F 23 F1 C8 68 C2 9B C6   CA 47 67 F0 E3 33 78 5F  ?#..h....Gg..3x_
#     00F0: B3 C9 43 6E 5F F9 B0 7C   53 46 F2 73 DC 0F 91 99  ..Cn_...SF.s....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.895 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 2A AB 80 ED 2D 54 10   15 BF C0 FA E8 9A CE F7  O*...-T.........
#     0010: 8C 8D 56 31 8D 84 C3 36   1B 90 97 34 D4 78 19 1C  ..V1...6...4.x..
#     0020: 30 D1 96 AB D4 E1 A6 D4   59 A6 F2 A8 51 45 F1 F6  0.......Y...QE..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.896 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:24.954 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 49 2A 5B 02 EF 44 60 09 20 38 8A B2 E8 50 E6 74 A3 3A AA F0 52 D5 9F A9 E5 98 DF D0 D5 38 7A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 10:22:25.221 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 10:22:25.222 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 10:22:26.160; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 10:22:26.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 10:22:26.540; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:22:26.543; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 10:22:26.543; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vh6VtP/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.576 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 37 C8 A7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:59.000 UTC",
#     "not  after"         : "2024-01-13 10:21:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 E6 66 19 85 14 7F 7C   8D 0C 53 8F DC 38 4B 22  ..f.......S..8K"
#         0010: CE BA 52 DB                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.580 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 FB 4D 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:51.000 UTC",
#     "not  after"         : "2024-01-13 10:21:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:26.594 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.689 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:26.690 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.831 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.831 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.833 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:26.833 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.850 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.851 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:26.853 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 81 F6 FF F1 7E BB B4 87 41 1C DC 57 0E 5A E4 E3 FD B3 A7 B2 D6 41 88 4B B5 12 13 4D 50 C7 56",
#   "session id"          : "3E 8C 6C 26 7B 77 F1 3E 13 3F C6 3E D4 49 70 2C 0C E6 DA 54 87 13 E6 55 E3 8C C3 EB CB C1 84 3B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9F 61 3D 06 C4 5C 69 B4   89 58 59 E2 AC 28 CC 62  .a=..\i..XY..(.b
#             0010: 04 55 3C 69 58 D0 0B 26   09 50 0E 72 C0 CD C2 7C  .U<iX..&.P.r....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C4 A9 68 00 C9 73 EB F4 0D 39 54 DD C4 2D F2 B2 00 29 D0 34 F4 84 AF B1 01 37 3A 20 32 5F A1 06",
#   "session id"          : "3E 8C 6C 26 7B 77 F1 3E 13 3F C6 3E D4 49 70 2C 0C E6 DA 54 87 13 E6 55 E3 8C C3 EB CB C1 84 3B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0A 8C CA 1F 5E 2E 84 06   38 1C 53 13 E2 E4 EA 30  ....^...8.S....0
#           0010: DA F8 01 5B 39 29 49 7E   7E 85 A0 7B 80 02 0A 7C  ...[9)I.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.957 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.960 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.963 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.975 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.976 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.977 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.984 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.984 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.985 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.985 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.986 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.987 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:26.987 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.990 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 10 C4 A1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:56.000 UTC",
#       "not  after"         : "2024-01-13 10:21:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C 5E 3F 81 90 0C 26 62   A8 06 6B 41 BE 56 BA 1C  .^?...&b..kA.V..
#           0010: B7 E8 92 26                                        ...&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:26.991 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.078 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 34 A9 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 10:21:53.000 UTC",
#     "not  after"         : "2024-01-13 10:21:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#         0010: 5B 3E 2A 89                                        [>*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#         0010: 2B D7 A0 8C                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.081 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 86 C6 2D EA 12 09 02   99 B3 C2 AA A4 ED 8D F4  3..-............
#     0010: D1 1A EA 5E 8D 7E 1D 01   4A A6 86 B9 9E FD 83 DF  ...^....J.......
#     0020: 51 89 65 25 A2 62 A6 47   0D 65 8A 9A C5 1D AD 6D  Q.e%.b.G.e.....m
#     0030: D5 43 68 49 70 9B 17 8F   8C 13 7E 94 12 32 05 E2  .ChIp........2..
#     0040: 13 6E 32 66 EA 7E 21 5B   1C 59 1C 29 B1 FE FF AF  .n2f..![.Y.)....
#     0050: 37 2D 5E 62 6C C7 30 6B   E9 07 76 F0 BA 9E BB 60  7-^bl.0k..v....`
#     0060: EE 98 2A 5A B4 A4 9A 71   01 5F 43 BF A1 E3 7C 7F  ..*Z...q._C.....
#     0070: BD DD DD A3 9F A5 A6 36   7F 16 26 EF 0A 88 2F FE  .......6..&.../.
#     0080: C6 86 1B 83 F9 6B C1 6B   D7 EE D5 15 02 97 D8 5D  .....k.k.......]
#     0090: 40 BC 39 06 24 8F E2 3A   A6 40 46 6E 0A 47 60 C4  @.9.$..:.@Fn.G`.
#     00A0: 66 EB 7B 02 FF B7 F2 0A   2B 07 35 99 8F 44 D0 4B  f.......+.5..D.K
#     00B0: 86 AA D9 5A 0D 72 C8 16   9B 50 B1 01 46 3E 7C 64  ...Z.r...P..F>.d
#     00C0: 9B 01 02 77 B7 53 A6 F5   26 28 90 A9 AD A8 7C C9  ...w.S..&(......
#     00D0: 6D 9F 2E E4 49 A0 C5 B5   08 42 33 79 6A E0 FD 41  m...I....B3yj..A
#     00E0: 1E 74 05 76 5E 2C B8 9A   01 7B 82 F1 23 2F FC 7D  .t.v^,......#/..
#     00F0: 85 49 57 FA 7A F1 70 6C   01 D8 4F FB EC 85 98 6A  .IW.z.pl..O....j
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.084 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 92 D0 E6 44 DB 20 D7 9E   36 C4 AD F0 C1 2D ED B5  ...D. ..6....-..
#     0010: AE 7A D1 86 2B 02 60 35   06 55 2B 8D F3 65 5B A8  .z..+.`5.U+..e[.
#     0020: 13 42 20 FB CC 0E B4 7B   64 58 73 26 7B 6B 3C 98  .B .....dXs&.k<.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.086 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.087 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.087 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.088 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.088 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 10:22:27.088 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:27.088 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.089 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.091 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 37 C8 A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:59.000 UTC",
#       "not  after"         : "2024-01-13 10:21:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 E6 66 19 85 14 7F 7C   8D 0C 53 8F DC 38 4B 22  ..f.......S..8K"
#           0010: CE BA 52 DB                                        ..R.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 34 A9 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:53.000 UTC",
#       "not  after"         : "2024-01-13 10:21:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#           0010: 5B 3E 2A 89                                        [>*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.118 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 49 BC D0 3B 08 7E E0   4E 0E BC 30 42 07 42 68  .I..;...N..0B.Bh
#     0010: 35 54 B4 4F 2D 22 EE 0E   40 F6 67 EF B5 FE 2D AB  5T.O-"..@.g...-.
#     0020: 72 5F F3 7B C6 4D 2C 74   82 98 81 89 DA 72 ED D3  r_...M,t.....r..
#     0030: B1 CF 5C 2B 4F 9B 95 95   D0 37 42 78 17 25 A4 7A  ..\+O....7Bx.%.z
#     0040: 5C 81 03 5C CE 9B 54 5B   A8 2B A1 00 86 BF 5C 1E  \..\..T[.+....\.
#     0050: 9D F5 8B F8 29 2C 5C 81   66 32 52 66 7B FF 5B 36  ....),\.f2Rf..[6
#     0060: 02 61 FF 01 C3 5C 4B 0D   ED 2D 50 8B 51 AD 1F 93  .a...\K..-P.Q...
#     0070: FF 4E B3 71 86 42 C8 AD   67 AE B2 29 7E 6F C8 A0  .N.q.B..g..).o..
#     0080: 8F ED A6 CE 49 FA 3F 55   D3 70 ED 6F 20 B9 21 4E  ....I.?U.p.o .!N
#     0090: 48 C3 B8 4F 9B DF 64 41   2D 86 CC 6C 5F 33 AA BA  H..O..dA-..l_3..
#     00A0: 16 82 42 F7 88 D1 EB 4A   BA 49 E0 FD AE 3E 64 71  ..B....J.I...>dq
#     00B0: 06 F4 86 BD 95 2F 65 A5   20 3D B6 5B E2 09 EC F3  ...../e. =.[....
#     00C0: EC 69 6E 9B E3 CF B7 FB   3F 39 D0 7C A3 C2 B5 A5  .in.....?9......
#     00D0: 47 0A FE 55 CA 48 E2 5B   D4 7B 82 DC E0 94 FD AB  G..U.H.[........
#     00E0: B2 03 81 0D 0C C9 7B 2B   10 1B 06 79 16 93 C5 7B  .......+...y....
#     00F0: 20 60 59 B7 98 E4 36 AE   7F 5F C3 3E 40 6E 03 36   `Y...6.._.>@n.6
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.119 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2D 19 8B 0F 15 E6 CB EA   25 E9 9F B8 EF 9D 83 84  -.......%.......
#     0010: 2A 08 E2 1C 42 28 8C 5B   20 74 7C 86 33 9C A4 45  *...B(.[ t..3..E
#     0020: B8 02 23 87 72 4C 36 FA   89 92 F2 97 C3 F0 97 09  ..#.rL6.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.120 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:27.176 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "46 75 4D 20 99 66 1D 28 92 B1 44 ED D2 A3 F2 AE E5 DD D0 C0 13 6B 40 AA 84 A7 B8 75 32 C9 71 10",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 10:22:27.450 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 10:22:27.451 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 10:22:39.104; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:39.436 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 FB 4D 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:51.000 UTC",
#       "not  after"         : "2024-01-13 10:21:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#           0010: 5B 3E 2A 89                                        [>*.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 34 A9 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 10:21:53.000 UTC",
#       "not  after"         : "2024-01-13 10:21:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 DA 3B 29 6F B2 B6 9E   A4 8E 69 6D 60 70 C5 67  T.;)o.....im`p.g
#           0010: 5B 3E 2A 89                                        [>*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 D3 B2 BA 33 85 AA 03   39 43 93 A4 A3 0A 54 4C  ....3...9C....TL
#           0010: 2B D7 A0 8C                                        +...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 10:22:39.451 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.564 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:22:39.565 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.704 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.706 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 10:22:39.706 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.723 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 10:22:39.726 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B5 0A BA 42 4F EB E9 97 08 A0 20 B4 89 24 0C 72 CF E5 C0 30 89 BD 8B 29 88 1A EE 85 02 1A AD 82",
#     "session id"          : "77 9B 93 F3 BA 88 3E 79 FA 34 8A 9D 7D 18 A7 4E 6C 40 36 F7 96 18 68 68 BC 4E 53 75 9D 19 8B 2C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6D 70 17 75 B3 8B F4 3A   2A E7 B7 AE 2F 15 BA B6  mp.u...:*.../...
#               0010: 59 A7 B7 E6 16 61 59 80   3A D0 CB 8A D3 38 C2 42  Y....aY.:....8.B
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.743 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5B 3B 66 60 CD 4C 57 15 4D 53 0F B2 68 6F A4 2A FB F5 50 46 BB 75 6E 32 C8 CF 61 F3 25 B9 8E 61",
#     "session id"          : "77 9B 93 F3 BA 88 3E 79 FA 34 8A 9D 7D 18 A7 4E 6C 40 36 F7 96 18 68 68 BC 4E 53 75 9D 19 8B 2C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C CC 94 34 DB 49 57 2F   44 22 D9 40 C2 3C D6 16  \..4.IW/D".@.<..
#             0010: 2F 84 D3 E3 B9 FF 6D B3   60 B9 2F 64 65 F6 74 7E  /.....m.`./de.t.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.743 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.744 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.747 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.747 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.748 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 10:22:39.749 UTC|SSLExtensions

[...truncated too long message...]

athBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 10:24:03.082 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 10:24:03.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44836/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28104ms
ok 65 stop command for single port in 31234ms
ok 66 status detects locally running solr in 14356ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6562ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1226ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=ABA1E5A73DEA291C -Ptests.file.encoding=ISO-8859-1


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 24m 12s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m39s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5673 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5673/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34475/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 07:50:46.539; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:50:46.543; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 07:50:47.738; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 07:50:47.777; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22781ms
ok 61 start solr with client truststore and security manager in 24931ms
not ok 62 start solr with mTLS needed in 59077ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-YgMPz8/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34475.
#
# Started Solr server on port 34475 (pid=200086). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34476.
#
# Started Solr server on port 34476 (pid=200544). Happy searching!
#
# INFO  - 2023-10-15 07:52:10.512; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:52:10.518; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 07:52:10.877; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:52:10.879; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:52:10.880; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:10.911 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 01 99 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:46.000 UTC",
#     "not  after"         : "2024-01-13 07:51:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 E4 B8 3E DD F0 A2 AE   05 DE 3A BE 89 83 C5 36  b..>......:....6
#         0010: FD 54 DF BC                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:10.916 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 68 28 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:38.000 UTC",
#     "not  after"         : "2024-01-13 07:51:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:10.931 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:11.153 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.154 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:11.155 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:11.156 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.161 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.172 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:11.174 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "96 A9 F8 46 9F B2 5D 71 00 91 21 86 83 A8 24 2F DB 05 54 FA 6F 12 D0 B5 94 6E EF 36 65 38 3A 2E",
#   "session id"          : "0E CA BA 2C 58 5C 4E 81 D6 2C F4 CF 21 DC 62 4C 7E 1A 88 65 DC A6 0D 55 BC 8A 19 16 A3 24 A9 F2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 07 5B B4 2C 98 31 38 B8   DB A8 79 AE E1 A9 D1 06  .[.,.18...y.....
#             0010: B9 17 8B 8F E0 B1 1B 8F   ED B9 EA AB BB 0F 63 03  ..............c.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.280 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "43 A4 13 94 11 A3 80 A5 95 FA 0F 91 21 E0 46 1F A8 32 CE 00 A7 E5 10 8E C6 74 97 80 A3 1F 4D 3A",
#   "session id"          : "0E CA BA 2C 58 5C 4E 81 D6 2C F4 CF 21 DC 62 4C 7E 1A 88 65 DC A6 0D 55 BC 8A 19 16 A3 24 A9 F2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BC E4 78 41 AA A5 BF 50   99 4B B7 AF FC CD FD 96  ..xA...P.K......
#           0010: 59 E5 D1 4F 08 2F C6 03   4B C3 3D 2A 79 74 1E 54  Y..O./..K.=*yt.T
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.280 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.280 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.282 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.284 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.284 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.284 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.286 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.293 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.295 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.296 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.299 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.299 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.302 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.302 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.302 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.303 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.303 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.304 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.307 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 90 36 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:42.000 UTC",
#       "not  after"         : "2024-01-13 07:51:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 CC 09 D2 9B 89 35 7F   BC DC 37 85 88 98 E3 F7   .....5...7.....
#           0010: 9F BD AE 83                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.307 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:11.360 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:11.360 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:11.360 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:11.360 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.388 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.391 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 DD 78 8B A7 80 8E 2F   B7 93 CA 83 D9 AE BE 2C  6.x..../.......,
#     0010: DC 00 B9 B1 A0 01 F4 6E   E9 14 F3 EB 07 75 14 A1  .......n.....u..
#     0020: 66 27 E7 66 BB D7 D2 8A   33 29 41 4F F5 4B D8 D9  f'.f....3)AO.K..
#     0030: 90 94 13 16 17 FD 80 A7   1A 7C 7B 33 E4 EE 1E 99  ...........3....
#     0040: 97 33 CB 44 8A 7A D4 42   AB F0 46 D4 F4 28 86 C0  .3.D.z.B..F..(..
#     0050: E5 C6 E5 CF 60 ED C6 E1   A4 1D 37 CA 55 D6 25 2C  ....`.....7.U.%,
#     0060: BE DD 22 A1 73 D8 DC BA   71 DD CC 79 A5 A7 62 06  ..".s...q..y..b.
#     0070: 31 97 D6 C8 36 90 D2 0D   EF ED 63 E3 75 B7 7B DE  1...6.....c.u...
#     0080: 57 8E 3D 26 BD 4C DA C7   F8 2D 28 CB 0A 1F C9 47  W.=&.L...-(....G
#     0090: 91 81 AC 7D B4 9F B3 A9   D8 C4 8E 32 DD 49 1A 6D  ...........2.I.m
#     00A0: CA 91 91 6E 9D C2 E6 03   E7 F5 FE 87 80 7F E1 78  ...n...........x
#     00B0: D8 9E 94 65 1F A4 46 96   B9 C9 8B 20 5A E5 D7 9A  ...e..F.... Z...
#     00C0: B7 4B DB 97 61 B7 FA 2C   3C 99 99 F6 31 36 00 65  .K..a..,<...16.e
#     00D0: AA DF 8E 5C 7D A8 D4 BC   B4 E3 15 21 12 37 41 1C  ...\.......!.7A.
#     00E0: 31 A3 DF A1 2E 60 2F 1B   BD B0 4D 09 CD 4A 14 7F  1....`/...M..J..
#     00F0: A8 14 08 6A 4F 40 D0 ED   76 C5 41 1A 06 9F 87 32  ...jO@..v.A....2
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.394 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 97 B0 AF 02 00 7A E6   6A D1 88 92 15 32 70 6F  ......z.j....2po
#     0010: 0A 74 30 48 9C EE B8 90   4F D8 46 E3 8A 99 EA C1  .t0H....O.F.....
#     0020: D1 73 C3 AE 6A 24 9F 1B   7D 5B 3B 12 62 19 85 50  .s..j$...[;.b..P
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.396 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:11.397 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.397 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:11.397 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.397 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:11.398 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:11.398 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.398 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.401 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 01 99 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:46.000 UTC",
#       "not  after"         : "2024-01-13 07:51:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 E4 B8 3E DD F0 A2 AE   05 DE 3A BE 89 83 C5 36  b..>......:....6
#           0010: FD 54 DF BC                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A BE B1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:40.000 UTC",
#       "not  after"         : "2024-01-13 07:51:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#           0010: 9C DF B8 2A                                        ...*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.425 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2B 27 0A A8 9F 62 5E 67   E0 E3 F6 C4 1D 05 48 86  +'...b^g......H.
#     0010: 4F 4B 4A CD 22 4C EF 84   B9 34 FB EC 3F 67 9E A3  OKJ."L...4..?g..
#     0020: 9B BA 5A C5 3D 84 BB 83   F7 1E B0 5F 5A FB AB 96  ..Z.=......_Z...
#     0030: 31 4C 43 FB EF 60 3A 3C   F1 27 FC EC 30 04 C8 EC  1LC..`:<.'..0...
#     0040: 6E C8 77 B5 E3 2F 89 68   85 BD 7A BD DC 17 CD 69  n.w../.h..z....i
#     0050: BC 61 08 6A 04 7A AA 42   4C 8B 9D D6 0F 30 F8 9F  .a.j.z.BL....0..
#     0060: 05 95 29 AC CE 3C 79 F4   12 18 C7 4C B3 8E 8A 3D  ..)..<y....L...=
#     0070: 3C 6C D1 87 8C 5C 80 F8   E4 EA 10 BF D5 74 AF 0A  <l...\.......t..
#     0080: 2A 2B 9B 8B DB 23 31 95   A3 47 7F 38 9F 39 92 8A  *+...#1..G.8.9..
#     0090: 30 C2 23 F4 0D 6E A4 B7   60 BE 8F F1 85 6E D9 13  0.#..n..`....n..
#     00A0: 3F 31 DA C1 15 38 92 14   52 47 33 F7 95 26 12 C3  ?1...8..RG3..&..
#     00B0: 6C 18 9D 82 27 45 47 CD   17 B5 8F DA 7C F5 61 E3  l...'EG.......a.
#     00C0: 16 70 F8 AF 8C 83 77 D6   BD 64 29 CB 24 4D D6 79  .p....w..d).$M.y
#     00D0: 63 2A 15 78 1A 74 36 0F   ED 2E 87 4E 88 25 61 3F  c*.x.t6....N.%a?
#     00E0: C4 E6 84 E9 E8 32 88 23   24 23 39 3D 16 BF CC 55  .....2.#$#9=...U
#     00F0: 50 DD 84 01 B9 E5 65 20   C1 C5 BF CB 88 96 1F 3E  P.....e .......>
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.426 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: ED 1B 4F FE F9 CE 3A 7A   9C 26 CA 21 A3 A7 AB E7  ..O...:z.&.!....
#     0010: D4 BF D8 50 0F 21 CD 64   9D 0F B5 3E 4A FA 65 92  ...P.!.d...>J.e.
#     0020: 79 E4 51 78 73 38 A7 5A   13 8B 5F A5 6D 9A 26 A8  y.Qxs8.Z.._.m.&.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.427 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:11.482 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FD B8 39 D7 EA 05 6C 50 9F 43 0A 53 AF D4 F9 D0 06 30 30 B2 B3 31 2F F7 45 70 56 5C 13 F7 69 41",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 07:52:11.807 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 07:52:11.811 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 07:52:12.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 07:52:12.751; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 07:52:13.131; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:52:13.134; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 07:52:13.134; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YgMPz8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:13.167 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 01 99 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:46.000 UTC",
#     "not  after"         : "2024-01-13 07:51:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 E4 B8 3E DD F0 A2 AE   05 DE 3A BE 89 83 C5 36  b..>......:....6
#         0010: FD 54 DF BC                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:13.172 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 68 28 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:38.000 UTC",
#     "not  after"         : "2024-01-13 07:51:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:13.188 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:13.518 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:13.519 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:13.519 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:13.519 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:13.676 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.677 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:13.679 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:13.679 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.685 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.697 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.697 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.697 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:13.700 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F0 7C 4A EE 91 12 89 E9 F5 F5 3B 63 1E 93 D1 ED F6 9F 36 EB 68 BF 99 1E E4 A5 E2 5A AE 95 A2 FF",
#   "session id"          : "21 DF 0F BB FA 1B 83 4B 7C 43 8F 99 DC 61 50 59 E2 E4 0A 26 87 04 B3 D6 8D BF C5 2C F7 2C F5 82",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 86 13 B3 87 6C 4C CD 44   3C 94 A4 CD 3D 0A 50 1B  ....lL.D<...=.P.
#             0010: B0 2D 82 0F 63 54 AA B6   8E DA 15 02 B5 16 5E 36  .-..cT........^6
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.799 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "89 30 71 3B 8F 50 28 5F D1 54 FE 91 EB AA B1 61 B8 E0 2F 9F CC D3 DD EC 4E E1 A5 E6 08 E2 7C 74",
#   "session id"          : "21 DF 0F BB FA 1B 83 4B 7C 43 8F 99 DC 61 50 59 E2 E4 0A 26 87 04 B3 D6 8D BF C5 2C F7 2C F5 82",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A6 66 63 24 C0 21 FC FC   FD 81 3B 1B B9 6B 61 0B  .fc$.!....;..ka.
#           0010: 0E C7 E9 43 AD 7A 58 80   B3 36 BD 09 60 C2 8F 2A  ...C.zX..6..`..*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.799 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.799 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.801 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.812 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.814 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.815 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.818 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.819 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.819 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.819 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.819 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.821 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.822 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.822 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.822 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.823 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.825 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.825 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.829 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 90 36 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:42.000 UTC",
#       "not  after"         : "2024-01-13 07:51:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 CC 09 D2 9B 89 35 7F   BC DC 37 85 88 98 E3 F7   .....5...7.....
#           0010: 9F BD AE 83                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.829 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.925 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A BE B1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 07:51:40.000 UTC",
#     "not  after"         : "2024-01-13 07:51:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#         0010: 9C DF B8 2A                                        ...*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#         0010: C3 26 E4 3A                                        .&.:
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.929 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 5F 27 31 A9 37 47 D6   7C 30 2F 7A 60 57 49 88  t_'1.7G..0/z`WI.
#     0010: B8 4C 8C 94 B6 D2 D6 EC   F7 35 DD 1F 77 ED 24 1F  .L.......5..w.$.
#     0020: 39 F4 11 67 55 4B 28 14   2E C6 74 08 BA 38 ED A2  9..gUK(...t..8..
#     0030: 72 FB 0B 55 14 FC A6 6F   1B A1 83 5E E2 98 29 58  r..U...o...^..)X
#     0040: E1 26 D3 56 23 94 D5 34   0A 01 63 73 1D C3 4A C0  .&.V#..4..cs..J.
#     0050: F6 E6 29 3E D8 C3 39 33   6D 69 B9 D9 B6 28 C9 22  ..)>..93mi...(."
#     0060: 17 D3 20 FB F7 F8 FF B3   AF 86 C5 51 86 12 77 F5  .. ........Q..w.
#     0070: 5A 09 89 3F B6 56 E2 4D   D4 A4 FC 07 8A C4 F6 93  Z..?.V.M........
#     0080: 6D 83 9E 08 73 54 02 59   A3 86 A9 E5 5E 12 28 E4  m...sT.Y....^.(.
#     0090: 33 64 AA C7 D8 A7 C1 28   8C 63 27 67 96 85 66 48  3d.....(.c'g..fH
#     00A0: 9E 7F 62 A4 E6 9C C2 4E   A6 F6 AC 5F E8 40 AC C6  ..b....N..._.@..
#     00B0: 36 C7 CA A7 E0 53 C7 52   92 2E F2 32 5C FA A9 3A  6....S.R...2\..:
#     00C0: EE 22 A1 6F 50 F9 60 CE   E7 30 2A A0 C8 66 4D 60  .".oP.`..0*..fM`
#     00D0: 41 23 E4 79 E9 23 50 86   B5 CE D4 74 4D DA 63 5F  A#.y.#P....tM.c_
#     00E0: B0 98 94 DA 56 27 60 EA   2C 10 D8 39 37 54 5F 11  ....V'`.,..97T_.
#     00F0: B2 35 20 8E 19 92 6A 6B   13 D5 13 8C 80 2B AF E3  .5 ...jk.....+..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.931 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 01 9E 98 6D 9B 86 4A   AA 0D 98 A1 08 D9 37 6E  ....m..J......7n
#     0010: CB 21 42 E0 D0 4D 32 70   41 D3 40 7C 39 92 6B C6  .!B..M2pA.@.9.k.
#     0020: 55 DB 53 9D 73 98 A6 2C   F4 D1 B8 FF B8 06 2B 55  U.S.s..,......+U
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.933 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:13.934 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.934 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:13.935 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.935 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 07:52:13.935 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:13.935 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.936 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.938 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 01 99 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:46.000 UTC",
#       "not  after"         : "2024-01-13 07:51:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 E4 B8 3E DD F0 A2 AE   05 DE 3A BE 89 83 C5 36  b..>......:....6
#           0010: FD 54 DF BC                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A BE B1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:40.000 UTC",
#       "not  after"         : "2024-01-13 07:51:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#           0010: 9C DF B8 2A                                        ...*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.965 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D D4 91 36 CB 93 86 BF   33 5E 50 78 09 12 5E 93  -..6....3^Px..^.
#     0010: 17 F3 1D D1 66 E2 9F A3   67 7A 5F A1 47 98 AA 53  ....f...gz_.G..S
#     0020: FF 3F CE F9 53 D9 0D DA   42 D2 12 22 07 B3 B8 74  .?..S...B.."...t
#     0030: CE C0 07 9C 72 FF A7 24   AE B1 D3 9C 0D 10 B1 9A  ....r..$........
#     0040: B8 64 9B DA 10 D4 7A C0   44 89 05 99 96 1C 27 22  .d....z.D.....'"
#     0050: 31 3B 11 86 26 73 3C E2   21 43 F1 04 9B 78 74 BC  1;..&s<.!C...xt.
#     0060: 4F 70 DE 9A AE D2 DC 1A   50 64 8F 1B 28 1D A1 1B  Op......Pd..(...
#     0070: 1C 49 07 1F 66 72 87 99   46 E0 C6 DA 0B 31 89 3E  .I..fr..F....1.>
#     0080: 0A 3F 4D B8 C4 F8 E4 49   F4 72 34 D2 78 C8 01 38  .?M....I.r4.x..8
#     0090: B2 B3 3A CC 21 E4 CE 86   9C 03 8A CF AA 9A 98 D6  ..:.!...........
#     00A0: 6C 4C 93 C7 66 BE D3 29   60 FB A9 5F 8B 35 66 2E  lL..f..)`.._.5f.
#     00B0: B5 E6 7B 29 B3 1B CC 46   99 B0 28 C6 E3 54 A3 00  ...)...F..(..T..
#     00C0: F6 D2 DE A9 82 01 DD 0E   62 8F B6 91 44 77 1B 1C  ........b...Dw..
#     00D0: AD E6 CD 13 B8 80 05 B1   C8 E8 2A 51 ED 5A C2 CD  ..........*Q.Z..
#     00E0: AE 98 8B BD 86 16 10 7B   F0 63 F9 6A D8 92 6C 42  .........c.j..lB
#     00F0: 7B 04 04 65 20 7A 45 6B   30 B5 0E E9 DC F4 24 4D  ...e zEk0.....$M
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.966 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 16 0C 0E CD 4B D8 49 6F   47 48 47 46 F4 05 E5 86  ....K.IoGHGF....
#     0010: 6E BD C0 90 63 09 4F 0D   DB 45 4B 78 D5 4B 5B ED  n...c.O..EKx.K[.
#     0020: D8 1F F6 BD 87 BE B7 AA   52 EE 32 F9 1E A3 0A CF  ........R.2.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:13.967 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:14.032 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "14 48 57 F1 05 07 2C 40 C9 EF 4A E7 72 B7 D6 4C 9E 4F 09 F9 F8 62 0F 69 0D 9E 9B 95 8D ED 35 A7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 07:52:14.317 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 07:52:14.318 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 07:52:25.842; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:26.159 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 68 28 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:38.000 UTC",
#       "not  after"         : "2024-01-13 07:51:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#           0010: 9C DF B8 2A                                        ...*
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A BE B1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 07:51:40.000 UTC",
#       "not  after"         : "2024-01-13 07:51:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E 1C 1C 5A 38 20 72 68   68 9C BD C1 89 22 69 E8  n..Z8 rhh...."i.
#           0010: 9C DF B8 2A                                        ...*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA B2 99 4C D8 C8 50 20   5D D8 DB 18 E7 53 F1 CE  ...L..P ]....S..
#           0010: C3 26 E4 3A                                        .&.:
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 07:52:26.175 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:26.270 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:26.270 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:26.271 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:52:26.271 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:26.408 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.408 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:26.410 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 07:52:26.410 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.426 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.426 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 07:52:26.429 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "EA C6 21 C9 7A 28 03 46 68 04 5C E9 3C 84 AE 5A 6D B6 EC 13 E2 5B 7F DD B9 23 1B B3 27 E3 24 22",
#     "session id"          : "F5 4B F8 2C 48 44 4E 78 EF 17 06 15 D7 22 81 7D 7E BD 52 BB 6D 49 48 0C 54 05 14 EE 6F DF 69 5E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4A 22 E9 A2 91 F4 F2 D6   9C 63 61 57 39 2F A1 15  J".......caW9/..
#               0010: 49 39 38 AC 5F AC 95 52   43 16 0E 62 05 FE 57 12  I98._..RC..b..W.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.448 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E3 2B 5D AC 74 70 83 E7 7E 8B D3 B4 51 46 2A D7 E7 B8 3B 4F 6A 48 CB 11 27 75 FE B7 7D 94 12 0C",
#     "session id"          : "F5 4B F8 2C 48 44 4E 78 EF 17 06 15 D7 22 81 7D 7E BD 52 BB 6D 49 48 0C 54 05 14 EE 6F DF 69 5E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E0 CA 9C 84 24 B9 D5 75   3D B0 EF 6A CF 1E D1 AB  ....$..u=..j....
#             0010: 14 BC 03 8A 8F B5 07 AB   88 BD 17 36 BB 83 90 15  ...........6....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.449 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.449 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.451 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.453 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.461 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.462 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.464 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.467 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.467 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.467 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:52:26.468 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 07:52:26.470 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 07:53:47.920 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:53:47.971 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:53:47.972 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:53:47.972 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 07:53:47.972 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34476/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28414ms
ok 65 stop command for single port in 31388ms
ok 66 status detects locally running solr in 14354ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2187ms
ok 69 copying files around in 6540ms
ok 70 upconfig in 2616ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 3s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5672 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5672/

All tests passed

Build Log:
[...truncated 1315 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40799/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 04:03:50.780; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 04:03:50.785; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 04:03:51.706; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 04:03:51.745; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22743ms
ok 61 start solr with client truststore and security manager in 25241ms
not ok 62 start solr with mTLS needed in 56879ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-dj6aeN/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40799.
#
# Started Solr server on port 40799 (pid=199021). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40800.
#
# Started Solr server on port 40800 (pid=199448). Happy searching!
#
# INFO  - 2023-10-15 04:05:14.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 04:05:14.820; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 04:05:15.191; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 04:05:15.194; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 04:05:15.194; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:15.226 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 DC 66 52",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:51.000 UTC",
#     "not  after"         : "2024-01-13 04:04:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 87 6B 9D 99 15 F4 50   7D EF 72 A9 3B 59 39 6C  *.k....P..r.;Y9l
#         0010: 99 04 F8 7C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:15.230 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 3D 66 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:42.000 UTC",
#     "not  after"         : "2024-01-13 04:04:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:15.244 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:15.469 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:15.471 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:15.471 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.488 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:15.490 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BF 0A 4D B9 9C 37 4E CA 04 43 FA B0 CE BD C8 B4 93 16 3C 40 45 6B A0 41 E9 41 D5 84 41 D9 5A B9",
#   "session id"          : "D1 FE E5 37 E6 89 F7 86 74 41 8E 75 64 39 65 42 5F 30 77 1C 3D F4 DE 5C 71 8F F3 1E 30 D2 65 02",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 14 C1 B3 66 87 B3 94 67   CF 0C D4 4D 0D E5 C5 0A  ...f...g...M....
#             0010: E3 9F E2 B8 E0 24 C7 10   54 B6 71 C3 A5 A0 D2 19  .....$..T.q.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.588 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "21 94 A0 FC 6F 75 B2 08 87 29 DF 93 1E B1 3A 6F A6 7B 95 DA 19 DC D6 CB D9 C6 C0 29 F5 B9 B8 4E",
#   "session id"          : "D1 FE E5 37 E6 89 F7 86 74 41 8E 75 64 39 65 42 5F 30 77 1C 3D F4 DE 5C 71 8F F3 1E 30 D2 65 02",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AD 2F CB 55 A4 B7 4C B3   57 5E 50 86 02 CD 5D 79  ./.U..L.W^P...]y
#           0010: 91 9C D1 09 5E 25 14 4F   5E 2C 71 C6 7E C1 56 79  ....^%.O^,q...Vy
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.588 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.589 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.590 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.590 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.590 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.591 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.591 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.591 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.591 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.591 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.594 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.594 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.594 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.596 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.596 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.596 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.596 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.603 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.604 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.606 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.609 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.609 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.609 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.612 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.612 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.612 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.612 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.613 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.614 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.614 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.617 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 1C 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:47.000 UTC",
#       "not  after"         : "2024-01-13 04:04:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 69 DE C6 07 0B ED 25   D9 A0 7B 01 B8 40 B3 47  .i.....%.....@.G
#           0010: CF 7D 5A E5                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.617 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:15.653 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:15.655 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:15.656 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:15.656 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.698 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.702 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 0A 57 B8 A6 8F 8C 3A   84 93 D8 E3 B8 B0 94 47  j.W....:.......G
#     0010: 5B 3D 9F 6B A8 14 7D 1E   4E 88 C6 E2 6D 03 4E 1E  [=.k....N...m.N.
#     0020: BB 2C A8 5E 04 24 F9 09   95 47 C5 45 A8 DA F7 A4  .,.^.$...G.E....
#     0030: A4 99 70 1D 26 EA B5 75   3F EB B4 B6 3F 0B AC 04  ..p.&..u?...?...
#     0040: E2 C8 D8 BC 60 C6 2C 0D   6F 76 AD 7E 1D 2F ED 3D  ....`.,.ov.../.=
#     0050: 90 AE D4 C1 9A B0 6C 8D   CE 5E 46 1F D6 80 3E B9  ......l..^F...>.
#     0060: BB 78 71 0C 19 68 9F A1   99 96 A2 93 45 97 81 27  .xq..h......E..'
#     0070: 0C F5 E5 BD 28 26 43 10   27 77 1D 4F 56 79 FD A6  ....(&C.'w.OVy..
#     0080: 33 7B 7B 1A 1C 8E 28 19   58 4B 2C 9D C3 DF 72 1D  3.....(.XK,...r.
#     0090: F7 11 EB EF B0 6E 0F 7F   3E 5F 3A 10 09 64 2B 60  .....n..>_:..d+`
#     00A0: 72 56 57 59 51 E1 7A 8E   A7 CA 84 2A 7A B7 81 CE  rVWYQ.z....*z...
#     00B0: 68 66 A0 29 F2 D0 04 87   06 2D 60 1C 94 6F 10 89  hf.).....-`..o..
#     00C0: 21 27 6E 3C FB 93 E1 39   03 51 73 25 5B EB 38 AC  !'n<...9.Qs%[.8.
#     00D0: 7C F4 BB AC 11 CF D5 CF   2C 29 C8 D5 7C 1A 18 78  ........,).....x
#     00E0: 59 2F 8E CB F6 03 D6 87   83 5F 3F 8F F7 91 72 5B  Y/......._?...r[
#     00F0: 1B 2E 16 67 AD A1 BD 71   26 EB 62 3F 3E C8 2B 52  ...g...q&.b?>.+R
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.704 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF 29 32 95 8D 33 6D 38   3D B4 5C 65 ED C1 AE 9D  .)2..3m8=.\e....
#     0010: 13 D7 FE 43 C5 E2 7E B9   C6 CC E4 9C F2 7C 36 0E  ...C..........6.
#     0020: A2 B2 2A 08 92 84 D1 8A   7A A8 F7 9E 0D 41 08 4B  ..*.....z....A.K
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:15.707 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.708 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:15.708 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.708 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:15.708 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:15.708 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.709 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.711 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 DC 66 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:51.000 UTC",
#       "not  after"         : "2024-01-13 04:04:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 87 6B 9D 99 15 F4 50   7D EF 72 A9 3B 59 39 6C  *.k....P..r.;Y9l
#           0010: 99 04 F8 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 42 C2 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:44.000 UTC",
#       "not  after"         : "2024-01-13 04:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#           0010: 7C 99 15 9D                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.736 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 51 6C 22 31 A2 CE BE   A8 83 B7 19 0D E0 B4 20  4Ql"1..........
#     0010: 64 39 7D 5F 65 BC 63 69   58 0F 2F 33 47 12 50 01  d9._e.ciX./3G.P.
#     0020: 21 C5 F7 9E 1E 7E 20 34   B6 67 8C 6C FF 64 FA 7F  !..... 4.g.l.d..
#     0030: E3 B3 EE C6 5D D4 0E 02   C3 4D E3 92 73 32 F2 93  ....]....M..s2..
#     0040: 7D 4C 77 C8 1E 21 FE 64   79 01 98 6F 16 AD 73 F2  .Lw..!.dy..o..s.
#     0050: A9 E8 A9 FB 9F AD 61 ED   78 49 39 BD 9F 69 14 20  ......a.xI9..i.
#     0060: 36 A1 66 27 1A BD 96 FA   63 65 15 0A 5D F5 DB E4  6.f'....ce..]...
#     0070: B2 B7 D4 65 5C 90 29 20   3E 32 EF EE F6 D8 F2 A1  ...e\.) >2......
#     0080: B1 7E 1F 73 41 38 35 C6   25 C5 06 35 4B 71 77 9D  ...sA85.%..5Kqw.
#     0090: 41 CA D8 BF FC C0 2A 2D   87 5E 84 67 ED 20 BC 2F  A.....*-.^.g. ./
#     00A0: 11 A9 B1 B3 91 8F A5 93   CB C2 6B F3 43 5F F8 F1  ..........k.C_..
#     00B0: 35 50 E8 01 26 35 31 9D   5E 6B 10 02 FD F2 47 F3  5P..&51.^k....G.
#     00C0: 93 23 BF F6 D4 54 46 34   D0 BC E5 F4 69 35 4F BD  .#...TF4....i5O.
#     00D0: 2C 4F D1 3A 9C DD B6 7A   C3 C0 06 B5 B8 F8 35 FD  ,O.:...z......5.
#     00E0: 63 46 39 49 A0 20 B2 3F   B4 4B 8E 1D 93 FD 4D C3  cF9I. .?.K....M.
#     00F0: 6B FA 63 DF D1 42 03 C7   30 19 9E 67 39 8B 4A EB  k.c..B..0..g9.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.738 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 46 99 93 D8 5A 7C 56 FB   66 A4 61 13 C8 33 94 1A  F...Z.V.f.a..3..
#     0010: D9 2F A9 84 E3 62 5C 66   C8 CF CD 94 A2 12 E1 29  ./...b\f.......)
#     0020: 38 33 25 C4 1E E3 82 64   2E 36 9D 34 D4 D0 44 2A  83%....d.6.4..D*
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.738 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:15.793 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "14 E0 B8 E8 8A 45 AE 43 B0 54 75 45 3E 73 D0 F0 86 8C 0A 39 B0 CD EB 15 05 24 B5 55 52 19 B1 50",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 04:05:16.065 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 04:05:16.066 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 04:05:17.032; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 04:05:17.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 04:05:17.414; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 04:05:17.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 04:05:17.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dj6aeN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:17.452 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 DC 66 52",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:51.000 UTC",
#     "not  after"         : "2024-01-13 04:04:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 87 6B 9D 99 15 F4 50   7D EF 72 A9 3B 59 39 6C  *.k....P..r.;Y9l
#         0010: 99 04 F8 7C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:17.456 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 3D 66 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:42.000 UTC",
#     "not  after"         : "2024-01-13 04:04:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:17.472 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:18.013 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.013 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:18.015 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:18.015 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.033 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.033 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.034 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:18.036 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E5 5C 24 BF 8F 97 14 88 93 81 A8 9F EE C9 D6 54 9A 6F AA 2A 27 A7 8B 60 2C 3B E5 FB 52 83 8E B4",
#   "session id"          : "2F 26 4E E1 77 F0 CB 27 68 C5 4A FA 08 E7 47 A9 B9 2E 5F 9B B9 77 44 75 55 58 E4 70 30 6D 89 4D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA 3B AE C8 6C 39 EC 45   84 4E F2 92 39 2C BA BB  .;..l9.E.N..9,..
#             0010: 1F 62 86 03 22 66 5B 43   1D 66 B1 84 7E 67 44 49  .b.."f[C.f...gDI
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.137 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "63 D3 15 4D 82 6C A0 7D 94 82 21 2A D9 30 17 4D F3 CD C7 74 6F B6 CA FA D2 B1 C5 8F 4B 5A 7C 6D",
#   "session id"          : "2F 26 4E E1 77 F0 CB 27 68 C5 4A FA 08 E7 47 A9 B9 2E 5F 9B B9 77 44 75 55 58 E4 70 30 6D 89 4D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9A ED 99 01 DC 91 B9 ED   D8 58 B7 6A 9A 53 E3 3A  .........X.j.S.:
#           0010: 8A 9F 8E A1 03 A2 1E E3   66 79 04 39 50 8A 9C 61  ........fy.9P..a
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.137 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.137 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.140 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.143 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.143 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.155 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.158 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.160 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.161 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.161 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.161 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.162 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.163 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.164 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.164 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.168 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 1C 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:47.000 UTC",
#       "not  after"         : "2024-01-13 04:04:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 69 DE C6 07 0B ED 25   D9 A0 7B 01 B8 40 B3 47  .i.....%.....@.G
#           0010: CF 7D 5A E5                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.168 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:18.236 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:18.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:18.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:18.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.262 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 42 C2 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 04:04:44.000 UTC",
#     "not  after"         : "2024-01-13 04:04:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#         0010: 7C 99 15 9D                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#         0010: D3 DE 5C 1B                                        ..\.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.265 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 62 50 B9 FB DE 97 97   79 C8 E9 50 FF 52 C4 E2  .bP.....y..P.R..
#     0010: D9 B6 7B 62 99 28 DC C7   C6 64 05 52 56 63 83 D0  ...b.(...d.RVc..
#     0020: 52 4F 40 C5 FF E2 C7 60   5D B0 F7 47 9C 3D 8C 3F  RO@....`]..G.=.?
#     0030: 2E E9 CB D3 60 B7 CC 16   4D 9B FF 5A 51 A0 24 72  ....`...M..ZQ.$r
#     0040: 9B 12 DD 12 67 40 CF C5   F6 DD B5 9A ED 2E 72 B4  ....g@........r.
#     0050: D4 38 01 0D F5 22 BB E1   12 0E 01 A0 B3 D5 28 A3  .8..."........(.
#     0060: B5 53 CB 5D 70 88 C1 E8   4B 75 CD DD E7 D1 1A E8  .S.]p...Ku......
#     0070: 13 B4 12 33 18 5E 1C 0D   EC A3 9F 4B F5 A4 D3 69  ...3.^.....K...i
#     0080: F4 2E 3B 3A CE 1C CA D0   15 31 C3 7E 48 74 D9 A5  ..;:.....1..Ht..
#     0090: 01 95 E0 94 0F 3D 8C 2F   CD C8 07 91 F0 32 6D 53  .....=./.....2mS
#     00A0: AE B6 E2 67 F2 71 14 91   F4 89 EA FE E6 DC 02 6F  ...g.q.........o
#     00B0: 93 5E 45 9C FC 8B 34 75   F5 1C E4 1A 03 46 95 DB  .^E...4u.....F..
#     00C0: 4A 1A 0E 8E 5F D0 61 BC   FD 59 2F 51 5D 47 52 BD  J..._.a..Y/Q]GR.
#     00D0: E7 ED 30 E2 14 91 7E EB   84 77 10 58 ED 52 E2 3A  ..0......w.X.R.:
#     00E0: 6C B9 1D 5C 06 D8 E7 20   2F D8 16 A7 80 94 AE EF  l..\... /.......
#     00F0: CB ED D2 ED AD 8E 45 56   79 12 1F B6 8F 84 03 99  ......EVy.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.267 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6E F2 85 08 D3 44 9B D7   05 9A D9 CC EB 43 44 15  n....D.......CD.
#     0010: F4 7D D0 5A E3 15 85 3E   9D 09 A3 54 1B BF DA 85  ...Z...>...T....
#     0020: 85 87 B5 DD A3 F4 1E 73   8E 07 11 E7 24 1E CD C6  .......s....$...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.269 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:18.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.271 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:18.271 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.271 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 04:05:18.271 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:18.272 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.272 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.275 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 DC 66 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:51.000 UTC",
#       "not  after"         : "2024-01-13 04:04:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 87 6B 9D 99 15 F4 50   7D EF 72 A9 3B 59 39 6C  *.k....P..r.;Y9l
#           0010: 99 04 F8 7C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 42 C2 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:44.000 UTC",
#       "not  after"         : "2024-01-13 04:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#           0010: 7C 99 15 9D                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.301 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 B8 F5 8F 0C 29 29 A7   3B 0E 4B CF 7E 2F 5C 7A  .....)).;.K../\z
#     0010: 3A D4 E2 7C 8B D9 81 3A   BD AD 24 08 3F 48 C9 7D  :......:..$.?H..
#     0020: 34 F4 C4 10 8C CD 5A 72   24 93 0B 3A 5A 74 2E 05  4.....Zr$..:Zt..
#     0030: 53 A0 03 E1 0E 49 52 84   19 32 2D 61 26 D5 39 AA  S....IR..2-a&.9.
#     0040: 42 80 08 4B 43 02 4D 26   13 88 C6 A5 98 28 12 CE  B..KC.M&.....(..
#     0050: 9A 10 0A 1D 22 CC DF 4E   D8 EF C8 45 A7 AF BD 5C  ...."..N...E...\
#     0060: D6 43 AB 74 56 6F 7E 4A   05 D7 55 2D 87 A7 52 98  .C.tVo.J..U-..R.
#     0070: 27 F7 6F D3 88 25 7C 6A   30 9E 64 A5 AD FD AF EF  '.o..%.j0.d.....
#     0080: A7 45 D6 20 DD E9 06 74   CE 0F E4 65 29 BC B5 73  .E. ...t...e)..s
#     0090: 98 F7 2D 62 41 27 0D D9   8F 23 71 46 0C 3C 2F ED  ..-bA'...#qF.</.
#     00A0: 40 5D F0 A8 F3 69 71 F0   B0 70 BA C3 10 28 23 99  @]...iq..p...(#.
#     00B0: 4A 47 69 CE 08 CE 6A D2   7D 9A 5F 9D 5B AA 24 2C  JGi...j..._.[.$,
#     00C0: FD 50 46 E1 F3 2E FE 0C   73 B7 39 2C 53 1F 95 FE  .PF.....s.9,S...
#     00D0: 7F 7F 66 8C DF FB 81 73   07 B2 6E 93 49 34 43 33  ..f....s..n.I4C3
#     00E0: 9D 2A 82 99 5B F2 D1 B7   40 1F 35 37 F7 E1 C8 EF  .*..[...@.57....
#     00F0: 56 AE 65 32 16 00 02 94   AF DB 0C 9A 1E C7 42 A0  V.e2..........B.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.302 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 CC 13 56 9D 7F BA E9   E6 E8 31 8D F3 97 BF 43  ...V......1....C
#     0010: FA 93 86 AE 1B 49 C4 FD   C3 8F 41 6A 8C C7 84 9B  .....I....Aj....
#     0020: 84 DB 6D D4 51 63 94 F4   18 D6 B3 00 4B 46 70 A2  ..m.Qc......KFp.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.303 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:18.360 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8B 41 04 69 C4 DB B2 41 B5 36 31 CB C3 FE 23 8C 55 EF D0 4A 09 95 5A E6 23 30 8F 53 07 48 D5 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 04:05:18.636 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 04:05:18.637 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 04:05:29.630; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:29.964 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 42 C2 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:44.000 UTC",
#       "not  after"         : "2024-01-13 04:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#           0010: 7C 99 15 9D                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D0 E4 74 26 A3 61 76 96   AA 74 A9 B4 27 F4 4A A2  ..t&.av..t..'.J.
#           0010: D3 DE 5C 1B                                        ..\.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 3D 66 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 04:04:42.000 UTC",
#       "not  after"         : "2024-01-13 04:04:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 04 E6 E9 8E 07 EE D6   A4 E5 39 A4 43 17 73 7E  ..........9.C.s.
#           0010: 7C 99 15 9D                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 04:05:29.980 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:30.343 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:30.343 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:30.344 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:05:30.345 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:30.475 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:30.477 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 04:05:30.478 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.484 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.496 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 04:05:30.499 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "18 B6 86 5A 3D C5 67 C8 C2 B5 8A 61 34 96 A4 85 D0 38 9F 6C AD CC C5 70 27 13 1F 9F F8 B4 85 62",
#     "session id"          : "FC AF D5 51 98 13 02 6C E7 8F CE 3A 21 BA 2E 42 27 E7 BA BB 83 24 94 AA 55 57 2B CF E7 1E 00 7A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A2 DB 16 0F 8F 1D B4 A3   CB F2 92 97 BA F5 57 F8  ..............W.
#               0010: B0 97 1E B9 17 DC 5B F6   70 DB 53 D2 5C EB 3D 7C  ......[.p.S.\.=.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.517 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "01 2B 66 CA AE 97 41 C9 4E 32 01 13 4D 98 92 F7 18 C3 C1 98 AD 99 CC 33 9C 64 B0 4A 95 AC E6 82",
#     "session id"          : "FC AF D5 51 98 13 02 6C E7 8F CE 3A 21 BA 2E 42 27 E7 BA BB 83 24 94 AA 55 57 2B CF E7 1E 00 7A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 2D F1 84 CB F2 2D A0   68 1B BC F3 70 CE 8A B3  q-....-.h...p...
#             0010: 53 4A 84 7E 28 EA 60 E7   BB 5B 24 35 5F FD 6F 66  SJ..(.`..[$5_.of
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.517 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.520 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.522 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.522 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.524 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.532 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.533 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.534 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.538 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.538 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.538 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.538 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.539 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.539 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:30.539 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:05:30.539 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 04:05:30.541 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 04:06:48.900 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:06:48.945 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:06:48.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:06:48.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 04:06:48.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40800/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28776ms
ok 65 stop command for single port in 31593ms
ok 66 status detects locally running solr in 14621ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2168ms
ok 69 copying files around in 6594ms
ok 70 upconfig in 2609ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m44s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5671 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5671/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44393/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-15 01:00:47.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 01:00:47.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-15 01:00:48.366; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-15 01:00:48.403; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22793ms
ok 61 start solr with client truststore and security manager in 25555ms
not ok 62 start solr with mTLS needed in 58398ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UGBlam/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44393.
#
# Started Solr server on port 44393 (pid=199751). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44394.
#
# Started Solr server on port 44394 (pid=200200). Happy searching!
#
# INFO  - 2023-10-15 01:02:11.640; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 01:02:11.646; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 01:02:11.999; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 01:02:12.002; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 01:02:12.003; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:12.035 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 9B 28 FB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:47.000 UTC",
#     "not  after"         : "2024-01-13 01:01:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 A7 2A F0 30 11 CC F1   E6 CC 31 40 4B 09 79 B8  I.*.0.....1@K.y.
#         0010: BE 78 E7 21                                        .x.!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:12.039 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 BC BD 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:39.000 UTC",
#     "not  after"         : "2024-01-13 01:01:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:12.053 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:12.139 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:12.141 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:12.141 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:12.141 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:12.278 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.279 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:12.280 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:12.281 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.297 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.297 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.298 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:12.300 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "87 02 13 12 9D 4F 19 65 5A DF A7 11 A5 54 70 1A B2 3C 89 A7 B7 B1 EB B8 EE F5 B9 E3 A6 18 2C 44",
#   "session id"          : "2B 25 60 9F FF AD DD 85 67 81 9E 52 E6 B7 26 CD F8 3B 93 D3 3E 24 9D C2 DC 2E 3C 5E B5 77 A0 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9E C1 A1 E6 60 45 67 87   75 66 DC 82 81 71 67 3C  ....`Eg.uf...qg<
#             0010: DA 96 1E 69 5E 5D 0B FB   91 05 DA 4D D3 56 5C 55  ...i^].....M.V\U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.409 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "66 D6 CC 9F 02 22 F4 19 79 CD 85 C6 23 36 9B 44 1B 3A DB 2F 50 0D 9A F5 1D 75 C8 EF E8 6F BF 90",
#   "session id"          : "2B 25 60 9F FF AD DD 85 67 81 9E 52 E6 B7 26 CD F8 3B 93 D3 3E 24 9D C2 DC 2E 3C 5E B5 77 A0 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE AE 4C 56 C2 14 6F 78   21 04 4C BD C2 6C 9B 8D  ..LV..ox!.L..l..
#           0010: 15 FE B8 FE 42 68 60 10   E0 3F 3A 8A 5C 41 06 17  ....Bh`..?:.\A..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.409 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.410 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.411 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.412 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.412 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.414 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.415 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.416 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.423 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.425 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.426 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.430 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.431 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.432 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.433 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.433 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.433 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.434 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.435 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.435 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.438 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 00 68 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:44.000 UTC",
#       "not  after"         : "2024-01-13 01:01:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 71 DD 2F 3D C2 55 95   C6 A4 1E 68 D3 B9 EA BC  oq./=.U....h....
#           0010: B5 BF 8A 26                                        ...&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.438 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.517 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.521 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 50 C2 2A 37 59 B0 E8   4E 1E 3E 60 BD 18 40 25  .P.*7Y..N.>`..@%
#     0010: 01 22 9A F4 79 B3 69 A1   B5 AB 56 FA A4 9C 65 A8  ."..y.i...V...e.
#     0020: C5 0E 8A DE FF AB C6 1F   75 3D 86 EE 55 AA 19 E4  ........u=..U...
#     0030: 89 55 FF 35 44 84 8B 79   81 5B D7 3C 88 FA 50 26  .U.5D..y.[.<..P&
#     0040: BE D5 DD BB 8A 89 52 2D   0C C4 A8 E1 D5 F4 9F 73  ......R-.......s
#     0050: AA 4F 98 03 BF F7 14 BC   C0 04 9E 0B 79 D1 6B A4  .O..........y.k.
#     0060: 9B BD 89 72 FA CC 4D 1F   C9 4E 0C C9 53 50 CC CD  ...r..M..N..SP..
#     0070: 6C 2C 63 62 78 1F 3B 89   9B 37 5A E7 2C 3C 15 4A  l,cbx.;..7Z.,<.J
#     0080: 73 18 A2 2F 49 C1 59 FF   96 15 AB F6 5A 66 5B D7  s../I.Y.....Zf[.
#     0090: 47 D4 38 4A 82 99 71 C1   B3 8E FD 19 2C C5 32 C1  G.8J..q.....,.2.
#     00A0: F8 E1 B9 09 2F 5F 73 8D   2B 43 59 66 44 26 40 65  ..../_s.+CYfD&@e
#     00B0: FF 94 4C 36 15 F3 F7 BE   AD 5A 69 00 30 74 CC 03  ..L6.....Zi.0t..
#     00C0: 14 C0 54 B7 D8 89 B9 1C   38 0F 9F 0F 62 F0 90 FC  ..T.....8...b...
#     00D0: 9F 69 7C C3 FA AD 7A 8A   66 AA 46 C9 E9 BF 0B E3  .i....z.f.F.....
#     00E0: CD CC C8 6E F3 7E 90 52   E9 3C C8 BB 94 50 30 41  ...n...R.<...P0A
#     00F0: 73 33 28 35 73 EB A3 55   A9 2A 7C D2 BB 09 2F 70  s3(5s..U.*..../p
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.523 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 95 C5 99 47 72 1E D6 AD   6C 0D 2E 1A 14 A8 54 26  ...Gr...l.....T&
#     0010: 07 69 93 EF F1 97 75 FB   F3 FB BF BA EB 8B EE 19  .i....u.........
#     0020: D1 77 85 ED AD AD 53 3A   1E 90 50 D0 1E 97 97 9D  .w....S:..P.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.525 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:12.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:12.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.527 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:12.527 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:12.527 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.528 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.530 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 9B 28 FB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:47.000 UTC",
#       "not  after"         : "2024-01-13 01:01:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 A7 2A F0 30 11 CC F1   E6 CC 31 40 4B 09 79 B8  I.*.0.....1@K.y.
#           0010: BE 78 E7 21                                        .x.!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D A4 1D D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:41.000 UTC",
#       "not  after"         : "2024-01-13 01:01:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#           0010: D7 91 B8 A7                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.556 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 6A 80 B5 6B 31 96 DD   20 8B A1 91 79 13 C3 88  fj..k1.. ...y...
#     0010: 05 2B 7B D5 AD 54 F5 3A   43 0C 7D 1C 6F 7D 27 0C  .+...T.:C...o.'.
#     0020: 04 D9 3C 9F F3 88 DC 1D   03 78 09 37 22 E1 A3 A4  ..<......x.7"...
#     0030: 2A AF 95 59 D2 B5 D8 E4   D7 F4 D8 6B 79 F4 2B A4  *..Y.......ky.+.
#     0040: 4D E7 FA E6 CD 71 19 44   C2 AA BE 00 A9 69 7F 35  M....q.D.....i.5
#     0050: E9 48 9A 0D 9B 98 BA 80   46 A4 8A 0C FE 80 FF 77  .H......F......w
#     0060: 2E 80 33 EA DC 9A EE 56   71 88 F1 95 4C 9E DB 4C  ..3....Vq...L..L
#     0070: F9 61 C2 66 74 7B 30 9B   76 5B 9D 22 7C 73 12 E3  .a.ft.0.v[.".s..
#     0080: C1 6F 0C 5C 77 45 29 E0   1E 0C 20 84 D9 FC 37 A7  .o.\wE)... ...7.
#     0090: 6B 18 91 12 0A 5D 6F 38   10 32 D1 D7 AB 14 AC 06  k....]o8.2......
#     00A0: B7 57 3D 2C 11 7C 08 A2   86 A9 62 2A 35 3A 17 F8  .W=,......b*5:..
#     00B0: 89 3E 61 B1 3D 28 85 A5   01 B9 90 DD FE 6F 63 5A  .>a.=(.......ocZ
#     00C0: EE C8 E6 34 9B C2 41 FC   52 27 20 FD 9E 4E B6 8E  ...4..A.R' ..N..
#     00D0: 95 5E B3 DA FD 7F 02 05   80 FB 52 68 31 22 C7 93  .^........Rh1"..
#     00E0: C7 B9 E2 3C 4B CB 53 58   2E 8D B5 E8 53 2C 5A 07  ...<K.SX....S,Z.
#     00F0: F2 9D 8C CE DC 3F B9 4F   22 19 E0 50 8F 32 DE 19  .....?.O"..P.2..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.557 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D7 8E 41 33 F9 A8 12 2F   40 C8 EE A0 8C 8C 22 7A  ..A3.../@....."z
#     0010: 04 95 44 99 22 24 3E 9B   DA FB F1 91 6B 02 D8 73  ..D."$>.....k..s
#     0020: AA 16 93 1B 8F 47 89 3E   BA 7C BE 59 1E 56 E6 43  .....G.>...Y.V.C
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.558 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:12.614 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "53 BA 7D D2 DA 17 BB 79 0D BA CB 50 7C F3 FB FE 00 2A D7 EC CF A1 9A D7 37 54 BF 52 11 DC 06 ED",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 01:02:12.901 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 01:02:12.902 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 01:02:13.837; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 01:02:13.843; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 01:02:14.202; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 01:02:14.205; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 01:02:14.205; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UGBlam/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:14.237 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 9B 28 FB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:47.000 UTC",
#     "not  after"         : "2024-01-13 01:01:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 A7 2A F0 30 11 CC F1   E6 CC 31 40 4B 09 79 B8  I.*.0.....1@K.y.
#         0010: BE 78 E7 21                                        .x.!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:14.241 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 BC BD 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:39.000 UTC",
#     "not  after"         : "2024-01-13 01:01:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:14.254 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:14.342 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:14.343 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:14.343 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:14.344 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:14.480 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:14.482 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:14.483 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:14.503 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB DF EA 5E 88 46 34 8F 1C 01 17 B3 B5 B7 0C 3A 2D FA EB DF 57 6A 7B E9 20 64 89 EB 9A 3D C7 60",
#   "session id"          : "52 38 35 7E A7 15 A7 44 90 E9 2F C7 F2 58 0A E8 E1 8B 55 68 A2 B6 A1 DC 4E BB 8F E9 57 FF 04 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3B 7B 6D 17 58 76 4E C3   AD 05 71 A5 1C 1A 6E C3  ;.m.XvN...q...n.
#             0010: 3B F3 5D C3 CA 03 84 DD   3A 42 EF 85 29 44 27 6A  ;.].....:B..)D'j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.602 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2E 45 D7 EA 0A E2 3F E7 00 B1 44 A4 3D BA CB CF CF BF 69 C8 53 E2 EB 7F CE CD 73 D7 DA 11 99 74",
#   "session id"          : "52 38 35 7E A7 15 A7 44 90 E9 2F C7 F2 58 0A E8 E1 8B 55 68 A2 B6 A1 DC 4E BB 8F E9 57 FF 04 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 49 03 D2 DE 98 C3 71 E6   D0 9D B2 CE A4 FE 44 84  I.....q.......D.
#           0010: A5 3D BB 3F 93 F2 F4 70   4A 58 A8 A3 0C 88 DF 55  .=.?...pJX.....U
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.602 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.602 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.604 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.607 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.607 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.607 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.608 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.609 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.616 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.618 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.619 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.622 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.623 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.625 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.628 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.630 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 00 68 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:44.000 UTC",
#       "not  after"         : "2024-01-13 01:01:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 71 DD 2F 3D C2 55 95   C6 A4 1E 68 D3 B9 EA BC  oq./=.U....h....
#           0010: B5 BF 8A 26                                        ...&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.631 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.713 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D A4 1D D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 01:01:41.000 UTC",
#     "not  after"         : "2024-01-13 01:01:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#         0010: D7 91 B8 A7                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#         0010: EA 7E 30 E0                                        ..0.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.717 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 3B 34 A7 4C B5 AE CE   F1 62 F1 A5 CE 4D 9E F5  W;4.L....b...M..
#     0010: 47 12 91 2A 11 7B 17 8A   68 E8 AB 8A 34 27 5E EE  G..*....h...4'^.
#     0020: 9C 36 5A DD E2 0E FF C8   FC 4D FF 9A 5E 78 7F 1A  .6Z......M..^x..
#     0030: A6 84 3C 94 CA 02 EC A7   49 00 A7 6A FF 8C 7F 8C  ..<.....I..j....
#     0040: F4 DC 2A 95 CA DD C0 C9   11 7C 49 3A 68 6E A2 20  ..*.......I:hn.
#     0050: 1F C7 88 7E 47 FD 33 D1   49 5B 35 6E 4C 70 B9 1A  ....G.3.I[5nLp..
#     0060: 50 57 D5 F1 C1 70 97 F7   A7 CC 49 E3 5E 04 52 E5  PW...p....I.^.R.
#     0070: D5 E8 F0 0D A9 6B A9 4F   E1 1D A8 63 84 3B 8A B3  .....k.O...c.;..
#     0080: 61 E0 E7 2F 17 78 B1 7F   4D 36 1A 4B 6E B2 AB 70  a../.x..M6.Kn..p
#     0090: D2 10 DF A1 71 6D 3F 5F   4A 99 15 13 CB AF 90 2C  ....qm?_J......,
#     00A0: 03 08 6A B0 4F 53 1C F2   89 BB B1 2B 5D 83 C4 A4  ..j.OS.....+]...
#     00B0: AE 80 88 01 F7 E1 D9 E2   98 AA 25 7F 03 2A A4 BB  ..........%..*..
#     00C0: 30 CB 83 E5 6F 36 53 9A   52 F2 21 CE 26 AD C4 39  0...o6S.R.!.&..9
#     00D0: 77 FA 99 50 1E 0F CC 88   2C 24 7B CC E6 23 0E 54  w..P....,$...#.T
#     00E0: C7 0A 33 37 7A 53 CA 4F   FC 12 88 F4 70 F6 23 A5  ..37zS.O....p.#.
#     00F0: C8 6B C3 60 F9 F4 5B 10   23 C3 70 93 91 F7 4A E2  .k.`..[.#.p...J.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.718 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 05 89 03 91 8D 2D 6F 41   56 94 BA A2 59 16 FA 80  .....-oAV...Y...
#     0010: 4E F8 77 C9 62 58 D2 1E   12 D5 AB 40 97 CD 08 E9  N.w.bX.....@....
#     0020: EA 8C 19 A7 8E C0 B3 5B   91 69 F2 AB E1 05 98 72  .......[.i.....r
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.721 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:14.722 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.722 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:14.722 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.722 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-15 01:02:14.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:14.723 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.724 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.726 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 9B 28 FB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:47.000 UTC",
#       "not  after"         : "2024-01-13 01:01:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 A7 2A F0 30 11 CC F1   E6 CC 31 40 4B 09 79 B8  I.*.0.....1@K.y.
#           0010: BE 78 E7 21                                        .x.!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D A4 1D D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:41.000 UTC",
#       "not  after"         : "2024-01-13 01:01:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#           0010: D7 91 B8 A7                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.753 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E 3B 8E 00 14 E7 35 F0   B5 7B 3B A5 F9 4A F3 95  .;....5...;..J..
#     0010: A9 B1 6A C9 DD 8D 9D BF   5A CE 60 8C A8 36 11 C4  ..j.....Z.`..6..
#     0020: 88 11 79 40 6B 2B 09 A8   AE 7B DA 20 CB DE 5F FE  ..y@k+..... .._.
#     0030: 66 20 D5 C1 F7 9D DF 46   9D D3 FA BB B0 A6 04 97  f .....F........
#     0040: 07 0B 3C 16 AC AE 0A DC   56 DD 50 1E 20 AA 56 80  ..<.....V.P. .V.
#     0050: 3C 71 1C F1 D2 EB 63 2A   DE 69 9A 42 95 C7 1D A9  <q....c*.i.B....
#     0060: 23 7A 1C 04 76 0C 3D FC   31 DB A9 4C 62 AF 3B D7  #z..v.=.1..Lb.;.
#     0070: 19 06 82 77 04 9E B8 2A   95 B8 EB 7A 99 C6 DB 0B  ...w...*...z....
#     0080: 37 EA C4 0F 44 A8 25 AB   4F 8B B4 70 78 D9 E1 B2  7...D.%.O..px...
#     0090: 51 12 1D 14 F9 DF 39 14   4F CA 30 59 F9 C4 9A 4D  Q.....9.O.0Y...M
#     00A0: EF 6C AD AF DD 9B A2 FD   E0 9F D5 27 E0 AC B4 0E  .l.........'....
#     00B0: 92 1B 9E 3C E0 8E 8C 4C   89 55 E9 D9 C6 CA 06 BF  ...<...L.U......
#     00C0: 36 EF 45 9F DB D8 CA B4   0E 63 69 E5 3C 11 19 BF  6.E......ci.<...
#     00D0: 30 6E 0C 13 68 C2 11 02   47 AC D6 7E 8D 24 7C E1  0n..h...G....$..
#     00E0: B4 21 74 97 09 68 FB 5C   D5 9C 61 50 E5 1B 2A 60  .!t..h.\..aP..*`
#     00F0: F7 6C 78 E1 92 7C 2F 13   7A 38 34 D4 A2 B2 60 A1  .lx.../.z84...`.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.754 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8B 4B FC 19 B3 28 9E 2C   DB BC E9 20 86 E3 03 A4  .K...(.,... ....
#     0010: 03 1A CA 94 BD 08 B1 00   AB 54 4B 3C AB 7D 7E DA  .........TK<....
#     0020: 87 79 46 E9 DF AF 4F 09   6C A0 68 2F 47 92 39 9E  .yF...O.l.h/G.9.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.754 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:14.810 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5D 48 60 44 0E 7B 83 D3 B6 4D EA C4 D2 53 C5 D3 64 EF D1 C6 04 4E 35 FE 0E A4 80 7D 2C 6B D4 57",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 01:02:15.098 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 01:02:15.099 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-15 01:02:26.494; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:26.804 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 BC BD 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:39.000 UTC",
#       "not  after"         : "2024-01-13 01:01:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#           0010: D7 91 B8 A7                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D A4 1D D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 01:01:41.000 UTC",
#       "not  after"         : "2024-01-13 01:01:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 EF DB 05 BB 89 BC AE   DC 11 0F 14 F3 09 46 8C  ..............F.
#           0010: D7 91 B8 A7                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A8 C0 45 39 DD F4 B5 69   56 0A 55 C3 18 FD 09 F4  ..E9...iV.U.....
#           0010: EA 7E 30 E0                                        ..0.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 01:02:26.819 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:26.913 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:26.914 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:26.914 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:02:26.914 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:27.050 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.051 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:27.052 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-15 01:02:27.053 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.057 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.069 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.069 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.069 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-15 01:02:27.071 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "13 CE CB 74 1C 01 E3 E5 3B CF 8F A3 30 8F 1C 0E 0E 7E 3A EF A6 10 18 C6 43 C8 5E DA DA 44 29 33",
#     "session id"          : "C4 82 69 3B 01 2A 34 EB 66 25 E0 3F F1 72 5B 32 A4 5E C7 F9 E8 06 86 ED 05 F7 55 7E 29 69 76 8D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D8 EF CF 83 34 AB 79 C8   26 3C 56 B9 FE 64 EF 94  ....4.y.&<V..d..
#               0010: C3 F4 17 DA 96 0C 85 4D   6E 3D A4 5A 41 5C 4A 18  .......Mn=.ZA\J.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.090 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CF 1D 0D CE 09 03 1F C6 F0 24 AF 36 26 8C B2 3E 8D 1E 86 F5 5D 14 1C 59 7B 44 95 FC 27 47 F7 0E",
#     "session id"          : "C4 82 69 3B 01 2A 34 EB 66 25 E0 3F F1 72 5B 32 A4 5E C7 F9 E8 06 86 ED 05 F7 55 7E 29 69 76 8D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 55 DD 54 4A E3 EF 07 55   72 1B 12 35 22 94 BA C6  U.TJ...Ur..5"...
#             0010: 1E D0 8D AC C4 E3 22 F0   F5 66 D3 88 1D E7 8C 79  ......"..f.....y
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.090 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.090 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.092 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.094 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:27.096 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:27.096 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.103 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.104 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.105 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.109 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.109 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.109 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.109 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.110 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:27.110 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:02:27.110 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-15 01:02:27.111 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-15 01:03:47.493 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:03:47.546 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:03:47.547 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:03:47.548 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 01:03:47.548 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44394/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28370ms
ok 65 stop command for single port in 31103ms
ok 66 status detects locally running solr in 14324ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2178ms
ok 69 copying files around in 6555ms
ok 70 upconfig in 2591ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 51s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m27s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5670 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5670/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41123/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 22:55:41.110; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:55:41.116; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 22:55:42.109; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:55:42.150; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23761ms
ok 61 start solr with client truststore and security manager in 25621ms
not ok 62 start solr with mTLS needed in 58591ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-mFsyDA/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41123.
#
# Started Solr server on port 41123 (pid=199655). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41124.
#
# Started Solr server on port 41124 (pid=200094). Happy searching!
#
# INFO  - 2023-10-14 22:57:06.768; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:57:06.773; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:57:07.147; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:57:07.150; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:57:07.150; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:07.183 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 5B 6A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:42.000 UTC",
#     "not  after"         : "2024-01-12 22:56:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 D9 90 0D A6 71 B2 68   C8 41 86 49 EC A7 A4 A1  H....q.h.A.I....
#         0010: D3 B6 DD C3                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:07.187 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 0A CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:34.000 UTC",
#     "not  after"         : "2024-01-12 22:56:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:07.202 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:07.294 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:07.295 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:07.295 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:07.295 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:07.443 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:07.445 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:07.446 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.451 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.463 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.463 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.464 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:07.466 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3E F9 28 57 69 97 AD 05 72 0D F9 0B 28 0B 90 BB F1 29 86 6D 47 13 6F C6 13 DC 6E CF CD A7 08 96",
#   "session id"          : "A5 2D CE 95 F6 35 71 18 BC FA C5 64 26 F6 BC C9 14 C8 86 6A 66 49 67 85 35 45 E2 26 80 6E 2E C3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 38 24 95 30 3E B1 D5   07 08 CD E4 19 33 24 F9  .8$.0>.......3$.
#             0010: 05 A5 4D DE 81 DE D7 8E   FF 4B 1E F7 1C E3 F4 69  ..M......K.....i
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.583 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DC D9 EA 3A 91 43 7D FD 65 13 C2 71 F4 2D 31 68 2A 03 C2 BA BE 77 E0 8E 21 41 CE EC F0 D2 D8 FE",
#   "session id"          : "A5 2D CE 95 F6 35 71 18 BC FA C5 64 26 F6 BC C9 14 C8 86 6A 66 49 67 85 35 45 E2 26 80 6E 2E C3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 8F F3 9E F9 8B FF E4   D3 CA 1A 32 FF 3C 75 19  p..........2.<u.
#           0010: B1 22 19 10 18 F7 8B 07   2C C6 11 06 00 EA E4 6E  ."......,......n
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.583 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.584 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.586 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.588 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.588 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.589 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.598 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.599 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.600 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.604 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.604 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.605 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.607 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.608 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.608 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.608 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.609 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.610 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.610 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.612 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C BD 17 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:38.000 UTC",
#       "not  after"         : "2024-01-12 22:56:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A 65 97 A9 37 C8 48 24   66 A9 A4 FF DE FF 63 9F  ze..7.H$f.....c.
#           0010: A3 CA EF A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.613 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.694 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.698 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 42 7D 3F 3F 45 88 F0   5D 72 5B 93 C5 F3 14 6D  9B.??E..]r[....m
#     0010: 8A 5C 46 F0 E8 DC B8 19   97 65 2D E5 2F E3 86 C0  .\F......e-./...
#     0020: 22 A5 CC E6 A4 2E E5 C3   ED 3B 6D 60 5E 17 AE 26  "........;m`^..&
#     0030: DF 64 C8 76 33 96 00 AA   39 DC D7 09 09 76 B3 EB  .d.v3...9....v..
#     0040: BA 70 25 B1 9E E5 83 55   CC 85 49 26 81 BD 5B A7  .p%....U..I&..[.
#     0050: FB 89 DC D2 D6 FF D4 D9   40 BE 64 8B 4D B2 36 75  ........@.d.M.6u
#     0060: 52 B2 A7 DA F7 24 0B C3   C8 81 E6 F0 CF A5 74 DB  R....$........t.
#     0070: 04 65 36 14 05 1C 86 53   5C 1A A2 61 0E 24 16 E2  .e6....S\..a.$..
#     0080: 8A 7D 0F D0 43 AD 00 F5   18 F8 B5 6A C0 A7 42 0D  ....C......j..B.
#     0090: D4 E9 C5 BE BF C4 BC 42   17 1E 72 91 AF 38 83 F5  .......B..r..8..
#     00A0: AD 93 A2 87 BF 29 6C 1E   3F 42 9A 97 09 34 48 8D  .....)l.?B...4H.
#     00B0: B2 89 D0 98 46 A9 5E DC   A9 F2 29 DC E1 21 F7 68  ....F.^...)..!.h
#     00C0: 7E D9 BC A4 D4 B1 64 FE   91 C2 D0 CF C6 54 8B 94  ......d......T..
#     00D0: D9 42 66 46 E9 FA B3 37   E2 B1 70 F6 6A DB F3 2A  .BfF...7..p.j..*
#     00E0: 8F 0D BD 6A 04 36 50 1D   C7 AF 41 E7 F3 7E 00 A0  ...j.6P...A.....
#     00F0: 99 D5 81 21 3F 7F E4 DD   5F E0 7E BC CA AF 7C 66  ...!?..._......f
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.700 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9A D4 80 FA F5 42 28 56   50 5D AA E9 47 4B 83 2B  .....B(VP]..GK.+
#     0010: 98 F8 A7 D5 6D D2 15 23   6B 14 DE 7E D3 22 E5 69  ....m..#k....".i
#     0020: 3D C3 1F FE B0 9B 28 FE   22 22 BF FF FC E7 5E CD  =.....(.""....^.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.702 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:07.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:07.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:07.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:07.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.705 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.707 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 5B 6A EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:42.000 UTC",
#       "not  after"         : "2024-01-12 22:56:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 D9 90 0D A6 71 B2 68   C8 41 86 49 EC A7 A4 A1  H....q.h.A.I....
#           0010: D3 B6 DD C3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 D2 BB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:36.000 UTC",
#       "not  after"         : "2024-01-12 22:56:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#           0010: 50 46 94 49                                        PF.I
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.733 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 07 B5 09 30 EC E6 F3 78   DE 1A D9 FF 85 E7 98 3B  ...0...x.......;
#     0010: 6B 8B 15 B7 CF B9 84 64   64 93 37 49 8D A5 01 D7  k......dd.7I....
#     0020: 33 04 15 C6 B6 01 5B AB   D1 34 B6 38 C0 4A 17 27  3.....[..4.8.J.'
#     0030: DE 91 7B D8 61 B1 B8 DA   7E 5A 72 FC 67 80 6C 0F  ....a....Zr.g.l.
#     0040: ED 50 25 AF 65 F1 3F E7   F2 EB F6 D8 09 5D 6B E3  .P%.e.?......]k.
#     0050: 6D A2 49 6C A4 A0 7F B1   B6 30 52 FF 9A 5F 84 73  m.Il.....0R.._.s
#     0060: 02 59 9B 44 DC EE 97 FB   5C ED 2E 08 0A E7 BA 84  .Y.D....\.......
#     0070: BC BB 85 51 3C D1 17 6A   8D 97 00 FD 93 D0 49 0F  ...Q<..j......I.
#     0080: 61 C1 B0 04 70 47 6A 90   38 21 5A AF 0F A0 08 DD  a...pGj.8!Z.....
#     0090: D4 94 0E 09 81 1C 6B 6D   4F C3 37 3E DD C7 45 D4  ......kmO.7>..E.
#     00A0: ED 1D 4C B3 38 14 C2 89   B6 F7 7E D4 A1 06 B7 77  ..L.8..........w
#     00B0: 46 9C E9 32 F8 EA CD C1   20 FF F7 CE D0 BF 0E 58  F..2.... ......X
#     00C0: C4 A6 DC AF FC 01 01 8C   46 D9 11 E0 AC 38 69 EB  ........F....8i.
#     00D0: D4 E4 EA E5 5D 90 64 A9   BB 5C 55 6E D9 56 47 02  ....].d..\Un.VG.
#     00E0: 87 26 75 F5 B2 B3 39 06   38 D3 B0 9E 91 D8 37 00  .&u...9.8.....7.
#     00F0: A5 07 EE A1 2B 14 6A 6A   0E 14 2D ED F0 81 EC 7C  ....+.jj..-.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.734 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5E F3 D4 7C 1D D9 44 DD   EE CD E8 43 43 78 F3 05  ^.....D....CCx..
#     0010: 91 A8 67 97 1D 95 F6 2A   3E CF 08 5B DF 58 DA 56  ..g....*>..[.X.V
#     0020: 99 FA C4 5F 31 DE 93 3B   B3 B3 6D ED A9 2E FF BF  ..._1..;..m.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.735 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:07.793 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "36 40 2E 5F 48 F8 F5 DB 8C 8C A1 79 F1 A6 AE 19 B6 07 ED FC F3 B6 B3 A7 82 1A 3C 30 F1 A4 8C 1C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 22:57:08.093 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 22:57:08.094 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 22:57:09.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:57:09.066; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:57:09.433; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:57:09.436; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:57:09.437; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mFsyDA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:09.470 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 5B 6A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:42.000 UTC",
#     "not  after"         : "2024-01-12 22:56:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 D9 90 0D A6 71 B2 68   C8 41 86 49 EC A7 A4 A1  H....q.h.A.I....
#         0010: D3 B6 DD C3                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:09.474 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 0A CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:34.000 UTC",
#     "not  after"         : "2024-01-12 22:56:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:09.489 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:10.034 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.034 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:10.036 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:10.036 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.055 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.055 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:10.057 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "43 41 D4 BD 31 B7 34 D4 3C 0B 8B 3F 8F FB 15 B1 33 78 20 F3 81 C0 2E F5 A2 0F 30 F4 16 0B 18 E8",
#   "session id"          : "FC 0A 52 1F A7 BF 2D 2A A9 4E E0 8E C8 CD C7 AD E8 74 31 BE 4D 10 56 90 6D D5 06 17 47 67 7F DF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 16 77 31 08 FA 48 7C EB   C0 44 9F 16 F4 66 1F AC  .w1..H...D...f..
#             0010: BF 10 39 C7 EC 4D 20 CE   87 C3 36 54 0A 96 93 30  ..9..M ...6T...0
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.164 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0C 4B AC C7 A5 84 4B 5E B5 37 2D AE D5 F6 70 75 A4 DF CC 45 6C E2 F7 93 97 04 D1 4A 02 16 42 77",
#   "session id"          : "FC 0A 52 1F A7 BF 2D 2A A9 4E E0 8E C8 CD C7 AD E8 74 31 BE 4D 10 56 90 6D D5 06 17 47 67 7F DF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4F 77 DF 70 19 55 52 37   B5 0F 9C E4 3B 4A AF FE  Ow.p.UR7....;J..
#           0010: 98 85 24 A2 07 0D AC 5C   82 BF BC FF 52 B3 D0 77  ..$....\....R..w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.165 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.165 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.168 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.170 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.180 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.181 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.183 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.186 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.190 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.190 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.190 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.191 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.191 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.192 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.195 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C BD 17 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:38.000 UTC",
#       "not  after"         : "2024-01-12 22:56:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A 65 97 A9 37 C8 48 24   66 A9 A4 FF DE FF 63 9F  ze..7.H$f.....c.
#           0010: A3 CA EF A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.196 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:10.268 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:10.269 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:10.269 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:10.269 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.307 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 D2 BB D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:56:36.000 UTC",
#     "not  after"         : "2024-01-12 22:56:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#         0010: 50 46 94 49                                        PF.I
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#         0010: 58 E3 8F 71                                        X..q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.311 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 46 A1 E1 F1 9E B3 73   E2 6C 0E 50 B6 38 1F 10  qF.....s.l.P.8..
#     0010: 2B B8 D0 50 57 BF 04 E3   0D 08 2C C0 E1 DF 56 FB  +..PW.....,...V.
#     0020: 72 81 D3 EC 51 9E 47 A2   61 46 6B 06 79 29 99 64  r...Q.G.aFk.y).d
#     0030: 89 C7 46 4C 4D F3 AC 34   17 9B C3 D7 B5 7C DA BB  ..FLM..4........
#     0040: 52 16 8D 65 0A D1 CD A2   0A 3F 13 B2 02 D9 0F 34  R..e.....?.....4
#     0050: FA C1 F4 04 74 88 85 D9   7C 02 42 62 D6 87 A7 55  ....t.....Bb...U
#     0060: 11 97 2B 3D 80 E0 A7 6A   BD 23 AE 2D 54 72 70 4A  ..+=...j.#.-TrpJ
#     0070: 0A 3A 53 A4 A6 AF F2 8B   37 E5 A4 E4 0F 49 8D 4F  .:S.....7....I.O
#     0080: B8 FF 71 F3 37 8D F7 CE   98 37 F3 45 A0 4B E4 1D  ..q.7....7.E.K..
#     0090: BB 44 A6 1B EC 5E 9B 4E   1C 24 D6 27 A5 87 52 D5  .D...^.N.$.'..R.
#     00A0: D6 76 1A 2A 51 CA A1 32   DC 72 48 45 37 8B F4 07  .v.*Q..2.rHE7...
#     00B0: 5D 6E 00 63 53 CF 4D 0C   2D DB 49 F9 C4 81 67 38  ]n.cS.M.-.I...g8
#     00C0: F0 1A EC BB 9E 1E 33 20   8B 47 0F 06 D6 9E 27 C3  ......3 .G....'.
#     00D0: B0 F8 C3 57 75 AD C3 7F   D9 6E ED C8 BF EF 97 02  ...Wu....n......
#     00E0: 79 2B 63 A1 25 94 37 8E   83 25 C3 19 88 37 36 33  y+c.%.7..%...763
#     00F0: 12 E8 3C 65 E7 F5 80 AC   54 DF 20 49 03 8C 5B 8C  ..<e....T. I..[.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.313 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3F 1B 41 06 68 FA EA B0   CC E1 9C CB 50 70 07 0E  ?.A.h.......Pp..
#     0010: 74 99 05 58 0F A0 87 D7   D0 8F 4A A1 F7 4F 2C 10  t..X......J..O,.
#     0020: FD AC 67 AD 73 5F 1D 9F   8D 48 4E 2F A7 E8 DD 19  ..g.s_...HN/....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.315 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:10.316 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:10.317 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 22:57:10.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:10.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.318 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.321 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 5B 6A EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:42.000 UTC",
#       "not  after"         : "2024-01-12 22:56:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 D9 90 0D A6 71 B2 68   C8 41 86 49 EC A7 A4 A1  H....q.h.A.I....
#           0010: D3 B6 DD C3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 D2 BB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:36.000 UTC",
#       "not  after"         : "2024-01-12 22:56:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#           0010: 50 46 94 49                                        PF.I
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.348 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 0B FF 2A BE AE B9 32   7C F7 8A 40 B3 B5 99 82  ...*...2...@....
#     0010: 89 09 B6 D3 21 46 42 79   A6 54 7B 3F 86 24 2A F3  ....!FBy.T.?.$*.
#     0020: 05 28 1C CF 43 42 7F D2   13 1D 6E E7 D6 16 53 7C  .(..CB....n...S.
#     0030: D4 8E 54 70 3B 0F F3 1C   95 C9 3E 37 87 ED 41 FE  ..Tp;.....>7..A.
#     0040: 81 67 25 C7 75 5E 9C 32   EF 74 CB 50 97 C2 4C BD  .g%.u^.2.t.P..L.
#     0050: AF 52 42 F7 24 3A EC B7   75 40 89 76 65 9C FF CD  .RB.$:..u@.ve...
#     0060: 4E D7 24 F1 06 52 99 52   D5 C8 8C 4A B7 61 64 9C  N.$..R.R...J.ad.
#     0070: 9C 34 69 94 F9 92 4D 91   4F 2C 72 82 F7 5E 39 2E  .4i...M.O,r..^9.
#     0080: E2 DB 7F C1 1C 03 02 DE   DC 48 5E 5C E8 7E D5 C1  .........H^\....
#     0090: 89 82 FD 26 04 3D E2 AD   F0 56 2B 12 02 66 CC EB  ...&.=...V+..f..
#     00A0: A8 04 5C 0B D6 9E D2 86   67 02 8E 7D FB A0 E8 43  ..\.....g......C
#     00B0: E4 EA A6 53 AA 4D 83 98   8D B8 D6 53 60 00 E9 22  ...S.M.....S`.."
#     00C0: 5B DD AD 42 0F F8 73 EC   E4 7E 2B F7 AD C0 F2 DF  [..B..s...+.....
#     00D0: 85 1E 4E 5D 74 12 63 26   38 69 C8 CE FD EB 33 66  ..N]t.c&8i....3f
#     00E0: DF DE 39 FB B8 20 AC 86   42 DB 03 1D F9 09 96 A0  ..9.. ..B.......
#     00F0: 5A C1 08 B5 3A A0 EB 46   85 21 DD F5 DD 19 42 BD  Z...:..F.!....B.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.349 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C4 AD B9 3A 90 48 A4 35   3A 51 9B 4B 11 2C 47 65  ...:.H.5:Q.K.,Ge
#     0010: F0 60 F9 D4 73 25 DE 24   C4 5F E8 67 25 61 F6 B2  .`..s%.$._.g%a..
#     0020: 99 87 C1 43 F8 A2 B3 36   1C BA 83 4C 0F 04 CC 97  ...C...6...L....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.349 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:10.406 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DE 83 D8 04 49 25 A2 66 A8 85 67 5D 5F EB B9 3A F6 C5 BD C6 C3 20 4D 6A FE EB 8C E7 F2 41 95 A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 22:57:10.702 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 22:57:10.703 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 22:57:22.930; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:23.261 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 D2 BB D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:36.000 UTC",
#       "not  after"         : "2024-01-12 22:56:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#           0010: 50 46 94 49                                        PF.I
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 32 69 F2 94 54 4D E5   7B 54 B8 41 D7 05 5E B8  f2i..TM..T.A..^.
#           0010: 58 E3 8F 71                                        X..q
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 0A CD F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:56:34.000 UTC",
#       "not  after"         : "2024-01-12 22:56:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 47 CC D6 79 B1 93 22   20 D4 32 72 9F 57 F9 97  .G..y.." .2r.W..
#           0010: 50 46 94 49                                        PF.I
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 22:57:23.277 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:23.381 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:23.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:23.382 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:57:23.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:23.518 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.519 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:23.520 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 22:57:23.521 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.526 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.538 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.538 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 22:57:23.541 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "42 EE 32 50 94 4D 21 69 F1 62 B1 7D BB DF 99 B3 12 B0 90 7F 76 B3 64 0D FB CE C7 65 0F B1 83 17",
#     "session id"          : "2A FA CC F9 F8 40 19 67 F8 DB 72 7E AA 2B B6 10 D8 77 13 D9 49 97 0B DE 3D 35 CB 40 DF 78 62 86",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 25 4A 15 39 10 16 38 D7   2A 39 70 0E 17 DC B5 93  %J.9..8.*9p.....
#               0010: C8 CC 91 E5 7A 74 27 23   4E 1F 1C 0D 8A B6 69 23  ....zt'#N.....i#
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.563 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DB 73 8E 6B 99 56 6A 75 68 15 AA F0 83 E7 AB 10 54 FA A4 8B 78 F5 81 CE D3 54 83 A3 43 1C 86 04",
#     "session id"          : "2A FA CC F9 F8 40 19 67 F8 DB 72 7E AA 2B B6 10 D8 77 13 D9 49 97 0B DE 3D 35 CB 40 DF 78 62 86",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: ED 56 CE 1D DA 86 F9 57   56 90 87 ED BC B7 C8 2A  .V.....WV......*
#             0010: 63 16 06 5B E7 56 41 26   EC 42 2B 8F 89 40 BF 33  c..[.VA&.B+..@.3
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.564 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.564 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.565 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.566 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.568 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.577 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.579 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.580 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.583 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:57:23.584 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 22:57:23.586 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 22:58:43.654 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:58:43.695 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:58:43.695 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:58:43.695 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:58:43.695 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41124/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28146ms
ok 65 stop command for single port in 31328ms
ok 66 status detects locally running solr in 14736ms
ok 67 status does not expose cli parameters to end user in 220ms
ok 68 listing out files in 2218ms
ok 69 copying files around in 6680ms
ok 70 upconfig in 2671ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 44s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m15.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5669 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5669/

All tests passed

Build Log:
[...truncated 1313 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43945/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 20:15:10.797; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 20:15:10.803; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 20:15:11.696; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 20:15:11.733; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23200ms
ok 61 start solr with client truststore and security manager in 25868ms
not ok 62 start solr with mTLS needed in 61001ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-HplfHk/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43945.
#
# Started Solr server on port 43945 (pid=200637). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43946.
#
# Started Solr server on port 43946 (pid=201095). Happy searching!
#
# INFO  - 2023-10-14 20:16:35.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 20:16:35.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 20:16:36.098; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 20:16:36.101; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 20:16:36.101; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:36.133 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 B2 54 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:11.000 UTC",
#     "not  after"         : "2024-01-12 20:16:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C F0 C1 2E E9 8C A4 18   9C 57 B2 19 01 40 02 BD  \........W...@..
#         0010: C7 32 B7 AE                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:36.137 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 4D B7 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:03.000 UTC",
#     "not  after"         : "2024-01-12 20:16:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:36.151 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:36.371 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.372 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:36.373 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:36.374 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.379 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.391 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.391 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:36.393 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9F 2A 00 B0 F1 D0 90 6A 57 8D AA 17 0D 94 B7 8E 38 33 26 60 9D 28 87 CE 40 64 76 50 FB D3 F1 48",
#   "session id"          : "A8 AB AD 59 1C 0C EB 24 E6 CB 9A 8B 2C 61 CF 54 0E AA 91 0F 62 74 E3 7D 3B DD 96 2F 0B 98 AE B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4A CC 05 A6 54 23 F4 BF   23 9A E5 2E 2F 8E 9D B2  J...T#..#.../...
#             0010: 5E 5C 8E 06 90 B1 CF 02   D7 7C F1 3D 89 C6 D3 7E  ^\.........=....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.503 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BF 2A 37 2F C4 7F 0F AF 2A 56 43 35 5F 87 04 E6 AD 6E BD 22 8D 3B CA 34 F4 27 54 84 02 AF 21 56",
#   "session id"          : "A8 AB AD 59 1C 0C EB 24 E6 CB 9A 8B 2C 61 CF 54 0E AA 91 0F 62 74 E3 7D 3B DD 96 2F 0B 98 AE B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB 22 71 A4 09 98 83 3A   8D DB 78 EA F1 CF 48 FC  ."q....:..x...H.
#           0010: 92 0D 49 E5 CA EA 95 3E   B1 94 D1 DB 21 6E 95 65  ..I....>....!n.e
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.504 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.504 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.506 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.506 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.509 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.509 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.510 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.511 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.518 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.520 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.521 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.524 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.527 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.527 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.528 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.528 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.529 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.529 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.532 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6E D6 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:08.000 UTC",
#       "not  after"         : "2024-01-12 20:16:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 73 FD FA DF 02 2D 0E   37 B3 AA 07 FF D0 AB 17  .s....-.7.......
#           0010: 6A C2 46 6F                                        j.Fo
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.532 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:36.590 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:36.591 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:36.591 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:36.591 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.624 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.628 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 10 46 68 B0 6E 9A 59 E1   D2 7B 19 EE E7 D4 B2 A4  .Fh.n.Y.........
#     0010: 2C A3 A4 BF 1A 63 AA 8D   FC 83 8E 43 35 19 66 D1  ,....c.....C5.f.
#     0020: D3 46 D0 1F 58 29 F2 F5   23 E0 0A 5D 57 2A E7 0A  .F..X)..#..]W*..
#     0030: 28 91 50 F3 DF 8A A5 9A   42 50 FB 4E A3 96 EF AC  (.P.....BP.N....
#     0040: 47 CC 0F A7 B1 82 BD C9   F6 86 31 60 BF 63 D4 95  G.........1`.c..
#     0050: 47 60 79 18 3B E4 2F 74   04 62 8E B7 1E 6F C9 CF  G`y.;./t.b...o..
#     0060: D9 C5 6F 1D F5 DA 3D 2A   A0 B8 EB FE 5F E4 59 53  ..o...=*...._.YS
#     0070: 36 B2 34 97 CC D7 F2 FB   32 00 A2 F6 39 64 C8 3B  6.4.....2...9d.;
#     0080: 2F 27 01 ED C5 A9 F2 FB   78 D5 2C 15 53 4A 5A 91  /'......x.,.SJZ.
#     0090: F3 DA 4C 68 44 23 E3 AE   A8 0D F7 8E 96 C3 AE 47  ..LhD#.........G
#     00A0: 67 84 0B 2D 05 6F 19 3D   C6 3F 33 C5 52 12 4D F1  g..-.o.=.?3.R.M.
#     00B0: CF DA AB 5A 8B 94 56 B2   4B BA B3 30 96 FD 9C 86  ...Z..V.K..0....
#     00C0: D7 8E D5 48 72 6B F4 76   BC 9B 76 D9 95 FC FD C9  ...Hrk.v..v.....
#     00D0: 9D 05 1C AF 22 4F 10 B9   C0 86 56 8E 92 69 F1 C9  ...."O....V..i..
#     00E0: 29 C4 F7 FF 2E 6A 3F BD   A0 DA 69 BB E7 1A 5E B7  )....j?...i...^.
#     00F0: FB 85 5C F4 5B 7C 11 E0   47 C2 DA A2 F2 BD 1E FA  ..\.[...G.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.630 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 92 D7 96 10 A8 72 20   A9 7E CB 10 0E 75 A0 4E  ......r .....u.N
#     0010: 75 31 F5 46 37 3C 09 FF   E4 DC 1B C1 65 50 96 F4  u1.F7<......eP..
#     0020: 6B 64 0A 5B 9A F7 F3 A0   43 22 CD B7 63 F6 91 D4  kd.[....C"..c...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.632 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:36.633 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.633 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:36.633 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.634 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:36.634 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:36.634 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.634 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.637 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 B2 54 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:11.000 UTC",
#       "not  after"         : "2024-01-12 20:16:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C F0 C1 2E E9 8C A4 18   9C 57 B2 19 01 40 02 BD  \........W...@..
#           0010: C7 32 B7 AE                                        .2..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 6F 75 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:05.000 UTC",
#       "not  after"         : "2024-01-12 20:16:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#           0010: 58 D2 0B 16                                        X...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.662 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B7 C4 50 F9 37 5E 41 EC   AD 06 96 6C A6 56 5F 55  ..P.7^A....l.V_U
#     0010: 8D 37 6F 8C 7F 31 4F A4   3A 66 DE D6 86 FC 10 C8  .7o..1O.:f......
#     0020: 96 FE 64 D3 9E C4 54 00   17 B9 56 92 75 7A FB B8  ..d...T...V.uz..
#     0030: 58 71 4A B2 4D 2D 4D 9C   EA FD 68 5E 61 F1 62 5D  XqJ.M-M...h^a.b]
#     0040: 09 57 C0 63 38 A7 CB E8   64 27 C2 85 E4 86 22 E9  .W.c8...d'....".
#     0050: 5A 93 3D EC ED 4B 2F B7   73 61 96 94 7D 2D 60 4F  Z.=..K/.sa...-`O
#     0060: 4D 34 25 C3 1B 58 59 D5   C8 F1 31 5D 04 48 47 F1  M4%..XY...1].HG.
#     0070: 2F C8 FF CD 30 8D 4F 54   DF 53 EE 01 71 75 01 29  /...0.OT.S..qu.)
#     0080: B8 A0 D8 49 50 32 72 E0   C0 E1 48 AC 7B F3 3C 66  ...IP2r...H...<f
#     0090: 77 2E 07 06 3A A3 C5 61   3D E6 DD 59 44 52 1B F1  w...:..a=..YDR..
#     00A0: 01 48 C6 EF 53 0B FA F5   03 B2 A7 4B D5 C6 64 93  .H..S......K..d.
#     00B0: DA 6E 59 E9 AB 62 BC 29   CC F4 5A 91 3E 59 79 B9  .nY..b.)..Z.>Yy.
#     00C0: 5D 42 50 5C B1 83 D9 76   8B 51 F4 71 FA A5 95 02  ]BP\...v.Q.q....
#     00D0: 40 D5 DA B1 49 61 9A B2   2B F6 1F C5 C7 D5 50 C0  @...Ia..+.....P.
#     00E0: D9 FD 34 0B 7E 53 A2 3B   2A A9 6B 28 05 83 12 B2  ..4..S.;*.k(....
#     00F0: 06 7B 89 A7 77 BA 85 F7   47 CA EF 0E 5B 07 94 8A  ....w...G...[...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.663 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 0D 87 D0 F2 6F 5D EF   43 19 BF 4A 9D 13 F3 8D  6....o].C..J....
#     0010: 65 C2 CD F5 21 A0 CF 0E   9B F4 8C C3 F0 73 17 E2  e...!........s..
#     0020: FA 7A BB 9E 52 05 0D 55   D4 73 BC E7 76 A2 A3 00  .z..R..U.s..v...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.664 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:36.719 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4F 95 1A 3B B5 A2 4E DD 4F 67 DE 7A 1F F8 E4 77 BF 24 78 1C A7 FF B9 77 DC 57 99 BA DA 4F B4 AE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 20:16:37.048 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 20:16:37.049 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 20:16:37.977; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 20:16:37.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 20:16:38.338; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 20:16:38.341; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 20:16:38.341; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HplfHk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:38.373 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 B2 54 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:11.000 UTC",
#     "not  after"         : "2024-01-12 20:16:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5C F0 C1 2E E9 8C A4 18   9C 57 B2 19 01 40 02 BD  \........W...@..
#         0010: C7 32 B7 AE                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:38.377 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 4D B7 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:03.000 UTC",
#     "not  after"         : "2024-01-12 20:16:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:38.391 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:38.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:38.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:38.478 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:38.479 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:38.612 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.612 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:38.614 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:38.614 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.631 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.631 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:38.634 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C6 CD 6E C8 16 49 D9 CB 8A 41 6B 36 88 57 8D 8D 7D 3A DC AB E9 41 45 41 53 33 61 3C 8F 15 0B 4B",
#   "session id"          : "7C E1 BA 22 EA DC 38 2C BF BE 86 B0 9B 8C CA AA B0 AA 05 84 68 7C 3C FA EE E5 7D 24 62 84 1E 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 0B 64 42 FA EF 01 B1   B1 FD 88 51 B7 28 49 1F  ..dB.......Q.(I.
#             0010: 04 CA 39 50 AB DE F5 37   43 4D 58 47 D4 6E 99 11  ..9P...7CMXG.n..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.739 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 91 D9 22 8A 4D 92 1B 71 A2 81 1C 98 14 5D 9B B4 A6 21 0D AB FB 7D 38 1F 3C 06 20 F3 69 2F 3E",
#   "session id"          : "7C E1 BA 22 EA DC 38 2C BF BE 86 B0 9B 8C CA AA B0 AA 05 84 68 7C 3C FA EE E5 7D 24 62 84 1E 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5D 93 09 A6 25 36 D4 1B   1A 71 1B 27 8C 01 4D 32  ]...%6...q.'..M2
#           0010: 2A 59 3F 2B 13 95 BA 6E   D5 BF 24 FB 6B 12 83 73  *Y?+...n..$.k..s
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.739 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.740 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.742 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.742 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.742 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.744 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.745 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.745 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.747 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.753 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.755 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.756 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.760 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.760 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.760 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.760 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.761 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.761 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.761 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.763 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.763 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.764 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.764 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.765 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.766 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.766 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.768 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 6E D6 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:08.000 UTC",
#       "not  after"         : "2024-01-12 20:16:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 73 FD FA DF 02 2D 0E   37 B3 AA 07 FF D0 AB 17  .s....-.7.......
#           0010: 6A C2 46 6F                                        j.Fo
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.769 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.849 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 6F 75 8E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 20:16:05.000 UTC",
#     "not  after"         : "2024-01-12 20:16:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#         0010: 58 D2 0B 16                                        X...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#         0010: B6 6F 19 85                                        .o..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.853 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 93 93 0B 76 6F 5A 8D   2E 55 6E A1 82 1D D8 49  (...voZ..Un....I
#     0010: 11 FF 26 96 2B 50 4E 6F   BC 14 13 51 27 02 BB 5C  ..&.+PNo...Q'..\
#     0020: 75 82 77 62 FA 36 19 A1   25 D4 C8 E4 F9 C9 4A 1B  u.wb.6..%.....J.
#     0030: 16 FB D6 B1 5F 6D 07 FD   98 83 E0 45 52 36 95 C0  ...._m.....ER6..
#     0040: BB A9 AA 63 C6 F7 DD DE   E6 D5 8C FA 50 F6 7C 45  ...c........P..E
#     0050: E2 43 55 A1 3B 57 B9 CD   68 AE 43 82 5C DF 8B F4  .CU.;W..h.C.\...
#     0060: 87 43 B8 1A E7 B3 DD EC   34 93 96 5D 1A 8D BB 66  .C......4..]...f
#     0070: 53 40 71 26 AB AA 73 74   46 7A DA B6 93 1F 42 46  S@q&..stFz....BF
#     0080: 02 B3 70 CE 81 40 1B 6D   FD A0 CD 65 CB C4 3F 6D  ..p..@.m...e..?m
#     0090: FA 0F 4A C9 C7 7C 5A A5   6F 8C 4D 2F 49 B4 FB 2E  ..J...Z.o.M/I...
#     00A0: 95 52 1F 0A 1C EE 37 38   57 B9 CC 3C 45 C5 8A 19  .R....78W..<E...
#     00B0: 00 B6 FE 43 DD C0 E6 78   67 62 71 41 DA 03 C2 94  ...C...xgbqA....
#     00C0: B8 A0 4C 5B B8 E2 23 A8   69 5C 9C FC E2 DB 49 8A  ..L[..#.i\....I.
#     00D0: 94 71 7B 09 96 39 AE 0A   D8 34 12 25 13 FB F5 50  .q...9...4.%...P
#     00E0: 33 F2 4E A7 49 E0 AC 1B   A9 62 5D 34 54 CB 15 12  3.N.I....b]4T...
#     00F0: 26 06 9D 38 4C 5B CA 35   22 AB F5 F6 36 D4 3C 42  &..8L[.5"...6.<B
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.855 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F9 C9 BA 48 EA 79 03 CA   1D A6 BD 07 31 E9 09 53  ...H.y......1..S
#     0010: 87 B6 97 B1 E9 5C C6 5E   BD DD 11 43 D6 D7 DE A2  .....\.^...C....
#     0020: 2E DC BF EC 74 90 12 28   7E CC 77 53 64 58 DA 33  ....t..(..wSdX.3
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.857 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:38.858 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.858 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:38.859 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.859 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 20:16:38.859 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:38.859 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.860 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.862 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 B2 54 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:11.000 UTC",
#       "not  after"         : "2024-01-12 20:16:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5C F0 C1 2E E9 8C A4 18   9C 57 B2 19 01 40 02 BD  \........W...@..
#           0010: C7 32 B7 AE                                        .2..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 6F 75 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:05.000 UTC",
#       "not  after"         : "2024-01-12 20:16:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#           0010: 58 D2 0B 16                                        X...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.888 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 FB 88 80 E4 06 5E CC   E4 21 01 0E 7F 51 E4 28  F.....^..!...Q.(
#     0010: 2D 25 E6 47 3E 21 34 EA   5E FF D7 DE 6A F2 D0 9B  -%.G>!4.^...j...
#     0020: 4A 7B A8 06 B6 22 93 10   3A 90 D3 94 F7 32 E5 F6  J...."..:....2..
#     0030: 6A F7 D7 0A 62 A0 90 53   E9 6C A3 46 6D 5C 5F 1B  j...b..S.l.Fm\_.
#     0040: 15 90 D5 B4 9B 1B A0 F4   5A FA EE CB 24 6C A0 8E  ........Z...$l..
#     0050: EB E8 45 7D 83 7F AF 9F   24 0E 83 E6 E9 94 79 9D  ..E.....$.....y.
#     0060: 02 6D F3 7B 91 19 2E 57   9F 04 CD 47 7F 7C AE EB  .m.....W...G....
#     0070: B1 B4 0B A6 C7 1C E4 CD   DF B3 1F 4B FD C5 DF 99  ...........K....
#     0080: 42 48 5C 8D 49 C0 65 29   0A 3C 62 EF C7 60 F0 24  BH\.I.e).<b..`.$
#     0090: 57 C0 C3 D9 6B DE 58 02   14 0F 26 7A 16 7F BF 75  W...k.X...&z...u
#     00A0: F8 C0 EA 0A 2B 8A 09 23   A6 49 0D BC BB 4E F9 C9  ....+..#.I...N..
#     00B0: 2B 76 13 93 89 23 19 70   6E D4 9E EB 20 4E 4E 9B  +v...#.pn... NN.
#     00C0: 58 EF 79 71 A7 F3 9F 12   64 DD BA DB C5 F4 55 D8  X.yq....d.....U.
#     00D0: 9A A6 BB CF 84 E5 B6 E0   B3 9D 10 18 C9 48 74 92  .............Ht.
#     00E0: B8 32 9A 90 93 50 F8 45   48 33 29 F8 74 B9 E4 D7  .2...P.EH3).t...
#     00F0: C1 67 27 BF 7F F0 06 6D   03 34 B9 38 A3 E8 45 AF  .g'....m.4.8..E.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.889 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C0 CF 74 E9 03 E4 F1 81   78 04 5A 09 7F CA DA E6  ..t.....x.Z.....
#     0010: 8C 28 45 6C 34 C3 56 2B   9C EB 6C B2 7C B1 91 4F  .(El4.V+..l....O
#     0020: 70 0C C1 4F 1D 1F 33 EB   C0 B9 6A 3D 41 7C FA 14  p..O..3...j=A...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.890 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:38.944 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "14 22 03 6E 44 73 56 CC E7 8D EA 74 FE 46 F6 BE 6F 4E 85 17 7E 25 23 09 8B 5E 93 8D 69 CC AA BE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 20:16:39.218 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 20:16:39.219 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 20:16:50.539; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:50.862 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 6F 75 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:05.000 UTC",
#       "not  after"         : "2024-01-12 20:16:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#           0010: 58 D2 0B 16                                        X...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 C5 45 D9 C9 A8 51 24   1F ED FB 8B 87 0B E7 45  &.E...Q$.......E
#           0010: B6 6F 19 85                                        .o..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 4D B7 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 20:16:03.000 UTC",
#       "not  after"         : "2024-01-12 20:16:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 5D C7 2D 05 6F 4F DE   8F 6B EE 33 41 B8 9F BB  .].-.oO..k.3A...
#           0010: 58 D2 0B 16                                        X...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 20:16:50.879 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:51.149 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:51.149 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:51.149 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:16:51.149 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:51.296 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.297 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:51.298 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 20:16:51.299 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.316 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.317 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 20:16:51.319 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "98 30 E4 60 B3 C3 B7 DB 48 D4 0A 1D 5D 30 ED 0D D1 A4 EF 72 B3 16 BE 29 77 5B 4F E0 B3 CF 6D 22",
#     "session id"          : "01 20 50 89 29 0F 3D AD 7F F2 79 49 8A 38 E0 14 84 2F BD 65 B9 25 CC 1F 1D 18 F2 56 A6 D3 F9 A5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AC 15 E0 C7 B2 C1 E8 2A   09 5C 63 14 EC 9D 53 0A  .......*.\c...S.
#               0010: A7 4B BA 16 14 AC FA B1   0B 25 88 D0 E0 39 75 78  .K.......%...9ux
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.344 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "52 FD 59 B3 79 3D CA 71 81 F1 4C F9 1E 55 71 F1 D6 61 04 8A 16 32 F8 20 5A 3E A5 F2 FE FA 71 01",
#     "session id"          : "01 20 50 89 29 0F 3D AD 7F F2 79 49 8A 38 E0 14 84 2F BD 65 B9 25 CC 1F 1D 18 F2 56 A6 D3 F9 A5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E4 4B 37 B7 AE 00 5D 26   73 CA B6 91 48 5E 0C 74  .K7...]&s...H^.t
#             0010: 0D 60 CA D6 BA 0A 5F CA   E3 5A BA 40 B5 AF 98 5F  .`...._..Z.@..._
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.345 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.347 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.349 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.349 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:51.350 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:51.351 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.358 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.359 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.361 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.365 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.365 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.365 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:16:51.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 20:16:51.368 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 20:18:15.192 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:18:15.232 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:18:15.232 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:18:15.232 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 20:18:15.232 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43946/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28674ms
ok 65 stop command for single port in 31314ms
ok 66 status detects locally running solr in 14369ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2171ms
ok 69 copying files around in 6583ms
ok 70 upconfig in 2625ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 36s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m4.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5668 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5668/

All tests passed

Build Log:
[...truncated 1312 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41383/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 16:09:23.044; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 16:09:23.049; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 16:09:23.969; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 16:09:24.010; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23000ms
ok 61 start solr with client truststore and security manager in 25721ms
not ok 62 start solr with mTLS needed in 57307ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fDGlEl/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41383.
#
# Started Solr server on port 41383 (pid=199164). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41384.
#
# Started Solr server on port 41384 (pid=199619). Happy searching!
#
# INFO  - 2023-10-14 16:10:47.919; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 16:10:47.924; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 16:10:48.302; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 16:10:48.305; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 16:10:48.305; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:48.339 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 4B 29 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:24.000 UTC",
#     "not  after"         : "2024-01-12 16:10:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 34 92 C4 8E E3 08 95   25 E0 C3 22 49 F3 19 95  C4......%.."I...
#         0010: AF C1 62 79                                        ..by
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:48.343 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 4B B9 60",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:15.000 UTC",
#     "not  after"         : "2024-01-12 16:10:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:48.359 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:48.607 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.607 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:48.610 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:48.610 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.617 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.630 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:48.633 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 30 78 55 E9 66 70 AB C0 ED D4 BC 09 A1 18 D3 68 93 3F 6B BA CE 8A 29 AE 95 65 3A CC A1 67 EB",
#   "session id"          : "A8 5D 4C 54 C8 B0 FD EF 1C 5E F5 EB 67 FD 5A CC 25 71 76 DE 7B A9 46 A3 C1 04 2C CA 7C AE D9 62",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 52 F3 8E 2A 8C 28 98 B6   01 D6 71 73 6E 1F 8E D4  R..*.(....qsn...
#             0010: 9C 34 83 0F BE 26 3C C8   69 03 3E 74 A5 F7 2E 73  .4...&<.i.>t...s
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.758 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9C 92 37 56 B2 19 8E E5 9B 6C C8 9F 5B 14 1B 0C FF 37 DC CB A1 6C A3 E6 58 C0 7F FB 41 3D B9 5E",
#   "session id"          : "A8 5D 4C 54 C8 B0 FD EF 1C 5E F5 EB 67 FD 5A CC 25 71 76 DE 7B A9 46 A3 C1 04 2C CA 7C AE D9 62",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 0E 40 E3 43 C6 9F FD   54 B0 F8 43 FF 2A 30 94  ..@.C...T..C.*0.
#           0010: B2 55 00 30 8A 7D CB 7D   56 81 C8 8F 8F 57 B8 4E  .U.0....V....W.N
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.759 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.759 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.761 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.761 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.761 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.761 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.763 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.764 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.764 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.765 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.773 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.774 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.775 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.779 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.779 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.779 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.782 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.782 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.782 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.783 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.783 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.784 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.784 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.787 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C F7 66 60",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:20.000 UTC",
#       "not  after"         : "2024-01-12 16:10:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 93 41 14 02 EB FE 9D   9C 3D 90 FD 71 48 23 DB  ..A......=..qH#.
#           0010: 54 D1 F7 5F                                        T.._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.787 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:48.848 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:48.849 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:48.849 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:48.849 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.888 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.892 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 E5 D9 CD 9F 8A 9B 1E   65 E0 DF 5B 22 92 E7 32  t.......e..["..2
#     0010: E7 9A 9C CF 3B E3 81 6F   E1 B5 EC 21 D1 78 77 54  ....;..o...!.xwT
#     0020: 5C 70 4B 1B 6C 48 DA C2   74 0C 0C 24 FF 52 BA AE  \pK.lH..t..$.R..
#     0030: 0B F7 5D 1C AC 03 65 B8   DF 76 4B A9 8A 6C 7F 47  ..]...e..vK..l.G
#     0040: F2 BE FB 0D 3F 57 82 0C   A0 F6 25 81 77 98 86 DB  ....?W....%.w...
#     0050: E2 DF BA 85 45 96 E1 94   6D 80 C5 F8 00 18 7D 37  ....E...m......7
#     0060: CA 73 22 6B B0 0A C4 72   D9 BF AD 61 C2 F4 57 29  .s"k...r...a..W)
#     0070: 88 7B 4F B1 18 D6 CC 02   EC 1A 36 C1 A0 7F D9 87  ..O.......6.....
#     0080: C4 41 8B 98 B9 14 67 98   23 11 CC AA 69 B5 2B E7  .A....g.#...i.+.
#     0090: 03 EC AA 4A E3 86 A3 0A   CC C0 D7 F9 10 0E 57 C0  ...J..........W.
#     00A0: 17 68 8D 4E 93 C0 BE 39   82 88 AD 15 91 61 92 6D  .h.N...9.....a.m
#     00B0: DC 8A 1D 4A 46 76 47 04   AC 72 8B D0 50 FF DC 0A  ...JFvG..r..P...
#     00C0: BF 8B 34 55 33 AA 9D 65   57 C9 94 92 07 58 30 CF  ..4U3..eW....X0.
#     00D0: EF EC E8 69 87 E7 AD D4   BC 51 B0 88 E1 BD F9 34  ...i.....Q.....4
#     00E0: 00 26 2F 26 86 9E 5B BA   CC 3C DE BC 3F F6 25 C3  .&/&..[..<..?.%.
#     00F0: 64 81 68 C9 BD 2E BB 9A   33 5C 92 D6 B0 29 0F 56  d.h.....3\...).V
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.894 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 37 4E 9B 97 5F 53 D0 DE   1B 2C AA E2 C8 B9 27 7C  7N.._S...,....'.
#     0010: 2F E4 89 85 3E 69 5B A7   92 26 16 25 8E 6C 32 85  /...>i[..&.%.l2.
#     0020: FF 3E C7 96 4B 6D F3 D9   58 AC 49 41 9E E0 90 B9  .>..Km..X.IA....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.896 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:48.897 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.897 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:48.897 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.897 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:48.897 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:48.898 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.898 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.901 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 4B 29 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:24.000 UTC",
#       "not  after"         : "2024-01-12 16:10:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 34 92 C4 8E E3 08 95   25 E0 C3 22 49 F3 19 95  C4......%.."I...
#           0010: AF C1 62 79                                        ..by
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 73 D3 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:17.000 UTC",
#       "not  after"         : "2024-01-12 16:10:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#           0010: 65 35 A0 6F                                        e5.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.926 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 51 17 F3 51 5C 31 49   90 16 47 CC 26 C3 36 30  oQ..Q\1I..G.&.60
#     0010: D7 0D 25 F4 4D 79 D0 E9   2A 10 4B BF AB D9 3F B0  ..%.My..*.K...?.
#     0020: FE A9 F8 64 44 EF 23 15   1B 49 7B 24 00 63 14 07  ...dD.#..I.$.c..
#     0030: 2F 61 9E 9F 5E 45 BF 28   70 49 67 E1 76 21 EB 16  /a..^E.(pIg.v!..
#     0040: 7E 32 C2 82 6F 3B 97 A6   8E B3 04 25 A4 BA 4E 9B  .2..o;.....%..N.
#     0050: 3A DF 5D B0 C8 32 D1 07   9F A8 7B E5 73 F1 47 27  :.]..2......s.G'
#     0060: 74 51 2A 5F AD 66 D1 1D   0F CD EF AE 17 BC 72 27  tQ*_.f........r'
#     0070: 4E EC 93 4F 2A 3A FB F1   D7 8A A4 17 E5 14 53 1C  N..O*:........S.
#     0080: 03 BB 3C 20 6D D8 AD 8E   E0 A4 5C EA 3A FE 09 5D  ..< m.....\.:..]
#     0090: 50 2C B6 BF 16 23 88 32   6E 58 C9 4F F9 2F E6 44  P,...#.2nX.O./.D
#     00A0: CC 12 74 81 E6 E9 75 19   77 8E F1 71 30 B7 E6 9F  ..t...u.w..q0...
#     00B0: 74 FF 4C C6 2A 27 59 87   E2 87 59 EF B3 DD F0 B5  t.L.*'Y...Y.....
#     00C0: 54 3D CB 06 10 8E 05 0C   44 15 3B C4 82 44 4A 07  T=......D.;..DJ.
#     00D0: 3B F7 71 8E F8 7C C2 57   BF 12 F8 75 88 08 DB FD  ;.q....W...u....
#     00E0: 2D 62 92 AA 9E E0 9A B2   83 DE 29 47 BF 6A E0 18  -b........)G.j..
#     00F0: 38 5B 25 73 35 93 4E 1C   A3 46 E9 F2 36 46 B4 F6  8[%s5.N..F..6F..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.928 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A AF ED C8 52 91 85 93   4D 90 C3 67 D3 54 E4 D0  ....R...M..g.T..
#     0010: 67 76 E3 71 1E FD 09 AC   AD 82 8B 28 E9 FA 60 43  gv.q.......(..`C
#     0020: BB 32 EB 72 29 4A 7A E5   F1 17 1A 23 C8 FC AF CB  .2.r)Jz....#....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.929 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:48.987 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4C 07 48 F7 DB 4C AC 83 F7 58 8F 5D FA 72 F5 71 E9 80 C1 2A 62 BC 4E EB 9E 4B 5B 09 94 5C F0 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 16:10:49.269 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 16:10:49.270 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 16:10:50.239; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 16:10:50.245; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 16:10:50.630; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 16:10:50.632; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 16:10:50.633; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fDGlEl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:50.666 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 4B 29 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:24.000 UTC",
#     "not  after"         : "2024-01-12 16:10:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 34 92 C4 8E E3 08 95   25 E0 C3 22 49 F3 19 95  C4......%.."I...
#         0010: AF C1 62 79                                        ..by
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:50.670 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 4B B9 60",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:15.000 UTC",
#     "not  after"         : "2024-01-12 16:10:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 16:10:50.686 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:51.022 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:51.022 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:51.023 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:10:51.023 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:51.171 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.172 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:51.174 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:10:51.174 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.181 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.193 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.193 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.193 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:10:51.196 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7E 0F BE C1 41 4B 50 C6 61 2F 88 94 EB 3A ED 9A 52 A6 AF 74 8A 66 6F 59 F8 E8 53 75 37 E6 39 2A",
#   "session id"          : "BF F4 79 20 4A 8D 44 60 60 4C 24 23 2C 93 14 E2 CB 0D FF 9C 45 54 28 E4 9A 4B 18 41 BB D7 CF 43",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D2 FD CC AE 31 C6 AF E5   A6 47 90 84 B7 4A AD 1C  ....1....G...J..
#             0010: 59 CC CF C3 81 39 18 6C   A3 70 18 8F 5B 31 93 64  Y....9.l.p..[1.d
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.295 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C3 09 AE E8 04 7F 44 96 C2 7F 6C 5E DB 5C 00 5B EE 7E EC 42 7A 6C A7 5B 4E 0D 55 34 EC 44 5F 29",
#   "session id"          : "BF F4 79 20 4A 8D 44 60 60 4C 24 23 2C 93 14 E2 CB 0D FF 9C 45 54 28 E4 9A 4B 18 41 BB D7 CF 43",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB 5E 38 9C 92 87 4E C4   45 25 43 B4 30 AE 9E 01  .^8...N.E%C.0...
#           0010: F0 1A 18 58 74 43 CC 25   42 19 7B 35 95 A2 BE 77  ...XtC.%B..5...w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.296 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.296 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.298 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.300 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.301 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.301 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.310 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.311 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.313 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.316 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.316 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.316 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.319 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.319 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.319 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.320 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.321 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.321 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.322 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.325 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C F7 66 60",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:20.000 UTC",
#       "not  after"         : "2024-01-12 16:10:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 93 41 14 02 EB FE 9D   9C 3D 90 FD 71 48 23 DB  ..A......=..qH#.
#           0010: 54 D1 F7 5F                                        T.._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.419 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 73 D3 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 16:10:17.000 UTC",
#     "not  after"         : "2024-01-12 16:10:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#         0010: 65 35 A0 6F                                        e5.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#         0010: CC 61 88 F6                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.423 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E F0 F8 9E 89 A0 3F 8B   63 CF 50 0F F7 93 5E A7  ......?.c.P...^.
#     0010: 07 9B A1 0F 32 82 58 EF   A0 75 A2 FA 8B 3B 51 33  ....2.X..u...;Q3
#     0020: 36 FC DD 8C 06 BD 05 02   94 28 7A 86 3E AB 45 C2  6........(z.>.E.
#     0030: F8 36 7D FE 44 4D C6 97   05 5F BD 45 66 A8 44 F8  .6..DM..._.Ef.D.
#     0040: 4D DA 9E 43 6A 22 4C F9   9A 87 2D CC 14 AE 48 C6  M..Cj"L...-...H.
#     0050: EB CC EE 0B A1 DF E4 AC   42 DD E6 33 DB 4E 81 16  ........B..3.N..
#     0060: 36 15 E9 DA 32 8B E6 E9   13 E2 46 8F F6 E7 BE 01  6...2.....F.....
#     0070: C1 E9 2A 20 47 9A 20 8D   39 B1 A0 7E 76 48 4C A3  ..* G. .9...vHL.
#     0080: 63 24 44 12 15 F2 DE 93   D5 D9 B2 88 38 F0 32 5D  c$D.........8.2]
#     0090: 45 E5 4E E8 1D 41 06 D7   1E 60 5A E2 96 D3 69 8B  E.N..A...`Z...i.
#     00A0: 7D 0B 32 CD 91 A1 FC 3C   D2 B7 87 B8 C6 77 8A DB  ..2....<.....w..
#     00B0: 07 EF 2B 14 C3 0F 84 7A   69 1B 23 6F 7A 5D D0 D1  ..+....zi.#oz]..
#     00C0: 4F 92 BA 48 D3 2A F9 1A   94 66 C6 E2 EC A5 3E F2  O..H.*...f....>.
#     00D0: EB 51 83 9E E2 C6 D1 DA   49 06 7B 67 5C 2F 18 B5  .Q......I..g\/..
#     00E0: CC F6 F5 D4 CD 7F 86 9F   0D 20 93 0E 4F 69 79 0F  ......... ..Oiy.
#     00F0: 0F 04 62 4E 37 5A 43 C8   5C DE 99 54 D7 9F 4C 5A  ..bN7ZC.\..T..LZ
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.424 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 25 4B 76 E4 C2 0F 54 20   90 BF 19 75 41 B8 89 7D  %Kv...T ...uA...
#     0010: 08 D7 48 D8 7F E9 C0 AD   72 FF 96 FC 03 B3 2E 2F  ..H.....r....../
#     0020: 69 3C 71 5A F6 3A 22 64   98 AD 59 58 79 7F EE 38  i<qZ.:"d..YXy..8
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.427 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:51.428 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.428 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:51.428 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.428 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 16:10:51.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:10:51.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.430 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.432 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 4B 29 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:24.000 UTC",
#       "not  after"         : "2024-01-12 16:10:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 34 92 C4 8E E3 08 95   25 E0 C3 22 49 F3 19 95  C4......%.."I...
#           0010: AF C1 62 79                                        ..by
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 73 D3 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:17.000 UTC",
#       "not  after"         : "2024-01-12 16:10:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#           0010: 65 35 A0 6F                                        e5.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.459 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 07 8E 35 F8 FA 7B 7A 29   24 F7 B0 B5 39 38 C8 12  ..5...z)$...98..
#     0010: 17 22 DE AE 4A A3 93 64   52 6A 2A 44 EE D3 4B 6C  ."..J..dRj*D..Kl
#     0020: 6C AC 94 77 AE 9B 20 4A   BD 38 36 CB A2 5A 18 48  l..w.. J.86..Z.H
#     0030: 6A C1 C8 4B 36 48 AC A9   1F 83 88 07 35 D4 94 4A  j..K6H......5..J
#     0040: B5 C4 29 0B 47 3A 80 0C   00 F9 4C 57 7B 92 EE 59  ..).G:....LW...Y
#     0050: B1 C3 D6 1D DC 07 8B 62   02 00 36 74 62 40 8D A0  .......b..6tb@..
#     0060: 2F F1 1F 12 76 BA 57 6E   80 0D 68 7A 6D DB D4 78  /...v.Wn..hzm..x
#     0070: 8A 46 6F 8A 3B E4 49 6A   E2 7E C0 76 00 EE 6D 8D  .Fo.;.Ij...v..m.
#     0080: CA E7 89 C0 7D 4D 7B A2   E1 35 94 36 C4 4F BB E9  .....M...5.6.O..
#     0090: 0A 3C 3E 6E 70 69 96 33   AD 0F DA 90 F6 86 56 DA  .<>npi.3......V.
#     00A0: 2C 74 EF DE DC 68 D9 1E   E5 BC 7E 2B 4C F0 E3 0D  ,t...h.....+L...
#     00B0: 67 0F 39 37 AE F9 1E 81   BB BE 81 01 1C 77 1E 90  g.97.........w..
#     00C0: 30 82 C2 A5 13 74 F4 92   4E 57 65 C4 FF C0 B8 88  0....t..NWe.....
#     00D0: DF BE D5 8B 80 95 6F 61   9E 42 FA 6A 9E 49 E6 00  ......oa.B.j.I..
#     00E0: 55 09 FE 30 2E E7 C5 ED   39 46 8D E5 04 17 05 55  U..0....9F.....U
#     00F0: 25 3C 68 2D 8E 74 97 BC   88 EC 19 E3 DC 4C 79 58  %<h-.t.......LyX
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.460 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 26 F8 6A FA 13 8F 35 1F   35 E6 D0 8A 6B A5 F2 DC  &.j...5.5...k...
#     0010: 20 8E 5D 2E 54 88 A5 25   20 3C 8A 39 30 AE 9D C1   .].T..% <.90...
#     0020: AB 8E E8 14 8D A6 59 F1   5C F2 00 B2 6B 03 49 47  ......Y.\...k.IG
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.460 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:10:51.521 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A8 95 00 6F A8 26 D7 04 41 43 D4 30 23 06 AE 17 CC 99 C3 8E 9E 76 E6 EB 55 B9 ED 01 38 E5 5E E5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 16:10:51.813 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 16:10:51.814 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 16:11:02.986; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 16:11:03.299 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 73 D3 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:17.000 UTC",
#       "not  after"         : "2024-01-12 16:10:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#           0010: 65 35 A0 6F                                        e5.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 C6 47 20 C0 F7 33 B8   29 1D CC C0 25 9D A0 C5  ..G ..3.)...%...
#           0010: CC 61 88 F6                                        .a..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 4B B9 60",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 16:10:15.000 UTC",
#       "not  after"         : "2024-01-12 16:10:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 93 EE 8F 58 74 14 FD   A1 A0 81 41 D5 9D 63 9D  ....Xt.....A..c.
#           0010: 65 35 A0 6F                                        e5.o
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 16:11:03.314 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:11:03.412 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:11:03.413 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:11:03.414 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:11:03.414 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:11:03.552 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:11:03.554 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 16:11:03.554 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.571 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 16:11:03.573 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3C 5A BC 80 1D AA 38 B9 62 07 54 3C 3D 92 FC 18 DD 53 55 C7 56 7F 88 4C 76 2A 29 01 CA 7D B7 CD",
#     "session id"          : "BC 06 74 AB 87 2D 09 1E 33 A4 77 1F B6 1C 98 1C 39 95 F6 18 5D A4 B2 28 86 87 A9 AC 52 66 DE 45",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 1A 2C 1E 18 90 64 E6 21   B8 33 63 CC 8C B6 50 5C  .,...d.!.3c...P\
#               0010: 4B F9 F3 AC 6C BD C3 61   E5 85 6F 2F D2 7F CC 06  K...l..a..o/....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.592 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1D 59 34 E6 50 6E C9 3F C9 E9 FE 57 C9 3F 97 83 5A 9A F0 6C ED F2 5A D6 45 92 9F AA 93 AB 07 E0",
#     "session id"          : "BC 06 74 AB 87 2D 09 1E 33 A4 77 1F B6 1C 98 1C 39 95 F6 18 5D A4 B2 28 86 87 A9 AC 52 66 DE 45",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 39 EA 64 C6 14 FD 3A 6E   DF 92 04 90 28 6C 35 29  9.d...:n....(l5)
#             0010: 6A C8 67 95 6E 78 AC A4   B2 23 51 E4 E3 CC 3B 61  j.g.nx...#Q...;a
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.592 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.592 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.594 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.597 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.597 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.605 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.607 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.608 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.611 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:11:03.612 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 16:11:03.614 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 16:12:23.798 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:12:23.850 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:12:23.850 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:12:23.850 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 16:12:23.851 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41384/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28724ms
ok 65 stop command for single port in 31601ms
ok 66 status detects locally running solr in 14685ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2178ms
ok 69 copying files around in 6546ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 3s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m33.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5667 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5667/

All tests passed

Build Log:
[...truncated 1309 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42941/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 13:00:24.153; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 13:00:24.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 13:00:25.066; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 13:00:25.103; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23243ms
ok 61 start solr with client truststore and security manager in 25464ms
not ok 62 start solr with mTLS needed in 57864ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-IzTIZl/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42941.
#
# Started Solr server on port 42941 (pid=200055). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42942.
#
# Started Solr server on port 42942 (pid=200491). Happy searching!
#
# INFO  - 2023-10-14 13:01:49.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 13:01:49.025; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 13:01:49.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 13:01:49.711; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 13:01:49.711; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:49.745 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 89 EB 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:25.000 UTC",
#     "not  after"         : "2024-01-12 13:01:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 63 B8 FB 4F 1C F6 5E   97 3B DF E6 C3 58 60 43  *c..O..^.;...X`C
#         0010: 62 1C F0 31                                        b..1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:49.749 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D F7 E0 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:16.000 UTC",
#     "not  after"         : "2024-01-12 13:01:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:49.764 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:49.993 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:49.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:49.995 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:49.996 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:50.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:50.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:50.015 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:50.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:50.018 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4B C1 2B 12 C5 5E D9 91 8E D4 C7 15 8A 06 9A B5 9E 44 47 43 24 59 CA 1E 38 1E DC B9 4A 64 44 1E",
#   "session id"          : "F2 AB 01 D6 31 8F 87 64 CC 9E F2 FC 46 A8 6B 7D 89 2A C0 3B 6B 32 54 65 38 DB 93 49 CD 9A 5E 39",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 9F 67 5A 64 7C B9 6F   0C 26 59 19 64 8B 5C 58  ..gZd..o.&Y.d.\X
#             0010: 39 8A 25 89 D9 3B 4C 2D   45 90 4C F8 84 55 06 2B  9.%..;L-E.L..U.+
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.130 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "56 D6 D6 86 50 E6 34 DC 8E A9 1C 1C 3F 4B BA 39 86 E6 00 DE C2 4B 10 B3 A8 36 00 2C 42 8B 67 EF",
#   "session id"          : "F2 AB 01 D6 31 8F 87 64 CC 9E F2 FC 46 A8 6B 7D 89 2A C0 3B 6B 32 54 65 38 DB 93 49 CD 9A 5E 39",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 8F 75 B2 62 6C 31 22   20 B2 F2 4E E9 AF 18 9B  C.u.bl1" ..N....
#           0010: 29 E1 DF 18 F9 4D 98 41   08 B5 7A 10 A9 41 0A 68  )....M.A..z..A.h
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.131 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.131 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.134 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.136 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.136 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.146 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.148 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.149 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.153 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.153 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.153 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.153 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.153 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.156 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.156 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.156 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.157 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.158 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.159 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.163 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 B0 3C E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:21.000 UTC",
#       "not  after"         : "2024-01-12 13:01:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 00 CB 3E 49 5E 15 92   0D 20 32 22 54 F3 A5 25  M..>I^... 2"T..%
#           0010: BE 44 B0 3D                                        .D.=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.163 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:50.218 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:50.221 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:50.221 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:50.221 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.266 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.270 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6B 21 7D 51 7C D9 93 12   2A 39 AB 74 75 5D 4A 62  k!.Q....*9.tu]Jb
#     0010: 6A 7A 2E 56 BF 4F 16 9E   7F 13 E9 01 EC 37 F2 FD  jz.V.O.......7..
#     0020: DC EC E9 FD 5B DA C1 65   87 DD B9 DF 5D 6B D7 2B  ....[..e....]k.+
#     0030: 20 CE 70 82 D5 4D 98 3F   43 A3 9C 96 42 B6 8A 88   .p..M.?C...B...
#     0040: D2 59 CC 07 1E AF CF C1   30 3D E7 52 E0 99 08 5D  .Y......0=.R...]
#     0050: AE 31 24 68 03 44 8E 2F   90 5F E2 E8 EB E5 15 8D  .1$h.D./._......
#     0060: D4 F9 2A FC 8B 2D 53 DA   74 DD 59 A0 C7 A6 E9 56  ..*..-S.t.Y....V
#     0070: 0E F3 92 8B 84 06 E7 C8   A1 66 D4 56 46 AC 11 A3  .........f.VF...
#     0080: 03 D5 4D EE 71 D5 C7 2B   6C 7F F4 97 22 B0 73 08  ..M.q..+l...".s.
#     0090: 30 11 17 C2 12 C1 1E C0   E1 ED 83 CC DC 3A F4 60  0............:.`
#     00A0: 15 30 FA 09 69 09 A8 44   D7 0E 1F 4C 3C AD DE C0  .0..i..D...L<...
#     00B0: 40 9B BC 77 5D 9B D6 1E   0A 51 2F D3 A6 11 9D BC  @..w]....Q/.....
#     00C0: 70 8F D1 97 22 F6 78 AA   47 69 E5 0C F7 3D 16 1A  p...".x.Gi...=..
#     00D0: E8 44 71 D8 32 9B 4C 50   23 80 C3 D4 0C 57 AD CD  .Dq.2.LP#....W..
#     00E0: D1 F1 3A 68 B4 8F DD 38   23 02 0B E3 98 41 B3 09  ..:h...8#....A..
#     00F0: 5F 22 95 06 F1 48 8E 03   04 49 46 EB BC E3 8D FB  _"...H...IF.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.272 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 26 2E E8 14 00 36 D7 5D   A8 7C B6 F3 36 F0 D4 5B  &....6.]....6..[
#     0010: 1C DB 6B FB 07 DA 54 5A   D5 AC 0D C4 50 58 FF CB  ..k...TZ....PX..
#     0020: A8 F9 1C 4B EF 5B BA C8   BB A3 4A B8 A6 71 91 12  ...K.[....J..q..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.275 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:50.276 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.276 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:50.276 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.276 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:50.276 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:50.277 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.277 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.280 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 89 EB 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:25.000 UTC",
#       "not  after"         : "2024-01-12 13:01:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 63 B8 FB 4F 1C F6 5E   97 3B DF E6 C3 58 60 43  *c..O..^.;...X`C
#           0010: 62 1C F0 31                                        b..1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2E 78 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:18.000 UTC",
#       "not  after"         : "2024-01-12 13:01:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#           0010: 0F B0 8F 02                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.305 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 7E 85 C3 E5 B0 81 80   D5 73 DF 33 78 55 53 78  ^........s.3xUSx
#     0010: 14 83 7C 73 BC F1 4E 94   7C 30 8D F4 D6 D3 41 61  ...s..N..0....Aa
#     0020: B6 5A 69 DC E9 A7 FC AA   7B E4 F5 36 FF 73 13 7D  .Zi........6.s..
#     0030: AC 68 AF 3B 9D 88 59 5B   D3 CA B3 02 5A 2D DE 41  .h.;..Y[....Z-.A
#     0040: 5A 2A 42 8B 3A 3F A9 7D   75 24 73 1A 75 78 DD D1  Z*B.:?..u$s.ux..
#     0050: 86 3B 86 AE 09 A2 E9 99   9F 1B 79 2F FB CF 5D BB  .;........y/..].
#     0060: ED 0F 9A 48 98 60 9B 0E   75 6B C7 0B 1F 8C AB B6  ...H.`..uk......
#     0070: E0 4D 10 1E 6A 53 E3 4D   28 74 11 BC 8E 30 88 7E  .M..jS.M(t...0..
#     0080: F8 EA B2 28 91 94 2F 4F   99 EA 94 E9 1A 1F 2B 95  ...(../O......+.
#     0090: 6E D6 2B 0F F7 EA BA C5   C9 E6 82 DA 46 B7 70 9B  n.+.........F.p.
#     00A0: 4B 7F CF AC 75 18 F9 CC   DD FC F4 6F 78 5E CB 6F  K...u......ox^.o
#     00B0: 5F E4 CA 19 3E 71 EC 3E   A8 F6 4D 56 8F 1A 4E F5  _...>q.>..MV..N.
#     00C0: B6 7B 64 35 98 70 E8 4A   D2 61 59 C8 E2 9F 1F EC  ..d5.p.J.aY.....
#     00D0: ED 8D 18 4B A9 8A D9 77   14 C1 E3 86 47 EA 20 28  ...K...w....G. (
#     00E0: D1 02 59 D6 AB AF ED 1E   49 03 E9 5F 4B 0D 53 4C  ..Y.....I.._K.SL
#     00F0: 18 0A BC 2B 67 2D BA 0C   E2 D0 8A 63 C3 05 97 AF  ...+g-.....c....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.306 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E B3 D6 8D 13 3C E9 AA   87 58 AB 14 78 46 3E BD  .....<...X..xF>.
#     0010: A0 88 E3 28 22 76 17 AA   06 BE DF 10 CB CE B5 B5  ...("v..........
#     0020: 70 71 02 57 B6 62 88 99   73 35 93 34 03 46 5E 9D  pq.W.b..s5.4.F^.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.307 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:50.366 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E5 AB 68 FE 8D 75 EC CF 92 71 21 C6 5E E9 17 9F E0 63 61 21 84 24 B9 11 BA 38 40 8C 55 0F 8A 28",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 13:01:50.655 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 13:01:50.656 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 13:01:51.612; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 13:01:51.618; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 13:01:51.992; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 13:01:51.995; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 13:01:51.996; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IzTIZl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:52.030 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 89 EB 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:25.000 UTC",
#     "not  after"         : "2024-01-12 13:01:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 63 B8 FB 4F 1C F6 5E   97 3B DF E6 C3 58 60 43  *c..O..^.;...X`C
#         0010: 62 1C F0 31                                        b..1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:52.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D F7 E0 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:16.000 UTC",
#     "not  after"         : "2024-01-12 13:01:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 13:01:52.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:52.580 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.581 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:52.582 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:01:52.583 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.588 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.600 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.601 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:01:52.603 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7E 9E A0 AD D5 B4 C2 C5 1E 0C 02 8B 24 F0 71 0F 6E 8F 72 E9 68 3D 57 59 D8 E3 23 DB 5F FC CA E4",
#   "session id"          : "23 A6 24 FE 4A 43 F5 64 94 F3 1D 24 A3 B0 F9 D7 D0 06 57 DA DE FF 5E 91 DE 19 4D 58 30 A5 6F 7F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 2A 92 D5 2F 3C 8E FC   54 3D 66 BA 03 25 E8 5D  h*../<..T=f..%.]
#             0010: 36 A8 31 59 E5 72 F6 4D   23 0F 74 28 BA E2 F7 6B  6.1Y.r.M#.t(...k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.720 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FE 64 17 91 79 C8 7D 6D 13 C9 0A 4D 6B F0 71 B7 8F 23 9F DC 67 22 D1 6C 09 69 6B 80 04 57 B4 1C",
#   "session id"          : "23 A6 24 FE 4A 43 F5 64 94 F3 1D 24 A3 B0 F9 D7 D0 06 57 DA DE FF 5E 91 DE 19 4D 58 30 A5 6F 7F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A3 08 7F 5A E5 59 5A 5F   3F 6D BC B8 D7 2A A8 FF  ...Z.YZ_?m...*..
#           0010: 8C A8 9F EF CD CF 55 41   21 17 A2 94 EB 47 F6 55  ......UA!....G.U
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.721 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.721 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.723 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.726 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.726 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.736 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.737 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.739 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.742 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.743 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.743 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.743 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.746 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.746 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.746 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.747 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.748 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.749 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.749 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.752 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 B0 3C E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:21.000 UTC",
#       "not  after"         : "2024-01-12 13:01:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 00 CB 3E 49 5E 15 92   0D 20 32 22 54 F3 A5 25  M..>I^... 2"T..%
#           0010: BE 44 B0 3D                                        .D.=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.753 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:52.792 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:52.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:52.794 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:01:52.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.842 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 2E 78 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 13:01:18.000 UTC",
#     "not  after"         : "2024-01-12 13:01:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#         0010: 0F B0 8F 02                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#         0010: C6 CF AB 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.846 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0B CA 1B 23 91 06 31 28   29 C0 38 8F 7A FC 42 61  ...#..1().8.z.Ba
#     0010: E1 C4 B8 7D 2A 28 CF 97   B2 60 2E C6 61 4C FD 8B  ....*(...`..aL..
#     0020: BA 25 39 B2 0B 38 84 39   58 9C F7 84 F7 6E 7D 39  .%9..8.9X....n.9
#     0030: D2 94 F2 D2 12 D5 04 90   82 13 99 B6 F7 CC B6 7E  ................
#     0040: 00 7E 05 2E 16 D9 38 61   0D 98 AB 56 38 F9 A7 B2  ......8a...V8...
#     0050: A5 D4 0A 37 09 BA 55 E3   FB 61 06 F6 1F 51 E3 2B  ...7..U..a...Q.+
#     0060: 0E 0A 59 2A 08 33 B2 F4   2C 76 D2 64 0E BD B5 F1  ..Y*.3..,v.d....
#     0070: 70 9E 5A 2B 1E 1F 81 8D   7A FB FA 91 A9 41 4D 84  p.Z+....z....AM.
#     0080: 77 14 41 2C 12 2A 42 7D   37 92 B8 91 FF 1C D2 9E  w.A,.*B.7.......
#     0090: 16 DD 54 98 FF 2C 8F 58   2F 7A 43 09 6F 63 D2 44  ..T..,.X/zC.oc.D
#     00A0: CD 9F 8F 57 CB 6F 14 7F   7B 27 4C 95 AC B2 E3 C4  ...W.o...'L.....
#     00B0: 2D 24 D7 D8 F7 FA A4 74   98 0C 70 CD 77 A8 EB 7C  -$.....t..p.w...
#     00C0: 3D A2 8C 0E 2B 66 EB 7F   28 0D 02 20 08 FB 1E 49  =...+f..(.. ...I
#     00D0: 17 09 81 AB 5A D1 96 B9   3F 0B E7 9A 42 9A 2D D4  ....Z...?...B.-.
#     00E0: F3 38 F5 87 2C 8B F3 C9   CA 10 90 E3 37 F8 BF 00  .8..,.......7...
#     00F0: 9D 94 24 3A 67 24 29 20   84 1A 55 2B 29 91 24 F1  ..$:g$) ..U+).$.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.848 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 48 2E B0 A1 E0 6F 2A 09   59 35 4D 01 74 5B 2A 10  H....o*.Y5M.t[*.
#     0010: 5D E6 25 E1 29 9C 12 BE   21 7A 43 5F 3C 7B 48 7C  ].%.)...!zC_<.H.
#     0020: 40 41 01 8D FB 0D 9C 47   4E E7 93 F8 53 3C DD B6  @A.....GN...S<..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.850 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:52.851 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.851 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:52.851 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.852 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 13:01:52.852 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:01:52.852 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.853 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.855 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 89 EB 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:25.000 UTC",
#       "not  after"         : "2024-01-12 13:01:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 63 B8 FB 4F 1C F6 5E   97 3B DF E6 C3 58 60 43  *c..O..^.;...X`C
#           0010: 62 1C F0 31                                        b..1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2E 78 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:18.000 UTC",
#       "not  after"         : "2024-01-12 13:01:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#           0010: 0F B0 8F 02                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.882 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 DD 52 A6 27 11 4C 1A   C8 0E A4 D0 C1 7B A4 AD  d.R.'.L.........
#     0010: E5 9D C5 22 9A 7C CC F1   63 8E 19 F0 4C AC E7 E4  ..."....c...L...
#     0020: E7 7A CC 27 01 15 37 9A   1B 20 FB 4A 1C EB 45 9A  .z.'..7.. .J..E.
#     0030: 8F DC 62 A0 D8 8F 0E 01   80 8D BD 3F BA DE DE 39  ..b........?...9
#     0040: 8F BE 86 6B F0 7B 1C AB   73 A1 11 DB FD A4 BB 46  ...k....s......F
#     0050: 53 A5 C6 72 C3 D3 00 B5   83 72 88 08 5B 6F 0E 5D  S..r.....r..[o.]
#     0060: EE D9 44 AD 42 3D 3C FD   3F 49 77 C3 88 E9 CC 62  ..D.B=<.?Iw....b
#     0070: 79 E0 64 87 04 EE D0 33   87 35 C8 6C 10 62 8F 7D  y.d....3.5.l.b..
#     0080: 03 70 2C 8F D2 89 73 D5   03 1C 77 66 66 9F BE 71  .p,...s...wff..q
#     0090: DE 5D B2 5A 4F 01 C1 AF   5C 23 3F EB FD BC 5A 96  .].ZO...\#?...Z.
#     00A0: 96 5B 64 5B F5 24 19 72   15 EB FC 78 F9 38 FF F8  .[d[.$.r...x.8..
#     00B0: 99 2E 80 4A 73 A8 9D 08   9F B6 90 3E A9 02 80 F2  ...Js......>....
#     00C0: B4 E0 7D 36 4C 40 6F C4   5E 81 FD 72 2D F4 A5 3B  ...6L@o.^..r-..;
#     00D0: A6 A8 9F CD FB AE D1 20   8A 23 28 08 54 3C D7 47  ....... .#(.T<.G
#     00E0: BD 9E 03 84 C0 24 2F 2D   77 78 4A BA 1F 7F 96 A6  .....$/-wxJ.....
#     00F0: 5C EB 0A 51 34 4D 4E 09   60 76 F0 C5 3A FC A9 CC  \..Q4MN.`v..:...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.883 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0C CE 5C 20 A2 38 75 66   63 FB 13 B7 EF 70 EC E2  ..\ .8ufc....p..
#     0010: D5 74 E3 CF F9 5D 84 B4   3E D8 AB 09 2F BB E9 6B  .t...]..>.../..k
#     0020: 55 7B F0 48 6E FF 45 AF   DA 3A 99 95 23 3D E4 07  U..Hn.E..:..#=..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.883 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:01:52.945 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "05 E9 1E 79 3E 63 4C C8 36 3A C7 F5 BE 61 5D 18 C6 84 BC 0F 99 3B 57 D5 B4 FA CD E3 96 4C 53 84",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 13:01:53.242 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 13:01:53.242 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 13:02:04.883; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 13:02:05.291 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 2E 78 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:18.000 UTC",
#       "not  after"         : "2024-01-12 13:01:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#           0010: 0F B0 8F 02                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA 1B A5 9A D3 82 90 1E   65 73 CA CD 8C 99 38 C7  ........es....8.
#           0010: C6 CF AB 9B                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D F7 E0 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 13:01:16.000 UTC",
#       "not  after"         : "2024-01-12 13:01:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A6 5B 47 9A EF 2C 67   3F 8F B7 FC D8 A2 D5 F1  B.[G..,g?.......
#           0010: 0F B0 8F 02                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 13:02:05.306 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:02:05.535 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.535 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:02:05.537 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 13:02:05.537 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.554 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 13:02:05.557 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "36 01 76 16 0B 7B 45 83 F8 0C 6D 6B DC F4 8A 42 91 87 ED C3 DF 65 B2 49 70 7F 26 65 C0 EB 1A 11",
#     "session id"          : "A9 31 B1 5B 07 DB 5F DE EF 74 B4 35 DB 66 41 49 0A 24 E2 72 0D 06 D0 84 C3 83 B6 4F C6 AB 72 B7",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A9 72 EE 7D 91 4F A7 9F   01 71 9B 90 4F 44 1E 40  .r...O...q..OD.@
#               0010: 66 C3 7B 12 3F 0B BA F4   05 18 F4 45 13 31 E7 57  f...?......E.1.W
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.575 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "40 A7 5E 93 44 91 AC 3F C0 77 89 13 28 86 8B 02 8B A8 AE D7 F5 3D F1 B2 D9 C8 F9 9F DB 8C 5E 91",
#     "session id"          : "A9 31 B1 5B 07 DB 5F DE EF 74 B4 35 DB 66 41 49 0A 24 E2 72 0D 06 D0 84 C3 83 B6 4F C6 AB 72 B7",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 93 D3 8E 05 80 6F C6   40 D2 D5 C0 8A 8D BB 3F  m.....o.@......?
#             0010: 0E 6C A2 77 9D D0 2C E8   FA 22 73 D3 47 92 1C 24  .l.w..,.."s.G..$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.575 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.575 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.576 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.579 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.588 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.590 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.591 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.594 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.594 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.594 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:02:05.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 13:02:05.597 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 13:03:24.224 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:03:24.274 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:03:24.274 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:03:24.274 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 13:03:24.274 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42942/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28168ms
ok 65 stop command for single port in 30771ms
ok 66 status detects locally running solr in 14583ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2211ms
ok 69 copying files around in 6597ms
ok 70 upconfig in 2633ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1227ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m47.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5666 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5666/

All tests passed

Build Log:
[...truncated 1310 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41291/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 10:53:46.575; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:53:46.581; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 10:53:47.472; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 10:53:47.509; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23336ms
ok 61 start solr with client truststore and security manager in 25786ms
not ok 62 start solr with mTLS needed in 61199ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-CVYk2P/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41291.
#
# Started Solr server on port 41291 (pid=199452). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41292.
#
# Started Solr server on port 41292 (pid=199884). Happy searching!
#
# INFO  - 2023-10-14 10:55:11.778; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:55:11.784; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 10:55:12.142; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:55:12.145; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:55:12.145; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:12.177 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 69 B0 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:48.000 UTC",
#     "not  after"         : "2024-01-12 10:54:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 40 2E CB 64 96 B4 88   21 91 20 2D 05 B7 9B DD  .@..d...!. -....
#         0010: D0 40 B4 B3                                        .@..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:12.181 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 78 91 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:39.000 UTC",
#     "not  after"         : "2024-01-12 10:54:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:12.196 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:12.425 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:12.427 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:12.427 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.433 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.445 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.445 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:12.448 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6F 12 41 C9 F6 A9 E5 45 24 46 5E 85 CF C4 A3 4A 65 A7 C9 43 2E FA 6D BB C4 B8 21 CA 6A 73 49 05",
#   "session id"          : "62 42 60 4A 4A 36 38 D8 9C A0 95 8F F9 8F 65 3A AE 46 FA F5 09 31 42 D3 06 CF 3A 92 3C 8C 8E E2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 94 C6 30 AE 68 86 5E   84 87 58 9B 7F 0C A4 3F  ...0.h.^..X....?
#             0010: 56 94 E4 DC B9 A4 62 0A   09 40 09 D3 92 FF E0 3F  V.....b..@.....?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.555 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4E 91 86 2D 14 EF 8F B3 8C 3C 3F 02 9B D5 5B 6C F7 E6 65 E0 AB 9D 3A 25 83 23 68 DF 02 F7 CE 06",
#   "session id"          : "62 42 60 4A 4A 36 38 D8 9C A0 95 8F F9 8F 65 3A AE 46 FA F5 09 31 42 D3 06 CF 3A 92 3C 8C 8E E2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 1C F2 B1 D2 D9 60 DD   83 BC C7 D3 72 5A 6C 0D  p.....`.....rZl.
#           0010: 4E B2 54 29 EB 74 65 32   C1 4E 21 B2 68 71 DE 07  N.T).te2.N!.hq..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.556 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.556 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.558 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.558 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.558 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.558 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.559 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.559 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.561 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.571 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.572 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.573 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.577 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.577 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.577 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.578 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.578 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.578 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.578 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.579 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.580 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.580 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.580 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.581 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.582 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.584 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 E7 88 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:44.000 UTC",
#       "not  after"         : "2024-01-12 10:54:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 44 64 E3 4E FC 36 E5   D9 28 80 A3 CD 68 79 BB  .Dd.N.6..(...hy.
#           0010: C3 35 1F 1C                                        .5..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.585 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:12.627 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:12.627 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:12.627 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:12.627 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.666 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.670 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 84 C3 54 D5 B7 CC B9 58   63 DA 40 2D 8A 95 47 F5  ..T....Xc.@-..G.
#     0010: 83 BD A1 6B C2 42 AF C0   D8 07 89 94 34 A7 F9 F7  ...k.B......4...
#     0020: 09 72 2A BC 34 4B 42 B6   98 FD 6B 51 AC F9 0C A9  .r*.4KB...kQ....
#     0030: 09 4C 76 7F 2E 95 48 82   88 CE BE D7 1D 79 80 CC  .Lv...H......y..
#     0040: CB A4 FA 4C A7 FA 82 35   47 F1 BE 4B 3F 6F 67 96  ...L...5G..K?og.
#     0050: C6 E0 02 8E 02 10 E8 3D   0D 8E 22 0E DA D5 74 68  .......=.."...th
#     0060: ED 01 85 E4 83 22 1F AA   BD D7 FB 5A 52 DA 6C 7C  .....".....ZR.l.
#     0070: 55 0A 7C F5 80 93 BE 56   45 D5 FB AE 6B 59 23 74  U......VE...kY#t
#     0080: D6 25 64 D3 57 63 3D D4   D3 CE 75 63 A4 D1 00 E4  .%d.Wc=...uc....
#     0090: 53 76 38 5F 2B 9E 30 2C   58 C5 22 E8 46 0F 45 62  Sv8_+.0,X.".F.Eb
#     00A0: FD 05 E9 DE 10 2C 31 39   AE 6F 67 3E D1 B9 F9 B9  .....,19.og>....
#     00B0: 15 9A E7 8C 74 37 1A D6   AB 51 9B 62 AC 55 4D E9  ....t7...Q.b.UM.
#     00C0: DA B7 4C 36 6F 86 E2 52   D3 7B 9C 5F A1 2C 4F AE  ..L6o..R..._.,O.
#     00D0: 2F 32 4E EB 0B CC AE FA   67 FB 9F BF 33 DC 71 0D  /2N.....g...3.q.
#     00E0: B0 C5 24 F1 A9 74 A0 CF   72 9C 4C 0E 27 0B 77 82  ..$..t..r.L.'.w.
#     00F0: BA 7D D4 A3 5E 6F 93 72   5A 4F 12 5D E1 CA 67 43  ....^o.rZO.]..gC
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.672 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E AB DD AB A9 A5 DD 51   8E 0A EC C9 74 08 E0 E6  .......Q....t...
#     0010: 93 3E 72 5D 0E 10 07 D9   3B 37 12 95 FD A9 91 7E  .>r]....;7......
#     0020: 76 EE 27 12 49 BC CE C9   2E DE 26 EF BE 01 FE 58  v.'.I.....&....X
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.675 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:12.675 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.676 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:12.676 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.676 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:12.676 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:12.677 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.677 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.680 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 69 B0 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:48.000 UTC",
#       "not  after"         : "2024-01-12 10:54:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 40 2E CB 64 96 B4 88   21 91 20 2D 05 B7 9B DD  .@..d...!. -....
#           0010: D0 40 B4 B3                                        .@..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 9B 2A B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:41.000 UTC",
#       "not  after"         : "2024-01-12 10:54:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#           0010: 39 5F EB B2                                        9_..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.706 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D DF BD 2C AF DA CA F9   6E DB F2 E0 72 F1 28 64  m..,....n...r.(d
#     0010: E1 B7 00 C3 DE 68 45 69   F5 0A D9 33 C5 DD 36 59  .....hEi...3..6Y
#     0020: E6 AC 1D 21 DB 1C AB 36   F6 E6 C7 0F 1C 83 74 0E  ...!...6......t.
#     0030: 52 85 D1 31 59 8D DE F2   2A 66 EC B9 31 6F A3 2C  R..1Y...*f..1o.,
#     0040: 06 A2 F4 04 BC AA 6E E6   13 43 21 97 70 7D F2 83  ......n..C!.p...
#     0050: 20 5A 3B 16 82 38 B7 E6   FB 8E CD CC 73 5F 6D C3   Z;..8......s_m.
#     0060: ED 17 15 3D 5D 45 8A ED   8D 62 0C 31 0B 72 81 AD  ...=]E...b.1.r..
#     0070: A6 DF FB 33 AA 6F 0F AB   23 F8 45 38 A5 E5 ED 23  ...3.o..#.E8...#
#     0080: A7 6C 8D 43 BE CC E0 C1   9F B8 09 9A F5 8E 10 65  .l.C...........e
#     0090: 98 94 38 09 C3 F0 49 47   7B 8B 71 A3 BC E9 4A F2  ..8...IG..q...J.
#     00A0: 39 29 8C B5 98 CD BD BB   7A 39 CA 66 EC C7 18 33  9)......z9.f...3
#     00B0: 6D E0 7F 67 76 6C 77 A1   36 63 0E 3C 88 CE 6D D1  m..gvlw.6c.<..m.
#     00C0: 31 0B 14 96 2E 8F E0 8E   C8 89 3E 4A 69 A3 F7 1E  1.........>Ji...
#     00D0: CA 61 8F E1 0C 11 DA 0F   73 2C 45 74 CA 70 77 79  .a......s,Et.pwy
#     00E0: BA 4F FF 00 C5 90 31 04   DE 69 91 59 0A A8 59 33  .O....1..i.Y..Y3
#     00F0: 1D 0E C4 58 4F AE 5A 80   AD 3D 25 0C CB 48 86 F3  ...XO.Z..=%..H..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.707 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 31 1A EA 54 D5 2D AE   63 7F 62 99 82 D3 92 C6  .1..T.-.c.b.....
#     0010: DC 8A 8F D4 28 26 F2 E3   11 D0 84 90 99 42 B6 05  ....(&.......B..
#     0020: 82 02 EC 50 F7 DC F3 69   08 BF 71 6A 73 BC 91 4D  ...P...i..qjs..M
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.708 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:12.764 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4E 0D BB 82 64 79 BF AA 48 FD DB 66 B7 55 6B 23 C5 9B C6 D5 70 0F A7 30 DA E8 C8 4B 11 E6 DA C1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 10:55:13.064 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 10:55:13.065 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 10:55:14.016; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 10:55:14.021; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 10:55:14.392; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:55:14.395; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 10:55:14.395; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CVYk2P/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:14.429 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 69 B0 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:48.000 UTC",
#     "not  after"         : "2024-01-12 10:54:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C9 40 2E CB 64 96 B4 88   21 91 20 2D 05 B7 9B DD  .@..d...!. -....
#         0010: D0 40 B4 B3                                        .@..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:14.433 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 78 91 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:39.000 UTC",
#     "not  after"         : "2024-01-12 10:54:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:14.449 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:14.775 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:14.777 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:14.777 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:14.778 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:14.927 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:14.930 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:14.930 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.936 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.948 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:14.952 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4B 5E 0A EE D3 56 B4 9C D0 B4 F0 6A 93 43 1A 35 19 E0 CF C4 00 B4 7E DB 56 5C 6A EC A3 AC 8B 9C",
#   "session id"          : "3C A0 FC 56 63 67 95 14 47 10 E9 54 ED F7 2A D9 EC 9E 3E 86 9A 06 B8 69 F6 DA 6F 36 04 11 B5 2F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 20 14 1E 67 F6 CF 8A 14   3F A5 45 61 40 9A 71 87   ..g....?.Ea@.q.
#             0010: 4C C6 C2 71 63 8B 7F 1E   CA 6C 64 A5 5B 22 37 5C  L..qc....ld.["7\
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.047 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 1D 0B 39 CD A6 68 BE C6 7C 20 88 FE 40 42 E2 42 94 47 B5 2C C4 65 DD AA 5A 2A 1B 3A 54 A8 9E",
#   "session id"          : "3C A0 FC 56 63 67 95 14 47 10 E9 54 ED F7 2A D9 EC 9E 3E 86 9A 06 B8 69 F6 DA 6F 36 04 11 B5 2F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EB 60 22 1F 0B 04 1D 1B   6B A0 37 10 3E 50 34 7C  .`".....k.7.>P4.
#           0010: 72 F5 6D F3 0C BD 06 0E   DF 19 57 92 3C 3E 2A 26  r.m.......W.<>*&
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.047 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.047 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.048 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.049 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.050 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.052 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.053 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.062 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.064 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.065 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.069 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.070 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.072 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.072 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.073 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.074 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.075 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.075 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.078 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 E7 88 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:44.000 UTC",
#       "not  after"         : "2024-01-12 10:54:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 44 64 E3 4E FC 36 E5   D9 28 80 A3 CD 68 79 BB  .Dd.N.6..(...hy.
#           0010: C3 35 1F 1C                                        .5..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.079 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.180 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 9B 2A B3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 10:54:41.000 UTC",
#     "not  after"         : "2024-01-12 10:54:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#         0010: 39 5F EB B2                                        9_..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#         0010: 52 C4 1B 02                                        R...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.183 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 99 E1 F3 B0 73 DC 88 35   29 D9 8B EA 5E 46 0A A0  ....s..5)...^F..
#     0010: 34 1C 63 6F F7 83 92 30   7D 42 37 6B DE 08 E8 4C  4.co...0.B7k...L
#     0020: EE 31 0C 4A F6 61 28 5C   5F FA F7 2C 9C 66 CE D3  .1.J.a(\_..,.f..
#     0030: B9 0E 35 7D 87 56 AD A1   B3 2B FD 7D F2 D0 D1 1A  ..5..V...+......
#     0040: 3C 7C 0F 58 3C 77 DA EA   1F 7F B4 91 A2 5F BF 76  <..X<w......._.v
#     0050: AC C6 96 EE 26 21 5E 09   42 AF 3E 27 2F CC 18 20  ....&!^.B.>'/..
#     0060: 08 A0 11 FE 81 8E A3 8A   80 F5 55 7F F6 4E C7 D8  ..........U..N..
#     0070: 92 A0 9E 63 F0 C0 57 D9   00 56 F8 1B 10 D8 E0 2E  ...c..W..V......
#     0080: F8 A6 27 39 1E 6C 38 AB   82 93 B9 BC C6 0A 5A AC  ..'9.l8.......Z.
#     0090: AF 97 9E DE CD 2D A7 BF   DF E5 22 FD 9F 4B B2 A5  .....-...."..K..
#     00A0: E2 26 29 2F 31 34 22 26   7D F8 AF 0C 85 17 59 45  .&)/14"&......YE
#     00B0: 78 94 C9 51 C6 7E 1B 88   EF AB C5 89 84 6F D1 4F  x..Q.........o.O
#     00C0: 0B 36 58 04 07 D2 10 50   57 1F FE 28 93 14 35 88  .6X....PW..(..5.
#     00D0: 6A 95 5A A1 EB 51 61 6A   1B 7F 03 0C D1 A6 10 29  j.Z..Qaj.......)
#     00E0: 38 D5 FF BA 18 B0 AA C0   5E 69 56 CE C5 C5 64 65  8.......^iV...de
#     00F0: 73 DB FE 89 35 5E A6 25   81 DB 0C E5 65 F0 FD 14  s...5^.%....e...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.185 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 F5 BC AF 1F 2B F5 00   6A ED 9A B7 E7 E7 66 B2  .....+..j.....f.
#     0010: 81 64 31 71 EA 4D BB EC   F7 C5 42 C3 69 07 BE 64  .d1q.M....B.i..d
#     0020: 27 94 E9 A2 B6 D4 B7 CB   D5 30 8B ED 0F 89 99 F8  '........0......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.187 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:15.188 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.188 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:15.189 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.189 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 10:55:15.189 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:15.189 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.190 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.192 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 69 B0 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:48.000 UTC",
#       "not  after"         : "2024-01-12 10:54:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 40 2E CB 64 96 B4 88   21 91 20 2D 05 B7 9B DD  .@..d...!. -....
#           0010: D0 40 B4 B3                                        .@..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 9B 2A B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:41.000 UTC",
#       "not  after"         : "2024-01-12 10:54:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#           0010: 39 5F EB B2                                        9_..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.219 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 48 DD A6 0F 4B 0C 7E   21 44 DF F8 91 01 4E EE  MH...K..!D....N.
#     0010: 2E 5E EF 6B D5 70 FB A8   B3 5E 00 71 69 10 D4 71  .^.k.p...^.qi..q
#     0020: 53 0B 23 EB 76 55 D5 2B   A5 46 6A 0A 64 D8 82 A0  S.#.vU.+.Fj.d...
#     0030: C5 8B C9 14 D3 4D 37 45   36 13 98 EE 4E E2 31 19  .....M7E6...N.1.
#     0040: 53 10 88 90 65 D4 C4 37   4D 92 1F 2D 0C 54 06 41  S...e..7M..-.T.A
#     0050: F3 66 EA 8F 31 E9 25 8B   6D 21 28 83 FB F4 18 18  .f..1.%.m!(.....
#     0060: CF 70 7E 48 86 39 AE E4   7B CB 53 5C DC EA D7 A1  .p.H.9....S\....
#     0070: 8D 6F FE 32 7B 45 29 C0   28 7E E4 15 04 AB 45 14  .o.2.E).(.....E.
#     0080: B2 25 63 E9 C0 C0 9A 0D   07 AA 05 CE 16 E1 E8 BE  .%c.............
#     0090: C7 B7 71 DC EF 01 17 9E   A8 E0 4D F5 18 01 66 59  ..q.......M...fY
#     00A0: 38 8D 7F CC 2B 37 A7 F2   8B 81 EF E6 27 87 EF 93  8...+7......'...
#     00B0: E5 A5 C9 98 29 BE 1A 35   76 50 41 56 07 82 2F 62  ....)..5vPAV../b
#     00C0: FE 8D 8A 5D C4 22 78 21   EA 28 58 64 C6 1C CB D6  ...]."x!.(Xd....
#     00D0: 4D A8 9D BF E7 F2 93 66   BE 67 6D E1 96 02 B5 23  M......f.gm....#
#     00E0: 79 94 35 15 2E A6 6C F2   EC 5B EA 3B 7C E1 99 2A  y.5...l..[.;...*
#     00F0: CA 84 71 6B 68 30 4A 60   01 EA 68 BE 0E 63 93 48  ..qkh0J`..h..c.H
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.220 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 87 31 C0 9A 8B DA D4 3B   59 CE DC 4D 40 00 48 AF  .1.....;Y..M@.H.
#     0010: BA 14 11 BC B0 7F 38 5F   D4 AC D8 49 23 87 0E 2D  ......8_...I#..-
#     0020: 56 93 4E 9A BF 0A 1E C6   45 AB 5D 31 27 03 1C 88  V.N.....E.]1'...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.221 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:15.284 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "72 32 A0 5D C8 34 92 D4 77 DF 18 8E B6 5D 62 58 8E 92 94 BF 62 E7 4A 80 56 59 53 B0 5B 21 D1 F3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 10:55:15.563 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 10:55:15.564 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 10:55:26.794; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:27.146 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 78 91 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:39.000 UTC",
#       "not  after"         : "2024-01-12 10:54:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#           0010: 39 5F EB B2                                        9_..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 9B 2A B3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 10:54:41.000 UTC",
#       "not  after"         : "2024-01-12 10:54:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 6E 39 92 45 FA 71 62   07 8C 11 A6 AF 23 6E FB  .n9.E.qb.....#n.
#           0010: 39 5F EB B2                                        9_..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 DB B1 94 1B F0 95 E7   93 E5 9E C7 E7 00 D9 70  ...............p
#           0010: 52 C4 1B 02                                        R...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 10:55:27.163 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:27.512 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:27.513 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:27.513 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:55:27.513 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:27.661 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:27.663 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 10:55:27.663 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.680 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.681 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.681 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 10:55:27.683 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "05 9D A7 B1 90 8B D3 F8 45 A0 92 61 C1 C1 FD 9D 3A E6 2A 45 8F AF 4E E4 A1 0C 88 60 63 12 7B 1D",
#     "session id"          : "55 2B 19 9A 17 25 2C 7B 64 EA E4 A6 DE B2 D0 4A F6 DC E6 DA 5D EA 8D 9C FE 15 46 31 04 0F 9E 83",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5B CD 0E A8 92 F0 15 FC   CF E9 8D 63 98 EB 1F 04  [..........c....
#               0010: 53 5C DC 1D 72 A4 33 81   D9 99 1A 19 9C 51 18 21  S\..r.3......Q.!
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.704 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DF 11 82 61 04 69 50 10 EA 8F 8D 54 32 6C FF 6A D6 43 5E 9A 14 CF AF CF BC 56 AC F0 40 95 7A 33",
#     "session id"          : "55 2B 19 9A 17 25 2C 7B 64 EA E4 A6 DE B2 D0 4A F6 DC E6 DA 5D EA 8D 9C FE 15 46 31 04 0F 9E 83",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4E 57 EC 3A 22 44 A4 72   C2 65 10 A8 62 E6 0D FE  NW.:"D.r.e..b...
#             0010: 7B F4 27 29 46 3F 4A 1D   43 BF 74 16 C5 48 60 42  ..')F?J.C.t..H`B
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.704 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.704 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.705 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.705 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.706 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.708 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.709 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.709 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.709 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.709 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.709 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.710 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.711 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.718 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.719 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.721 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.724 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:55:27.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 10:55:27.727 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 10:56:51.759 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:56:51.806 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:56:51.807 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:56:51.807 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 10:56:51.807 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41292/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28633ms
ok 65 stop command for single port in 30883ms
ok 66 status detects locally running solr in 14377ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2184ms
ok 69 copying files around in 6577ms
ok 70 upconfig in 2654ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m48s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5665 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5665/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38763/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 08:46:04.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 08:46:04.599; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 08:46:05.810; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 08:46:05.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22814ms
ok 61 start solr with client truststore and security manager in 25903ms
not ok 62 start solr with mTLS needed in 60191ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-6sogvu/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38763.
#
# Started Solr server on port 38763 (pid=199957). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38764.
#
# Started Solr server on port 38764 (pid=200398). Happy searching!
#
# INFO  - 2023-10-14 08:47:29.872; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 08:47:29.877; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 08:47:30.247; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 08:47:30.250; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 08:47:30.251; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:30.285 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F C7 BA 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:47:05.000 UTC",
#     "not  after"         : "2024-01-12 08:47:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 F5 98 BF 49 E6 90 94   DA 7D 9B E6 AE 90 E7 98  ....I...........
#         0010: B0 DC 70 DD                                        ..p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:30.289 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 7D 74 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:57.000 UTC",
#     "not  after"         : "2024-01-12 08:46:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:30.305 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:30.656 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:30.658 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:30.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:30.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:30.815 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:30.817 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:30.818 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.824 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.836 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:30.839 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 7C 9E 08 E2 E9 B7 8B 6D 32 3B 64 3C A3 BA AC 6E EE C8 6A 73 90 13 67 0A 04 44 BD 48 80 62 D4",
#   "session id"          : "EE 72 50 08 66 39 0D B9 2B 04 9A 7A DB 64 94 B8 1E AB E0 39 8D 05 03 0B 63 62 76 57 2A 28 A7 3E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FD B0 10 CE E5 A2 D3 63   4E 9E 01 18 1F B3 3B 9E  .......cN.....;.
#             0010: 61 5A 65 8F 3B 08 84 99   10 04 A6 E5 B3 DC 48 0F  aZe.;.........H.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.963 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "50 55 AE 65 2C 02 70 0E F0 34 38 57 21 AD 26 C1 63 3F D9 DD 9E 10 D9 3F 25 EE 0E 74 5F 4A 0C AB",
#   "session id"          : "EE 72 50 08 66 39 0D B9 2B 04 9A 7A DB 64 94 B8 1E AB E0 39 8D 05 03 0B 63 62 76 57 2A 28 A7 3E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E5 DC 55 3A B3 F5 8B 64   59 12 ED 42 0F 9C 60 E2  ..U:...dY..B..`.
#           0010: DD 29 B9 1E CB 98 4D 49   05 26 0A 93 C3 91 3D 5C  .)....MI.&....=\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.964 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.964 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.966 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.969 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.970 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.970 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:30.971 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:30.972 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.983 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.987 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.987 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.988 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.988 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.988 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:30.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:30.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.990 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.990 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.991 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.991 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.992 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.993 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:30.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.997 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 56 0C DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:47:02.000 UTC",
#       "not  after"         : "2024-01-12 08:47:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 5E 96 9D 53 1A E3 D8   66 DE 92 DA 89 52 92 0B  .^..S...f....R..
#           0010: 16 44 33 F2                                        .D3.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:30.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.083 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.087 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 67 F1 15 EB EB 5F 5F   A7 F2 8F 0C C9 F5 50 D8  ;g....__......P.
#     0010: 53 DC 8D D4 F3 A4 FD D9   72 0A CB 91 12 51 0D 83  S.......r....Q..
#     0020: 6F 23 F0 D8 DC 30 36 A5   53 FB D3 F0 96 82 02 E9  o#...06.S.......
#     0030: 95 5D EF 28 BD 93 11 CD   85 90 F5 5B 5B 37 3F 53  .].(.......[[7?S
#     0040: 54 49 56 95 10 1C 81 49   53 49 E4 4E F8 F6 7D 4A  TIV....ISI.N...J
#     0050: 5F 43 B3 57 66 5C 74 5D   32 F7 F2 23 8C 08 00 AF  _C.Wf\t]2..#....
#     0060: 4F 46 89 0B BF 3B 8C C5   32 B4 9C BA 57 55 38 0B  OF...;..2...WU8.
#     0070: 8E 12 FA B2 2E 15 13 0B   A9 48 29 E8 DF 29 26 D6  .........H)..)&.
#     0080: E3 DD 8C C2 54 E4 A9 3E   41 6C 56 B6 51 7B D4 53  ....T..>AlV.Q..S
#     0090: 24 64 D6 E6 66 07 9C FB   37 4E 7C E6 EE 7E 7E A1  $d..f...7N......
#     00A0: F0 29 4F A8 D4 63 C9 69   59 8C 43 19 0B 2E D0 CB  .)O..c.iY.C.....
#     00B0: 1C D4 4D F5 47 E1 35 72   1A 89 03 87 14 D0 F4 D2  ..M.G.5r........
#     00C0: 1B 0A 0B 07 71 1F 13 7E   43 EF 9C 92 E7 4D AA F6  ....q...C....M..
#     00D0: 86 34 6C D4 C2 61 4F A3   AC E2 6F 0E DF BD 9C 06  .4l..aO...o.....
#     00E0: 26 5E 2F FA C4 94 80 17   FC 30 DB 08 AF 07 EF 58  &^/......0.....X
#     00F0: 65 7E D4 D8 43 BB E4 52   1F 6E 71 17 9F 6C 62 15  e...C..R.nq..lb.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.089 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 50 20 4E 43 3C 80 4F   73 FB B1 8D 78 77 90 BA  .P NC<.Os...xw..
#     0010: D0 7B 7E B2 58 A8 12 CF   7E EC 44 7F E5 E1 2E 30  ....X.....D....0
#     0020: 01 A0 E6 9F 4C 85 CB 3A   53 92 6E 46 F0 A0 5B EE  ....L..:S.nF..[.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.091 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:31.092 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:31.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:31.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:31.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:31.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:31.094 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.094 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.096 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F C7 BA 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:47:05.000 UTC",
#       "not  after"         : "2024-01-12 08:47:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 F5 98 BF 49 E6 90 94   DA 7D 9B E6 AE 90 E7 98  ....I...........
#           0010: B0 DC 70 DD                                        ..p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B7 AD 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:46:59.000 UTC",
#       "not  after"         : "2024-01-12 08:46:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#           0010: 28 A1 C1 56                                        (..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.121 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C1 79 85 98 34 CA 55 61   61 23 CB 5B 29 85 D6 FC  .y..4.Uaa#.[)...
#     0010: E3 8A F3 B4 94 BC FE B0   3A 08 6A 08 76 13 2D 1C  ........:.j.v.-.
#     0020: C8 37 8A 69 00 70 14 7E   EF C7 DE A1 3D 0C 64 1E  .7.i.p......=.d.
#     0030: A6 79 58 60 A0 CB DA 07   FE D6 78 70 46 60 1C 88  .yX`......xpF`..
#     0040: 5D 74 A7 F4 AB FA 3D 71   4A 99 41 9A 68 6A 13 2C  ]t....=qJ.A.hj.,
#     0050: 2A A2 34 A0 7C E6 E3 99   66 84 20 B8 28 7A 96 50  *.4.....f. .(z.P
#     0060: 42 24 32 79 CA A7 D5 94   37 0C 07 F3 48 12 9A 1F  B$2y....7...H...
#     0070: FB 3F BA 1F EE 9B 78 93   78 A3 E0 52 BD 93 60 3B  .?....x.x..R..`;
#     0080: 6F 79 3D E1 C6 51 2A E5   50 AD 71 93 CC FE 27 03  oy=..Q*.P.q...'.
#     0090: 16 E0 F0 66 BE 68 0C AB   DC 7C CD 61 7D 5A 9B 93  ...f.h.....a.Z..
#     00A0: 9E 44 EE D3 C3 47 56 B6   AA 14 20 28 5E B7 D1 8F  .D...GV... (^...
#     00B0: B1 65 81 13 44 F0 BF 12   F6 B8 CC 3A 1E 39 60 FB  .e..D......:.9`.
#     00C0: 1A AD 00 13 7E E9 B0 F1   5A C3 19 3D 4E DF 0E 23  ........Z..=N..#
#     00D0: 49 71 ED 5D D5 E1 1D 60   C3 04 9D A1 9D 1F 55 AE  Iq.]...`......U.
#     00E0: 05 C4 BA 5D 0F 24 51 43   C1 9D 68 83 59 A1 26 D0  ...].$QC..h.Y.&.
#     00F0: 98 BE 11 A0 03 97 59 79   EE BB 90 32 D9 8E 85 95  ......Yy...2....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.122 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E4 C4 72 A7 B8 43 4B 5F   54 3C 79 29 7A BC A5 32  ..r..CK_T<y)z..2
#     0010: 8A 77 F3 F8 CE 9F 62 81   26 CF 29 0A 3B 7E 13 24  .w....b.&.).;..$
#     0020: 4D 6C 01 4A 8E E3 BC 43   7E 46 EF 85 6B C2 18 6A  Ml.J...C.F..k..j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.123 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:31.185 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B7 F8 17 57 4F 36 6F 6C 6B AA E6 48 86 3C 19 0E 46 F9 91 5D 0C 80 DC A3 CB 4F 07 53 E9 59 2B 4D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 08:47:31.484 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 08:47:31.485 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 08:47:32.444; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 08:47:32.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 08:47:32.822; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 08:47:32.825; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 08:47:32.825; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-6sogvu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:32.897 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F C7 BA 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:47:05.000 UTC",
#     "not  after"         : "2024-01-12 08:47:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 F5 98 BF 49 E6 90 94   DA 7D 9B E6 AE 90 E7 98  ....I...........
#         0010: B0 DC 70 DD                                        ..p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:32.902 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 7D 74 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:57.000 UTC",
#     "not  after"         : "2024-01-12 08:46:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:32.915 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:33.114 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.114 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:33.116 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:33.116 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.122 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.133 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.133 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.134 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:33.136 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 5D DC EE 2D B2 2B 77 05 67 1E E8 67 37 70 F0 BC 32 79 35 D9 45 E1 60 41 34 7A D4 78 11 5E 07",
#   "session id"          : "23 63 3F 8F C4 CD A3 0B B1 1F CE 89 A8 FF 88 8E 96 CB 27 55 10 5E 91 04 BF 75 47 96 31 7A 09 83",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E5 6E 29 8B 47 F7 2F C9   54 22 1D 03 04 92 5B 02  .n).G./.T"....[.
#             0010: C9 32 A3 74 53 5A 45 0C   65 93 B0 BC DE C8 41 1F  .2.tSZE.e.....A.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.231 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D4 9A 24 07 A1 63 05 10 96 6F 7E 4F 3B 41 1A EE 80 D3 86 84 96 DE 1F 4C F5 81 97 21 20 5E 41 97",
#   "session id"          : "23 63 3F 8F C4 CD A3 0B B1 1F CE 89 A8 FF 88 8E 96 CB 27 55 10 5E 91 04 BF 75 47 96 31 7A 09 83",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 82 80 31 2F EB 7C 8E D2   42 F9 7F 02 C9 BB 6A EE  ..1/....B.....j.
#           0010: BA 0E 5A AC B1 A9 C7 5F   BB F0 3E 44 89 6D 24 22  ..Z...._..>D.m$"
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.232 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.232 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.234 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.236 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.237 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.237 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.237 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.238 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.248 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.249 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.252 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.253 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.255 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.255 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.256 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.256 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.257 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.257 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.257 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.260 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 56 0C DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:47:02.000 UTC",
#       "not  after"         : "2024-01-12 08:47:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 5E 96 9D 53 1A E3 D8   66 DE 92 DA 89 52 92 0B  .^..S...f....R..
#           0010: 16 44 33 F2                                        .D3.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:33.306 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:33.308 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:33.308 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:33.308 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.342 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B7 AD 27",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 08:46:59.000 UTC",
#     "not  after"         : "2024-01-12 08:46:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#         0010: 28 A1 C1 56                                        (..V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#         0010: 06 C8 0E 0B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.346 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 92 98 24 17 EE 61 9D 29   F5 92 BE D5 96 45 67 59  ..$..a.).....EgY
#     0010: E1 4D 76 82 D3 99 E1 34   71 A3 C7 1D 64 79 6C 8A  .Mv....4q...dyl.
#     0020: C0 AE 1C C6 90 05 D7 B2   0B 56 00 41 B3 F5 2A 90  .........V.A..*.
#     0030: F3 A9 55 7C E5 82 40 DC   1F 3D A0 0F ED 16 7A F9  ..U...@..=....z.
#     0040: 1A B5 BF C6 CD EE 1F 43   41 FA 92 E9 DB 8C 09 22  .......CA......"
#     0050: 8E 6C 83 5C 55 49 D2 7C   22 54 9D 78 62 10 4B C7  .l.\UI.."T.xb.K.
#     0060: 3B 5F 4E F5 FE C5 CE 98   BA E7 F7 49 D4 3F 68 51  ;_N........I.?hQ
#     0070: 45 1C E5 01 40 85 9A 91   38 80 F9 BF E0 E7 87 A6  E...@...8.......
#     0080: CA 4B 21 9A BD 68 DD 2E   16 BD E9 2B 5F 1D A6 40  .K!..h.....+_..@
#     0090: 75 EB FC CD 4D F9 0A 16   84 05 88 69 F1 91 0D D1  u...M......i....
#     00A0: 7E B0 15 3C 67 98 BC B5   AC 9C CC 56 D4 AE D9 28  ...<g......V...(
#     00B0: 26 FF 02 F9 ED CD F9 90   23 A3 C2 4B EF 5F 40 A3  &.......#..K._@.
#     00C0: E8 88 0C 32 47 D1 F2 A5   78 C3 3C AE 78 00 34 55  ...2G...x.<.x.4U
#     00D0: 2B FB 78 B3 BD 0D 41 45   B0 E3 B1 43 73 6A 65 CD  +.x...AE...Csje.
#     00E0: 09 52 9B 76 88 09 8D F0   32 8F CE 81 85 D1 47 0D  .R.v....2.....G.
#     00F0: 34 F5 2B 3D 23 EB 00 97   FA 33 FE A9 85 49 07 6C  4.+=#....3...I.l
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.348 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B6 39 D6 81 23 F8 29 90   B5 20 F6 AD 58 74 69 38  .9..#.).. ..Xti8
#     0010: D3 EE 00 F4 E0 5C C2 17   8F 7B D3 3C 14 5F 24 1B  .....\.....<._$.
#     0020: 88 6E FD B2 59 8B 86 44   0B FD 58 7D 31 EF 51 77  .n..Y..D..X.1.Qw
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.350 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:33.351 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:33.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 08:47:33.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:33.353 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.353 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.356 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F C7 BA 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:47:05.000 UTC",
#       "not  after"         : "2024-01-12 08:47:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 F5 98 BF 49 E6 90 94   DA 7D 9B E6 AE 90 E7 98  ....I...........
#           0010: B0 DC 70 DD                                        ..p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B7 AD 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:46:59.000 UTC",
#       "not  after"         : "2024-01-12 08:46:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#           0010: 28 A1 C1 56                                        (..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.381 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E F5 B7 7D F2 02 E1 58   38 C4 C0 BF 7A 06 03 E5  .......X8...z...
#     0010: D8 01 69 BD F6 1F A1 95   9F D3 AC A6 77 63 A9 71  ..i.........wc.q
#     0020: A7 9A 73 4C C1 E8 D3 8E   35 77 F2 5C E8 8C EE 64  ..sL....5w.\...d
#     0030: E4 BD 8A E2 77 6B 1F E3   C5 0D 17 6F 6F AC 05 ED  ....wk.....oo...
#     0040: 62 60 B8 44 8F 20 4E 6E   51 A4 D3 E6 22 6D E5 2D  b`.D. NnQ..."m.-
#     0050: D2 C6 8D 8D 5A 87 0B C1   AD 6F D7 8E A6 A7 CC 6A  ....Z....o.....j
#     0060: 81 0C A7 9D 7B 3D 19 B1   BA E6 C5 FA 63 8B 8A DC  .....=......c...
#     0070: A1 0F 0B EC A7 B4 90 C0   43 48 1F 90 A0 48 90 F0  ........CH...H..
#     0080: A5 A5 98 3E 44 BD 9D C4   5F 13 EA 27 7C 09 95 1F  ...>D..._..'....
#     0090: 24 E3 A5 2A F6 83 5C 5A   AE 8A E3 25 96 92 15 93  $..*..\Z...%....
#     00A0: 52 A1 E2 B1 2E 4C 51 CC   D5 EB 09 B8 48 C5 9B 0C  R....LQ.....H...
#     00B0: A6 A0 6E 42 11 6C 6F 6A   E6 F1 B5 5D B1 B0 A0 13  ..nB.loj...]....
#     00C0: E6 F0 F5 F3 EA 81 C7 EF   5C 7F AE A3 8E 49 5F F8  ........\....I_.
#     00D0: 8E 8F BF 6D 0B 5A EC 09   55 AF E9 5C 36 DB 7C 6B  ...m.Z..U..\6..k
#     00E0: AC 11 B3 DC FA 4E 2E E9   37 A0 79 54 9D F9 B3 57  .....N..7.yT...W
#     00F0: 46 76 F8 9E 08 3A CD F5   2F 73 16 5A 63 DF AA F4  Fv...:../s.Zc...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.382 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 DB C6 05 C3 76 8C D7   FD 7F 58 53 D4 7B 39 51  .....v....XS..9Q
#     0010: B2 0F 82 D7 A7 22 62 52   53 5A 7B 3F 01 B8 2F 69  ....."bRSZ.?../i
#     0020: 51 9A B5 92 33 0B 1F D0   E5 FF 29 6C 0A 49 66 10  Q...3.....)l.If.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.383 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:33.439 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E9 40 AB B8 B7 9F 78 FE 4E 47 CA E6 BB DE 3F 36 8C 89 FE BC BD BB 08 9A 8A 92 08 6B E4 B4 77 0D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 08:47:33.709 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 08:47:33.709 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 08:47:45.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:45.710 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 7D 74 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:46:57.000 UTC",
#       "not  after"         : "2024-01-12 08:46:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#           0010: 28 A1 C1 56                                        (..V
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B7 AD 27",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 08:46:59.000 UTC",
#       "not  after"         : "2024-01-12 08:46:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 08 01 A1 37 F3 AA B7   7B 0C CA 5A 14 3C AE 69  K...7......Z.<.i
#           0010: 28 A1 C1 56                                        (..V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 FC 3D 28 F0 A5 11 79   86 7E A1 AE 90 1F 51 11  ..=(...y......Q.
#           0010: 06 C8 0E 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 08:47:45.726 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:46.060 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:46.060 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:46.060 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:47:46.061 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:46.221 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.221 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:46.223 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 08:47:46.224 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.231 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.244 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 08:47:46.247 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "1D CF 84 BA 4D 2F 77 32 2B 06 21 7B B6 C9 B8 CF 02 38 35 B2 C7 BA ED A1 AD 64 40 26 5C 05 88 B5",
#     "session id"          : "AE 83 AB E1 C9 B1 6B F7 73 24 F0 F0 A7 FF DF 1A 40 01 76 17 63 33 72 C9 E1 BC 5A 5F EE 6F D9 FF",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 81 22 09 16 33 4A 27 B0   83 C3 31 60 AB F5 0D 44  ."..3J'...1`...D
#               0010: 25 FA 9B AB 2F 54 43 E1   3C 87 08 C1 A7 2C 59 04  %.../TC.<....,Y.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.273 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "2F C6 9C A5 79 62 74 1E 7A D7 D5 86 4F E9 D7 2D 35 D0 AD D0 1D 02 34 32 10 5E C3 43 4E F6 15 2D",
#     "session id"          : "AE 83 AB E1 C9 B1 6B F7 73 24 F0 F0 A7 FF DF 1A 40 01 76 17 63 33 72 C9 E1 BC 5A 5F EE 6F D9 FF",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 58 6E AF FC 1C 41 93 26   00 2F BE 9B A8 68 D1 C2  Xn...A.&./...h..
#             0010: 46 E3 64 23 F1 71 82 92   7D 3E 27 0A A1 36 14 05  F.d#.q...>'..6..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.273 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.273 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.274 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.274 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.276 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.278 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:46.280 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:46.280 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.288 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.289 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.290 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.294 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.294 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.294 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.294 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.295 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:46.295 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:47:46.295 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 08:47:46.296 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

tedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 08:49:08.403 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:49:08.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:49:08.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:49:08.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 08:49:08.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38764/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28433ms
ok 65 stop command for single port in 31456ms
ok 66 status detects locally running solr in 14655ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2195ms
ok 69 copying files around in 6587ms
ok 70 upconfig in 2666ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 32s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m1s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5664 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5664/

All tests passed

Build Log:
[...truncated 1314 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33297/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 04:37:30.255; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 04:37:30.260; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 04:37:31.193; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 04:37:31.233; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23088ms
ok 61 start solr with client truststore and security manager in 25492ms
not ok 62 start solr with mTLS needed in 56588ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-X8vlWi/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33297.
#
# Started Solr server on port 33297 (pid=199316). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33298.
#
# Started Solr server on port 33298 (pid=199744). Happy searching!
#
# INFO  - 2023-10-14 04:38:54.521; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 04:38:54.527; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 04:38:54.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 04:38:54.886; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 04:38:54.887; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:54.918 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 5C C2 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:30.000 UTC",
#     "not  after"         : "2024-01-12 04:38:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 7C 96 4C E6 9C F7   11 22 00 9D B7 DD C9 94  ....L...."......
#         0010: 32 89 C4 93                                        2...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:54.922 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 39 4D EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:22.000 UTC",
#     "not  after"         : "2024-01-12 04:38:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:54.936 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:55.004 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:55.004 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:55.004 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:55.004 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:55.163 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:55.164 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:55.165 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.181 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.181 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.182 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:55.184 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "57 D0 DF A1 03 D7 95 C3 39 4A 9A 9F 55 67 5D DA 3E AB 17 CA F3 2C DD 93 B1 D4 5F 7C CE FB 67 4B",
#   "session id"          : "38 56 BF 02 AE 23 94 A8 C3 A1 F5 E9 40 75 35 03 5B D6 FD A6 76 BA C1 61 93 78 95 8C D8 70 21 0B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 06 79 B5 48 5F 8D 0F 39   01 C7 65 19 61 37 F4 67  .y.H_..9..e.a7.g
#             0010: B5 C7 E2 3E 0D 16 07 F1   29 D9 1B CB 46 74 BF 0F  ...>....)...Ft..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.312 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "94 C4 20 25 E7 E6 18 BE 30 BB 71 8B D8 72 D7 5B 9A E2 BE 22 D3 B8 68 39 19 A0 D4 23 87 A5 0D 24",
#   "session id"          : "38 56 BF 02 AE 23 94 A8 C3 A1 F5 E9 40 75 35 03 5B D6 FD A6 76 BA C1 61 93 78 95 8C D8 70 21 0B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 07 59 BF AA 9B CB 60 74   18 B8 31 D2 10 ED 5C 3C  .Y....`t..1...\<
#           0010: FB E7 27 E1 BF 5F FE 06   6A 6F FE F0 EA D2 BB 0E  ..'.._..jo......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.312 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.313 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.315 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.317 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.317 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.318 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.319 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.326 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.328 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.329 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.333 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.333 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.334 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.335 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.336 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.336 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.337 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.337 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.338 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.338 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.341 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 6B CB 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:26.000 UTC",
#       "not  after"         : "2024-01-12 04:38:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 50 47 4D 6B 3D 5F 3D   F8 34 D8 18 EA 36 C8 A7  .PGMk=_=.4...6..
#           0010: 4F 38 A3 FF                                        O8..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.341 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.428 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.432 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 84 96 F8 33 65 21 67 60   17 E9 CD 20 54 B9 1E 51  ...3e!g`... T..Q
#     0010: 47 17 04 D4 13 D0 75 D3   04 E2 8B D4 59 7A 8D F3  G.....u.....Yz..
#     0020: E7 E5 47 B5 B3 00 D5 15   6B 3A 0A 65 92 15 07 63  ..G.....k:.e...c
#     0030: 38 BF 8E 56 5F C9 21 D2   1A 63 CF 89 E4 6A 12 5F  8..V_.!..c...j._
#     0040: B4 D7 D3 D7 94 9D 35 49   5B 47 06 0E 20 D9 ED 9F  ......5I[G.. ...
#     0050: AD 0F AC 8A 01 B8 8C A0   EF FB BE 65 19 3D 9F 23  ...........e.=.#
#     0060: 9C F8 B6 A1 12 70 E8 76   FB B8 16 99 FD CC E7 56  .....p.v.......V
#     0070: 77 9F 64 98 AC F4 7F F0   B2 3C DD E1 06 4F 8E 38  w.d......<...O.8
#     0080: 4D 32 37 DE B7 59 6C 33   C8 5C BB 83 38 CB 9D DD  M27..Yl3.\..8...
#     0090: D4 74 C5 07 06 1D EB E6   30 BD DC 70 55 52 D6 10  .t......0..pUR..
#     00A0: A1 D3 14 2C 88 C3 69 29   39 B5 20 FC D4 40 93 27  ...,..i)9. ..@.'
#     00B0: 8B A9 06 0D F3 A1 2F 18   D6 56 DB E7 4E AD EB CC  ....../..V..N...
#     00C0: EF 62 83 DB 4A 1D 75 3E   45 39 9B AB 7B 59 74 4B  .b..J.u>E9...YtK
#     00D0: EA 2B 80 0C BE 07 AB E0   78 22 14 CB CA DC 7F 9F  .+......x"......
#     00E0: 56 75 D9 FF 71 0A 38 E9   B4 D9 A4 40 F3 6B 36 8F  Vu..q.8....@.k6.
#     00F0: 97 DA 15 C5 5C 17 AB 35   F5 B5 95 24 07 17 52 1B  ....\..5...$..R.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.433 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E AD 37 E5 8B E6 52 46   DF 6B C5 EA 54 77 E9 A9  ..7...RF.k..Tw..
#     0010: 74 66 08 60 F6 DE 79 EE   F8 38 6C 58 AE 02 BA 5D  tf.`..y..8lX...]
#     0020: 90 7F 0B 0A BE 80 E7 45   F7 3F 09 67 79 66 86 65  .......E.?.gyf.e
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.436 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:55.437 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.437 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:55.437 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.437 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:55.437 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:55.438 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.438 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.440 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 5C C2 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:30.000 UTC",
#       "not  after"         : "2024-01-12 04:38:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 B2 7C 96 4C E6 9C F7   11 22 00 9D B7 DD C9 94  ....L...."......
#           0010: 32 89 C4 93                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 22 24 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:24.000 UTC",
#       "not  after"         : "2024-01-12 04:38:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#           0010: 44 4A 15 05                                        DJ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.467 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 07 42 42 22 79 83 59   94 26 37 F9 28 22 94 94  7.BB"y.Y.&7.("..
#     0010: 47 A7 DC AD D2 2B 1A 9F   15 6C 06 D0 02 63 46 0D  G....+...l...cF.
#     0020: 10 52 69 37 D1 13 3F 3C   4F CA 34 E7 62 FC 97 60  .Ri7..?<O.4.b..`
#     0030: 9F 8F 0A 90 A9 12 C2 C7   5D 11 2E 52 3B 56 E0 EC  ........]..R;V..
#     0040: 3B 51 C1 96 14 0C 55 94   53 DF CF 17 81 4A FE 7D  ;Q....U.S....J..
#     0050: 49 63 32 3C 4E D1 A1 53   0A DC 28 00 84 F0 AB F4  Ic2<N..S..(.....
#     0060: DA C1 1A 51 11 B8 68 AC   CF 1A E9 EE 0E E1 6F D6  ...Q..h.......o.
#     0070: 63 41 92 D5 C9 27 ED AB   5A A4 AD 78 C5 C7 58 3A  cA...'..Z..x..X:
#     0080: 82 F2 49 A4 0B AB 6D 8B   B2 AF A2 17 22 2C 55 13  ..I...m.....",U.
#     0090: D0 B5 F5 F2 41 A8 9E 6E   C6 1A 04 3A 04 12 27 AB  ....A..n...:..'.
#     00A0: 2D A9 E9 E0 3B BC 25 29   DB 73 E2 B6 1D 9A BE DD  -...;.%).s......
#     00B0: EA D7 E5 DC B6 6D A6 0D   DD 73 C8 57 D7 E2 D5 32  .....m...s.W...2
#     00C0: 8A D3 FA 3F 48 6D 9D 68   99 3C DE 86 C0 1F C9 C4  ...?Hm.h.<......
#     00D0: 62 1E F2 06 4F 72 FF D6   A8 DB 3D 27 3F D6 CB D1  b...Or....='?...
#     00E0: EA 0E E0 20 34 A7 FA B1   51 7D FC 2B 48 8E B6 68  ... 4...Q..+H..h
#     00F0: EF B7 FF 81 4C DE 00 57   62 8A F9 7F 4B A1 AB 8C  ....L..Wb...K...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.468 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6A 37 AE 4E A4 10 48 17   35 03 18 3D 64 01 52 90  j7.N..H.5..=d.R.
#     0010: D2 2F AC 61 B0 F2 5D 9F   57 00 D7 F7 C3 46 B5 4A  ./.a..].W....F.J
#     0020: B6 27 43 16 67 BC 87 04   A2 5D 52 DC 82 4F 5D 21  .'C.g....]R..O]!
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.469 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:55.524 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 4F FD 19 7B 49 68 4E B8 39 06 0E EB CD 4C 6E AD 69 A9 2E B5 AD E7 9B 00 11 7E 58 81 54 AE 18",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 04:38:55.813 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 04:38:55.815 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 04:38:56.762; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 04:38:56.768; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 04:38:57.160; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 04:38:57.163; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 04:38:57.164; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-X8vlWi/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:57.198 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 5C C2 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:30.000 UTC",
#     "not  after"         : "2024-01-12 04:38:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 B2 7C 96 4C E6 9C F7   11 22 00 9D B7 DD C9 94  ....L...."......
#         0010: 32 89 C4 93                                        2...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:57.203 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 39 4D EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:22.000 UTC",
#     "not  after"         : "2024-01-12 04:38:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 04:38:57.219 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:57.540 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:57.541 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:57.542 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:38:57.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:57.711 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.712 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:57.714 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:38:57.714 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.721 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.734 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.734 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.734 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:38:57.737 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8D E4 8F 8D 43 AD 51 BA D7 B1 4E 88 1C 7C 4C 61 85 38 E4 B8 29 C0 02 AB 19 C0 4D 19 B0 1A A1 1D",
#   "session id"          : "95 DE 03 BF 45 D7 F6 30 45 D1 68 B7 C6 72 78 CB 16 E5 E6 91 74 50 2C 5B A3 29 D5 C9 7F E8 77 4F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EF 88 2E 4D BC C6 CE 1C   ED 2E 8C C1 57 CD 4A 9A  ...M........W.J.
#             0010: 45 D6 95 C4 DA 6D 47 80   EC 61 5D 99 60 1C C2 4A  E....mG..a].`..J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.848 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AF 89 E2 C2 CA 9A 31 EA 5B 3E C9 70 51 67 77 51 56 F7 4F 61 00 09 C7 09 CE 25 B2 E1 1F 16 DF 9D",
#   "session id"          : "95 DE 03 BF 45 D7 F6 30 45 D1 68 B7 C6 72 78 CB 16 E5 E6 91 74 50 2C 5B A3 29 D5 C9 7F E8 77 4F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B5 D7 7D 4A 79 09 3D 52   E0 7E C1 F9 BA A1 7C 0E  ...Jy.=R........
#           0010: F6 D7 FE B9 BB 5D 34 8A   EE 15 9B 5B A9 7F 0F 34  .....]4....[...4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.849 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.849 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.852 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.852 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.852 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.855 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.855 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.856 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:57.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:57.858 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.858 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.858 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.866 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.868 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.869 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.873 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.873 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.873 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.874 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.874 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.874 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.874 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:57.874 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:57.875 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.876 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.877 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.877 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.877 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.879 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.880 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:57.880 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.884 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 6B CB 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:26.000 UTC",
#       "not  after"         : "2024-01-12 04:38:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 50 47 4D 6B 3D 5F 3D   F8 34 D8 18 EA 36 C8 A7  .PGMk=_=.4...6..
#           0010: 4F 38 A3 FF                                        O8..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.884 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:57.998 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 22 24 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 04:38:24.000 UTC",
#     "not  after"         : "2024-01-12 04:38:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#         0010: 44 4A 15 05                                        DJ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#         0010: 28 46 19 5E                                        (F.^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.001 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E BE EF 11 FE CB E9 9F   32 C6 AA 72 73 E9 30 CF  ........2..rs.0.
#     0010: 5D 39 A9 D8 4A BE 4F D1   34 5D 6C 4F A2 4F 47 55  ]9..J.O.4]lO.OGU
#     0020: A1 D6 4D 7F 27 F1 62 CA   19 C1 BF 68 3D 1E 75 B9  ..M.'.b....h=.u.
#     0030: FA 13 A5 6E 18 15 4A 2D   17 02 CB BC 96 2C 13 18  ...n..J-.....,..
#     0040: A1 79 42 34 2F 71 26 72   A4 F5 EF F8 4B AB DD 49  .yB4/q&r....K..I
#     0050: 0F 47 4A EB 61 01 A5 2C   9B 3B 7A BA 5C 5C 17 C6  .GJ.a..,.;z.\\..
#     0060: C3 39 69 90 C4 38 6D 1F   34 F2 20 47 85 3B D4 9F  .9i..8m.4. G.;..
#     0070: 30 84 59 8C 9E 52 69 E7   82 55 13 DF 13 CC 14 67  0.Y..Ri..U.....g
#     0080: 0A 4F 2B 2F 37 EE 8B BD   67 42 08 44 90 F4 EC FB  .O+/7...gB.D....
#     0090: 9D FC 06 A3 25 20 08 77   62 8F 0D 0E 78 6F FC C3  ....% .wb...xo..
#     00A0: 1E 07 CD 1E 7B 6A 85 27   98 97 5D DF CF E2 03 E2  .....j.'..].....
#     00B0: 0B 85 41 B1 9C B9 84 78   4F C9 AA 38 D4 6A 04 C6  ..A....xO..8.j..
#     00C0: 31 34 9D C7 D7 DA 8F 17   20 A3 37 EB C3 68 94 54  14...... .7..h.T
#     00D0: B0 1F 8E FC C3 0C 7E 83   86 E9 D8 54 DC D7 79 71  ...........T..yq
#     00E0: 6B D5 81 19 63 F0 BA 41   BF 42 4D 09 46 BF 93 44  k...c..A.BM.F..D
#     00F0: 18 82 EA CD D0 67 3D 4A   A9 23 17 2F CB 68 1B 90  .....g=J.#./.h..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.003 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 09 A2 9D BF 98 C7 43 66   A7 0B 63 F9 D2 B4 3B 5F  ......Cf..c...;_
#     0010: F5 58 BC 09 AA BD 47 52   D8 1A D3 A6 EE 7B DA FB  .X....GR........
#     0020: 78 8E E4 CE E5 48 70 F0   3D 48 17 5D 44 86 46 D6  x....Hp.=H.]D.F.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.005 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:58.006 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:58.007 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:58.007 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:58.007 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 04:38:58.007 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:38:58.008 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.008 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.011 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 5C C2 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:30.000 UTC",
#       "not  after"         : "2024-01-12 04:38:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 B2 7C 96 4C E6 9C F7   11 22 00 9D B7 DD C9 94  ....L...."......
#           0010: 32 89 C4 93                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 22 24 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:24.000 UTC",
#       "not  after"         : "2024-01-12 04:38:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#           0010: 44 4A 15 05                                        DJ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.037 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 F8 D8 F7 65 C7 A0 30   DA E1 B0 3D EE B0 5F 10  X...e..0...=.._.
#     0010: 8F C3 91 B8 A2 8E 27 B3   FB D0 24 30 FE BA 7C 26  ......'...$0...&
#     0020: B7 DD 7D F7 B2 04 54 22   DA A0 31 17 45 40 53 DC  ......T"..1.E@S.
#     0030: 0F A5 A6 05 2F 40 A9 52   07 C4 8C A1 F6 75 55 23  ..../@.R.....uU#
#     0040: 88 AB ED 98 09 56 EC 48   10 56 F6 02 1F A4 25 96  .....V.H.V....%.
#     0050: 7D 27 88 F7 EF 44 43 F4   80 1E C1 A0 17 1B 58 08  .'...DC.......X.
#     0060: D0 CF FB B8 76 88 A7 85   7F 58 B3 CF 4E 24 7C 9C  ....v....X..N$..
#     0070: 90 BD BC CC 07 FB D6 C4   3E 94 CA 82 4B AE 67 60  ........>...K.g`
#     0080: D6 FB 2A 63 C1 EC 80 A5   2F 33 A9 52 08 5A 8E DA  ..*c..../3.R.Z..
#     0090: F1 B0 C2 DC 18 8B 0F 4E   E2 40 F9 9E 96 CC C1 6C  .......N.@.....l
#     00A0: EA FE D9 A8 29 30 62 99   CB 37 88 96 47 B2 77 E9  ....)0b..7..G.w.
#     00B0: 40 9E 90 39 FB 2D DE C7   6D 94 56 41 BF 50 09 8C  @..9.-..m.VA.P..
#     00C0: 18 17 B2 D3 A2 7B 36 D2   95 4A EB 0F C8 71 ED 6D  ......6..J...q.m
#     00D0: CA EC 08 77 61 D1 3A A2   C7 C3 6D CB DA FA 60 D2  ...wa.:...m...`.
#     00E0: D1 B6 94 1E B2 DB 16 5D   61 73 9E 19 DD 47 BA 19  .......]as...G..
#     00F0: 21 AD 15 27 AA 32 6D BE   62 BD 9C 1F E9 62 EE 55  !..'.2m.b....b.U
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.039 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 07 60 27 88 AD 1D 1A 66   34 0A D8 BF 68 24 AA 8A  .`'....f4...h$..
#     0010: E1 CF 05 6C 28 9A 41 92   92 27 80 85 DE F8 30 C2  ...l(.A..'....0.
#     0020: BD C4 CA F9 77 02 AE 8B   85 1F 31 73 3D BE E7 74  ....w.....1s=..t
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.040 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:38:58.107 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AF CD 99 52 10 E2 E4 3B BB 12 A9 B4 FE 3A 5F 28 1F 9F 09 89 47 0E 29 CF 7D 99 76 FF 65 32 83 37",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 04:38:58.393 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 04:38:58.394 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 04:39:09.327; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 04:39:09.646 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 39 4D EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:22.000 UTC",
#       "not  after"         : "2024-01-12 04:38:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#           0010: 44 4A 15 05                                        DJ..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 22 24 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 04:38:24.000 UTC",
#       "not  after"         : "2024-01-12 04:38:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 4B 08 F5 00 AA DC B4   C6 0B 31 40 68 C1 81 3E  .K........1@h..>
#           0010: 44 4A 15 05                                        DJ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 67 47 B3 58 6D F6 97   90 7C C3 1F E2 D3 5F 1C  4gG.Xm........_.
#           0010: 28 46 19 5E                                        (F.^
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 04:39:09.662 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:39:09.762 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:39:09.762 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:39:09.762 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:39:09.762 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:39:09.905 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:39:09.907 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 04:39:09.907 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.924 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.924 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.925 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 04:39:09.927 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6C 9F 0D 23 F8 9D E3 CB B1 A8 9C E4 88 E4 8B CB 7F 2C 45 15 76 17 99 45 B1 8B D5 5E 78 8A 86 04",
#     "session id"          : "2F CE 48 82 FD 6C 4D E3 AA 19 F5 3E 9C E4 C0 72 24 8E 5D 34 CB 45 84 29 93 20 CE 64 10 C0 55 7B",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C3 C9 4C 03 B4 EA 28 91   29 7A 24 A5 59 4A 1E 18  ..L...(.)z$.YJ..
#               0010: 66 D9 15 4F 23 7F 41 CE   86 D7 95 C1 53 77 F6 75  f..O#.A.....Sw.u
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.947 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C7 96 A2 60 C3 ED C9 8A 05 41 97 98 CC D4 7B 96 9C 5F AE 48 C9 78 5C EB F1 59 96 11 C7 FC 06 33",
#     "session id"          : "2F CE 48 82 FD 6C 4D E3 AA 19 F5 3E 9C E4 C0 72 24 8E 5D 34 CB 45 84 29 93 20 CE 64 10 C0 55 7B",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 3F DB 65 14 A1 85 6B   F2 04 D2 10 D6 FF 19 EE  .?.e...k........
#             0010: B9 C3 33 57 A8 99 C5 1B   4E AB DF 3D 7A 56 18 7F  ..3W....N..=zV..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.948 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.948 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.950 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.952 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.953 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.961 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.963 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.964 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:39:09.969 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:39:09.969 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 04:39:09.970 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 04:40:29.902 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:40:29.973 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:40:29.973 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:40:29.973 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 04:40:29.973 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33298/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28462ms
ok 65 stop command for single port in 30901ms
ok 66 status detects locally running solr in 14703ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2202ms
ok 69 copying files around in 6678ms
ok 70 upconfig in 2662ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 49s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m17.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5663 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5663/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([FB64433C5F7C1800:CE90A867B4A02E5E]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5544 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40775/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-14 01:19:32.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 01:19:32.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-14 01:19:32.997; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 01:19:33.036; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23892ms
ok 61 start solr with client truststore and security manager in 26622ms
not ok 62 start solr with mTLS needed in 61036ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-9hK5rz/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40775.
#
# Started Solr server on port 40775 (pid=200502). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40776.
#
# Started Solr server on port 40776 (pid=200956). Happy searching!
#
# INFO  - 2023-10-14 01:21:00.240; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 01:21:00.246; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 01:21:00.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 01:21:00.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 01:21:00.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:00.715 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 EB 19 A7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:35.000 UTC",
#     "not  after"         : "2024-01-12 01:20:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 71 0C 0C C5 7E 5F 09   C1 88 C1 9B 3B 74 CE 23  .q...._.....;t.#
#         0010: 8A 08 6A E3                                        ..j.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:00.720 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 78 3D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:26.000 UTC",
#     "not  after"         : "2024-01-12 01:20:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:00.736 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:01.007 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:01.008 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:01.009 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:01.009 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:01.194 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.195 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:01.196 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:01.197 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.203 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.218 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.218 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.218 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:01.222 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "80 DA 31 BC 79 FC E6 AF C9 EA BC 46 A0 56 75 47 76 38 0D 9E 7B 56 B4 84 ED 0D 37 A8 74 5A 2F 1C",
#   "session id"          : "90 C8 0E A8 A0 CA 4A 75 F6 72 0D 00 87 4B 80 65 05 D6 D3 6D ED 4F 68 AA 3E C6 43 44 C5 DD 37 B3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B9 87 37 A9 41 3A C1 2D   9A 63 01 EC 3C 4C B9 62  ..7.A:.-.c..<L.b
#             0010: A2 34 F2 CA B9 D7 CC A6   51 6A E9 C4 63 0C 30 18  .4......Qj..c.0.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.345 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E4 9E 43 E1 C2 F6 F5 22 A0 61 8A C7 4D 45 23 58 37 BB 84 58 2F 86 91 9F 3F 86 52 CC C9 23 42 D2",
#   "session id"          : "90 C8 0E A8 A0 CA 4A 75 F6 72 0D 00 87 4B 80 65 05 D6 D3 6D ED 4F 68 AA 3E C6 43 44 C5 DD 37 B3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9D 2E B1 9C EC BA 22 39   F3 B5 5C 5F AF C1 32 97  ......"9..\_..2.
#           0010: 35 3F 2F 71 34 7C B4 03   59 D1 D1 48 A7 DF 16 0E  5?/q4...Y..H....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.346 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.346 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.348 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.351 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.351 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.362 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.364 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.365 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.375 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.375 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.375 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.375 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.376 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.376 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.376 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.378 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.378 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.378 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.379 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.380 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.381 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.381 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.385 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C E0 0A 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:31.000 UTC",
#       "not  after"         : "2024-01-12 01:20:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 56 04 EB 61 E8 C5 3E   91 A4 EA 9F 93 D1 33 A7  .V..a..>......3.
#           0010: 99 0A 9B A5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.480 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.488 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 C3 C1 66 A2 9C 4B B2   EF DF 75 3E 95 08 48 93  )..f..K...u>..H.
#     0010: 2D 19 ED 5D F6 DD 00 CD   F5 EA 57 8E C4 FD 91 75  -..]......W....u
#     0020: 9B 46 DB FF 69 CA 1B 81   E7 EC 11 C5 0A 02 B4 AD  .F..i...........
#     0030: AA 2A 97 18 76 F6 FA 4A   D3 4F 03 9E 10 1F A6 F2  .*..v..J.O......
#     0040: 85 03 50 FE 3E 4F 7A 53   E2 82 FA 3D 3E 29 3F 92  ..P.>OzS...=>)?.
#     0050: 6B 26 99 48 BF EA AF E2   97 EC 84 33 C9 93 D3 B0  k&.H.......3....
#     0060: B0 E6 20 C2 86 08 B9 62   64 B5 D1 C7 99 89 60 8A  .. ....bd.....`.
#     0070: A6 CF 8A 8A 77 DE DF D3   34 67 37 4B BA 99 94 42  ....w...4g7K...B
#     0080: F4 2B 05 51 BA 61 FB 43   4C BB D3 60 88 92 89 37  .+.Q.a.CL..`...7
#     0090: 36 56 88 90 1D 43 67 DF   E6 8A 26 4B 9A BC 7F B3  6V...Cg...&K....
#     00A0: 9C 8F 2C C8 07 63 E1 BF   51 CC 50 ED B0 3C EA 46  ..,..c..Q.P..<.F
#     00B0: 14 9F 40 42 73 82 6D 26   CB 3A 45 15 1E 73 81 B6  ..@Bs.m&.:E..s..
#     00C0: 7A 23 3B 3F 09 7C B0 93   BA FE 59 FD A8 01 DD 60  z#;?......Y....`
#     00D0: 28 1B D0 E5 E1 7B 4E CE   97 68 28 DC 12 ED 30 19  (.....N..h(...0.
#     00E0: 56 80 D1 2E 48 F3 53 83   F8 9B 80 3F 7D 37 2A 37  V...H.S....?.7*7
#     00F0: EF DA 46 50 9D FD 2E 0D   5E 1A BB B1 EE 53 7F 37  ..FP....^....S.7
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.491 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 46 82 F6 AF DC 0D 4C D3   57 FF 4E 92 65 56 4F 84  F.....L.W.N.eVO.
#     0010: DA 11 6B BC 01 F0 ED 5E   BD FE 04 04 A0 21 77 3A  ..k....^.....!w:
#     0020: 97 0A 08 96 D2 E3 5B C5   D7 89 2D F1 88 A2 FA F7  ......[...-.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.494 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:01.495 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.495 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:01.496 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.496 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:01.496 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:01.496 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.497 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.500 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 EB 19 A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:35.000 UTC",
#       "not  after"         : "2024-01-12 01:20:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 71 0C 0C C5 7E 5F 09   C1 88 C1 9B 3B 74 CE 23  .q...._.....;t.#
#           0010: 8A 08 6A E3                                        ..j.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 9A A8 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:28.000 UTC",
#       "not  after"         : "2024-01-12 01:20:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#           0010: B3 3E C5 F6                                        .>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.544 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 7A B9 54 CB FE 54 A8   64 65 35 6D 7B 33 CD 67  .z.T..T.de5m.3.g
#     0010: 1B 90 7E 6B CC 1B 54 89   B6 34 98 71 95 D9 52 AF  ...k..T..4.q..R.
#     0020: A7 E4 D0 0F 80 94 54 B6   BD FF 59 61 36 B6 CD 95  ......T...Ya6...
#     0030: F6 E3 16 04 D4 0E 44 95   53 B6 A6 75 27 86 21 C4  ......D.S..u'.!.
#     0040: BE 38 B5 6B A7 CA 60 0D   12 36 FD BF 00 21 E3 75  .8.k..`..6...!.u
#     0050: 69 D8 9A F5 67 75 24 9F   71 55 AC 3F DA 3E B5 00  i...gu$.qU.?.>..
#     0060: 15 8B 78 E4 0C C4 E9 D2   41 C8 14 41 29 00 F4 5A  ..x.....A..A)..Z
#     0070: A1 2B E9 C2 17 12 6F EE   76 DF 11 6B 16 CD E9 9F  .+....o.v..k....
#     0080: 14 E6 91 4F 25 42 B3 FA   48 82 3A 44 A9 AB F9 77  ...O%B..H.:D...w
#     0090: F9 03 C3 DC A9 6C 69 59   69 E8 FB 55 71 51 73 E0  .....liYi..UqQs.
#     00A0: 99 7B A7 B6 CF 04 F7 70   33 CB 47 2E 55 02 37 EC  .......p3.G.U.7.
#     00B0: 91 11 52 DE 41 F2 9B CE   46 88 D6 E1 02 6F 18 02  ..R.A...F....o..
#     00C0: 2F F0 F0 9D 06 02 F7 38   D7 B6 E2 50 5F 46 FA 72  /......8...P_F.r
#     00D0: CF 24 8A FD 98 A2 73 87   12 EF 71 55 9B C0 C2 76  .$....s...qU...v
#     00E0: 46 DD BE 43 83 A8 FD 8E   8F A7 CD 98 B9 E5 3A 0E  F..C..........:.
#     00F0: 4C 97 B1 EA A3 CC 95 4F   93 DC A7 C3 26 5C B1 BE  L......O....&\..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.552 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1A E0 8D B1 93 B8 9F F0   55 82 CB 7D 1E EB CB 03  ........U.......
#     0010: 54 7B 62 70 BE 91 DD 25   24 A4 32 95 E2 01 7B AF  T.bp...%$.2.....
#     0020: E5 DF AD FC 95 63 96 D3   D0 82 97 F5 C2 49 7A CF  .....c.......Iz.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.554 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:01.639 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AF 17 65 3D 65 97 D8 C7 2A B0 96 7A DE 1C ED 1F 69 0A 31 1E 27 F1 3B 5C 20 CA 1D 43 A9 22 FB 02",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 01:21:01.982 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 01:21:01.983 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 01:21:03.038; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 01:21:03.044; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 01:21:03.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 01:21:03.434; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 01:21:03.435; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9hK5rz/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:03.471 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 EB 19 A7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:35.000 UTC",
#     "not  after"         : "2024-01-12 01:20:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F8 71 0C 0C C5 7E 5F 09   C1 88 C1 9B 3B 74 CE 23  .q...._.....;t.#
#         0010: 8A 08 6A E3                                        ..j.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:03.476 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 78 3D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:26.000 UTC",
#     "not  after"         : "2024-01-12 01:20:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:03.493 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:03.969 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.970 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:03.972 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:03.972 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.979 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.995 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:03.998 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "67 7B DF EF 29 3B 5C 1D 18 D8 FB 9F FB 3D 01 F0 A6 4C F4 3C D4 C9 DD 37 D6 04 34 7D 11 58 DC 9A",
#   "session id"          : "00 6D 25 EB F5 72 C4 8E 26 96 38 D7 8B 6C 34 90 48 8B C6 9E CD 62 73 C0 4D 47 FF E4 A3 87 9F C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 91 39 A4 CF 26 79 32 CD   80 B1 81 96 C7 65 F6 D2  .9..&y2......e..
#             0010: 74 60 DB 7D AF E5 3D 57   44 69 F2 00 E0 6D C8 05  t`....=WDi...m..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.108 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E9 66 A7 2C 2D 10 BE 2F 49 06 6C 41 72 6E 59 08 BA E2 09 37 AE 95 75 4A B9 89 9F A9 D5 67 F4 08",
#   "session id"          : "00 6D 25 EB F5 72 C4 8E 26 96 38 D7 8B 6C 34 90 48 8B C6 9E CD 62 73 C0 4D 47 FF E4 A3 87 9F C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 DE 16 A3 AB A3 3F CC   FA 7A B3 74 A7 13 31 91  ......?..z.t..1.
#           0010: DB 72 34 73 62 0F BA EF   65 AD 02 D8 2F 1E 1E 51  .r4sb...e.../..Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.108 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.109 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.110 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.111 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.111 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.111 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.113 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.114 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.114 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.114 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.114 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.114 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.115 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.124 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.126 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.127 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.136 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.139 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.139 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.140 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.140 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.141 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.142 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.145 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C E0 0A 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:31.000 UTC",
#       "not  after"         : "2024-01-12 01:20:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 56 04 EB 61 E8 C5 3E   91 A4 EA 9F 93 D1 33 A7  .V..a..>......3.
#           0010: 99 0A 9B A5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.146 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:04.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:04.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:04.207 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:04.207 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.248 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 9A A8 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 01:20:28.000 UTC",
#     "not  after"         : "2024-01-12 01:20:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#         0010: B3 3E C5 F6                                        .>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#         0010: C7 9B F2 CD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.255 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 86 7C 8F 92 AC E4 ED   40 C5 7B 99 7D 6F 03 87  8.......@....o..
#     0010: 32 3E 56 DB 73 2C 48 84   E4 3F C0 6C 13 64 29 3A  2>V.s,H..?.l.d):
#     0020: CA 66 62 DE 37 6B B0 47   32 81 6E 16 F4 E9 A0 AA  .fb.7k.G2.n.....
#     0030: 36 98 08 D0 61 18 6C 8D   97 2E 30 44 13 52 A2 72  6...a.l...0D.R.r
#     0040: 9C A9 25 25 14 75 B8 96   E5 59 A0 1A 50 D2 ED 8D  ..%%.u...Y..P...
#     0050: 3F A6 FA 3F 27 4E 47 A9   D3 EC 0F C0 18 35 91 58  ?..?'NG......5.X
#     0060: 1E 8B 73 B2 7E 56 62 09   85 43 05 97 03 5B C9 F7  ..s..Vb..C...[..
#     0070: 6C E6 E4 3C E3 B0 6B 55   BE 82 26 2F C5 05 50 92  l..<..kU..&/..P.
#     0080: FB 4D B3 6E 6C 59 2E B4   7C C9 E1 4A CE C2 82 A9  .M.nlY.....J....
#     0090: E9 5D 50 B7 D9 B8 F4 07   5F D7 9B 9B 15 60 60 54  .]P....._....``T
#     00A0: 3F 11 44 2F 1F AB 4D C0   3C 81 07 18 0F 05 D2 A4  ?.D/..M.<.......
#     00B0: EC EA 50 23 B5 1D 4B E6   82 18 73 CC 41 C1 AA 3A  ..P#..K...s.A..:
#     00C0: 54 FF 8E 87 2E AF 09 FD   30 B5 65 B2 12 46 5D 7A  T.......0.e..F]z
#     00D0: E5 B2 1B FA 18 FF 37 0A   10 C7 E1 5E A7 29 C7 A3  ......7....^.)..
#     00E0: 05 50 D4 D8 75 07 A6 FA   D4 DD DD 21 49 09 0E F2  .P..u......!I...
#     00F0: C3 2D 93 B9 F9 3F DB 74   62 23 F9 00 5A B6 40 10  .-...?.tb#..Z.@.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.257 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D6 5B 87 C7 D1 44 3B 6B   0A 3C 64 86 FD 3D 8A E1  .[...D;k.<d..=..
#     0010: 62 7B AC 14 ED E6 5D 10   5F AC E0 E2 E2 1D E4 E3  b.....]._.......
#     0020: BD 09 0D E7 88 74 9C 5E   0B 5D E9 FF F0 A5 B2 96  .....t.^.]......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.261 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:04.262 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.262 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:04.263 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.263 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-14 01:21:04.263 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:21:04.263 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.264 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.268 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 EB 19 A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:35.000 UTC",
#       "not  after"         : "2024-01-12 01:20:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F8 71 0C 0C C5 7E 5F 09   C1 88 C1 9B 3B 74 CE 23  .q...._.....;t.#
#           0010: 8A 08 6A E3                                        ..j.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 9A A8 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:28.000 UTC",
#       "not  after"         : "2024-01-12 01:20:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#           0010: B3 3E C5 F6                                        .>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.313 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 38 01 CD 61 6B 54 20   8F 3C 27 E5 AF B5 89 93  U8..akT .<'.....
#     0010: BD C5 A9 F5 DF 24 8A 39   16 B9 BD 9A D5 57 D8 9F  .....$.9.....W..
#     0020: 1C E1 20 57 50 2C 05 72   6A C2 5A 51 62 E1 C9 03  .. WP,.rj.ZQb...
#     0030: BF 3B 33 82 93 E4 B9 37   7E E0 FD 5E B9 55 02 C0  .;3....7...^.U..
#     0040: 1C 98 76 78 BA 6B B8 B3   BA 36 F8 23 D8 8E B9 AC  ..vx.k...6.#....
#     0050: B8 AD D1 25 C4 1D 96 D7   C8 AE DE 3A 65 57 B3 41  ...%.......:eW.A
#     0060: 7F D7 6A DE 56 65 7E 62   B0 39 25 1F 84 DB 90 D1  ..j.Ve.b.9%.....
#     0070: 8B 76 0C A9 6F C1 8C 3C   1E 47 FF 54 09 89 2C 09  .v..o..<.G.T..,.
#     0080: 99 DC C7 D3 17 04 EC BB   19 C0 EB 71 68 EF 7F C6  ...........qh...
#     0090: 30 F0 D1 C6 04 31 6C 82   73 8D 5C 03 85 D0 83 45  0....1l.s.\....E
#     00A0: AE 9D 40 B1 E2 E4 72 D7   13 63 0E ED 6E 29 2A 08  ..@...r..c..n)*.
#     00B0: 66 EE 84 D7 BB EA 88 A6   58 66 47 AF C2 48 C5 7A  f.......XfG..H.z
#     00C0: 40 A4 D7 9A EF E3 0E E8   9F 77 DB C3 EE 4F 5A 5D  @........w...OZ]
#     00D0: 66 69 CB AB 5E C9 0B CB   D3 52 3A 71 93 85 4E BA  fi..^....R:q..N.
#     00E0: 91 20 36 89 BD 69 06 CF   DD 30 0E 2A 68 03 0B 80  . 6..i...0.*h...
#     00F0: 2D 48 3F 76 AB 04 33 36   8B C9 06 8C 09 1E CF 20  -H?v..36.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.315 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7C B9 B8 45 19 35 05 7C   98 10 01 57 F0 79 9B AC  ...E.5.....W.y..
#     0010: 48 61 3E 04 7F 6D 99 0C   85 96 F6 B8 A7 C7 EF AD  Ha>..m..........
#     0020: CF 18 4D 25 5F 1D 39 10   58 16 26 BF A3 F4 9A 27  ..M%_.9.X.&....'
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.315 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:04.377 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C5 6A 78 C4 1C 6A EB 98 C2 61 67 35 86 B3 48 20 FC 80 38 B1 8B D9 45 46 5B 4B 34 8D B5 EE D3 AB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 01:21:04.659 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 01:21:04.660 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 01:21:16.886; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:17.262 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 78 3D 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:26.000 UTC",
#       "not  after"         : "2024-01-12 01:20:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#           0010: B3 3E C5 F6                                        .>..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 9A A8 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 01:20:28.000 UTC",
#       "not  after"         : "2024-01-12 01:20:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 7F 71 EA 29 87 E6 D1   EF EF 2A BA 65 43 16 4D  ..q.).....*.eC.M
#           0010: B3 3E C5 F6                                        .>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 13 40 06 BD D8 80 52   7F 32 B2 8F 2D C8 04 06  ..@....R.2..-...
#           0010: C7 9B F2 CD                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 01:21:17.279 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:17.629 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:17.629 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:17.630 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:21:17.630 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:17.726 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.726 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:17.728 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-14 01:21:17.729 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.736 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.752 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.753 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.753 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-14 01:21:17.756 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "16 F2 7B D1 17 5F AC DD A0 8F F8 44 FC 8D FD C2 1E 95 B5 E9 B2 E3 69 67 C2 E9 66 5C AB 78 20 6C",
#     "session id"          : "83 68 53 E6 3F 3D 88 C2 9F 84 75 E5 A4 04 09 E3 D7 41 4E 91 E1 DE 9B 16 5B F5 A9 E7 37 09 49 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 00 D1 28 31 F4 47 8C E2   A6 AE 08 D6 81 56 B9 81  ..(1.G.......V..
#               0010: 5F 2C 3B AC 6A 04 61 30   B2 19 76 54 38 B2 B3 6E  _,;.j.a0..vT8..n
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.784 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "74 13 CF E6 C7 BE 69 0A 68 E0 5B F7 B4 74 1D 12 94 F6 47 7D 87 D8 2C 2E 9F FE 35 F3 44 EA 97 6A",
#     "session id"          : "83 68 53 E6 3F 3D 88 C2 9F 84 75 E5 A4 04 09 E3 D7 41 4E 91 E1 DE 9B 16 5B F5 A9 E7 37 09 49 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6A A2 75 50 25 C7 D3 BE   85 FC 9F DD 4F 68 7F C5  j.uP%.......Oh..
#             0010: B5 8B 15 34 DA CA 57 48   AC 63 00 16 1D 15 30 46  ...4..WH.c....0F
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.785 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.785 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.786 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.786 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-14 01:21:17.786 UTC|SSLExt

[...truncated too long message...]

a.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-14 01:22:43.910 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:22:43.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:22:43.962 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:22:43.963 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 01:22:43.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40776/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28960ms
ok 65 stop command for single port in 31725ms
ok 66 status detects locally running solr in 14782ms
ok 67 status does not expose cli parameters to end user in 232ms
ok 68 listing out files in 2287ms
ok 69 copying files around in 6977ms
ok 70 upconfig in 2823ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1260ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1278ms
ok 73 Cleanup in 1240ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=FB64433C5F7C1800 -Ptests.file.encoding=UTF-8


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 24m 24s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m59s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5662 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5662/

All tests passed

Build Log:
[...truncated 1316 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40571/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 23:12:11.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 23:12:11.358; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 23:12:12.611; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 23:12:12.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23606ms
ok 61 start solr with client truststore and security manager in 25331ms
not ok 62 start solr with mTLS needed in 57816ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SHnprq/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40571.
#
# Started Solr server on port 40571 (pid=200740). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40572.
#
# Started Solr server on port 40572 (pid=201172). Happy searching!
#
# INFO  - 2023-10-13 23:13:36.877; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 23:13:36.882; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 23:13:37.288; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 23:13:37.292; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 23:13:37.293; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:37.327 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E CF AF CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:12.000 UTC",
#     "not  after"         : "2024-01-11 23:13:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 91 92 0F E3 E9 0D 23   FB 2F 4B 59 75 DE 31 3F  .......#./KYu.1?
#         0010: 36 7B 8A 67                                        6..g
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:37.332 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2C 66 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:04.000 UTC",
#     "not  after"         : "2024-01-11 23:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:37.347 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:37.884 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.884 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:37.886 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:37.887 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.905 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:37.908 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 26 3E 55 7F 1E BC 93 72 85 70 2A A2 C1 23 02 71 3A D8 7E 82 38 B9 43 31 CD E7 D6 FA B0 C6 BE",
#   "session id"          : "B3 04 89 F7 9B BF B2 66 F7 9F AB 64 B8 70 4C 68 01 DF 73 3C 4A F2 11 FD 67 17 45 65 5B CD AB 6D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D EF 4B 2E E4 06 DD 59   38 A7 13 52 71 D7 4C 98  m.K....Y8..Rq.L.
#             0010: 32 81 47 C8 E2 F9 D8 96   1D EB A5 D0 97 86 1E 2C  2.G............,
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.018 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AC 60 38 6C AF E7 A6 3F 77 AE 68 66 76 C0 EE 92 2D 44 4C 96 D0 87 A5 9A 15 CC 40 24 6B D0 82 78",
#   "session id"          : "B3 04 89 F7 9B BF B2 66 F7 9F AB 64 B8 70 4C 68 01 DF 73 3C 4A F2 11 FD 67 17 45 65 5B CD AB 6D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0E 01 CA 1D 83 93 2A 90   8C 48 37 6F 2E EA 9C EB  ......*..H7o....
#           0010: 2F 17 73 5B D7 A9 61 15   16 BD 7A 5E 9C C6 78 1B  /.s[..a...z^..x.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.019 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.019 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.020 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.021 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.024 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.024 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.025 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.026 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.035 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.036 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.038 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.042 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.042 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.042 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.042 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.043 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.045 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.046 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.046 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.046 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.048 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.049 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.049 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.053 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A0 5C BD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:08.000 UTC",
#       "not  after"         : "2024-01-11 23:13:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 15 54 66 54 FD 63 4A   9D FD E3 88 80 F1 56 F8  ..TfT.cJ......V.
#           0010: 2A EA B7 BF                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.053 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:38.103 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:38.103 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:38.104 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:38.104 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.148 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.152 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5A C7 07 31 11 95 D1 F5   C1 E4 5C 60 57 98 89 39  Z..1......\`W..9
#     0010: 87 E7 FC F4 47 15 2C E8   57 FC AA 22 46 5B 97 5E  ....G.,.W.."F[.^
#     0020: 75 1B BA 04 E7 E9 6B E4   10 66 87 DF A1 8D CA 78  u.....k..f.....x
#     0030: D7 3E 65 58 A1 B2 53 56   12 DD 62 2C 73 92 4A 67  .>eX..SV..b,s.Jg
#     0040: 71 9D F0 2A A0 B8 28 44   65 59 0B 4C 14 F1 D2 70  q..*..(DeY.L...p
#     0050: 47 25 F2 93 2C F9 44 C3   6C 29 39 E9 7B 55 A5 59  G%..,.D.l)9..U.Y
#     0060: 28 C3 83 57 69 D8 1B 9F   F8 6B AD 08 67 58 9C CF  (..Wi....k..gX..
#     0070: 89 9F 79 D0 8E EE 18 3C   AA 27 DD BB E5 EF 71 5C  ..y....<.'....q\
#     0080: AB 3C D1 7F 5D C7 BE 6E   CF DC 04 47 E4 E3 0B A3  .<..]..n...G....
#     0090: FC D7 BC 06 93 DC 58 B9   6C 88 60 B8 7C B9 57 4E  ......X.l.`...WN
#     00A0: CF 31 CA 24 49 E0 F9 1A   CA 44 66 6B 77 A3 BE 15  .1.$I....Dfkw...
#     00B0: 0B 63 27 53 73 EC 7C 65   D9 41 E1 BB 05 C6 00 61  .c'Ss..e.A.....a
#     00C0: A4 75 0A E5 8A 1D 2E 34   58 84 1A 77 54 24 65 93  .u.....4X..wT$e.
#     00D0: 0B E0 CF 46 63 22 6A B8   99 E5 56 4A F3 76 B1 A2  ...Fc"j...VJ.v..
#     00E0: 11 69 61 71 98 B9 37 53   57 C5 16 5B E8 5C B7 27  .iaq..7SW..[.\.'
#     00F0: 7A 9A 64 9E D0 CA 68 DC   23 5E 20 BB 89 C5 6A 86  z.d...h.#^ ...j.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.154 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 09 0B FF C6 7F DF FF 6C   A8 17 11 59 44 32 16 84  .......l...YD2..
#     0010: 28 E9 9D FF DE 4D CB 44   C7 D8 54 A1 05 8F 27 98  (....M.D..T...'.
#     0020: 95 E7 A7 80 59 50 1D 8B   48 81 F3 AC D2 05 D2 72  ....YP..H......r
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:38.158 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.158 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:38.159 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.159 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:38.159 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:38.160 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.160 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.163 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E CF AF CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:12.000 UTC",
#       "not  after"         : "2024-01-11 23:13:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 91 92 0F E3 E9 0D 23   FB 2F 4B 59 75 DE 31 3F  .......#./KYu.1?
#           0010: 36 7B 8A 67                                        6..g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 05 1A EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:06.000 UTC",
#       "not  after"         : "2024-01-11 23:13:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#           0010: B3 C1 13 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.189 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 39 02 7E 1D DF 48 DB   B2 73 9A 8C 18 9B 34 7A  >9....H..s....4z
#     0010: 08 2B 6B DB 77 E5 66 9D   6E A1 20 7D EE 66 67 84  .+k.w.f.n. ..fg.
#     0020: A0 20 08 A0 0D FE 4E B4   2D A6 7D 86 73 85 1A C1  . ....N.-...s...
#     0030: 13 3F 67 C1 46 B5 76 E3   0E 79 84 E8 CA 33 CE ED  .?g.F.v..y...3..
#     0040: 32 C6 A0 60 E1 9B 23 48   47 2F 7E D3 04 9B C3 72  2..`..#HG/.....r
#     0050: 1B 1F 2F C7 AF A6 68 D0   9A F5 77 C1 76 45 74 D6  ../...h...w.vEt.
#     0060: B1 67 C5 A7 89 65 7C C1   3D B0 B8 BC 78 3F 59 85  .g...e..=...x?Y.
#     0070: 97 9E 8A 23 6F 2A 54 9F   11 49 92 FD 67 28 45 8B  ...#o*T..I..g(E.
#     0080: D3 75 08 F2 0D F7 26 A9   14 7F DD FE FC D1 17 E0  .u....&.........
#     0090: D3 FC 82 D3 EC DD E6 81   A2 7E DF 4E 81 DD 06 77  ...........N...w
#     00A0: B7 E4 96 D3 E9 C9 30 95   7E 7E 85 B3 7E 9E E2 D8  ......0.........
#     00B0: 66 81 45 4A 4C 11 75 7E   B8 6C 1C AB 4A DF 01 F8  f.EJL.u..l..J...
#     00C0: AE 16 C2 96 5C B7 78 82   5F D4 E2 B7 57 F8 EF 86  ....\.x._...W...
#     00D0: 1F 07 B7 A3 DE 2D 00 80   51 79 3D 31 16 88 B0 5B  .....-..Qy=1...[
#     00E0: 6A 3B CC 42 EE 98 67 17   13 1B 8D FD B8 69 42 6C  j;.B..g......iBl
#     00F0: 58 F3 93 5A B9 F3 10 E8   71 DD 54 40 21 B6 D9 7C  X..Z....q.T@!...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.191 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B7 AF B1 F8 20 3C D5 6F   F2 43 C9 3C D1 F2 EE 44  .... <.o.C.<...D
#     0010: AF 9C 84 ED 56 E2 D9 74   FD 0D EF B5 50 34 D1 85  ....V..t....P4..
#     0020: 5C 0C 47 10 A7 5F 96 F0   D8 C5 6F 8F 2B 68 90 62  \.G.._....o.+h.b
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.192 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:38.252 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "41 4D C5 19 E0 78 9A 3F 23 AE 27 DA E4 91 71 43 D3 1E B2 94 E7 DE AB B7 22 06 A2 60 D6 99 E0 CB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 23:13:38.570 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 23:13:38.572 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 23:13:39.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 23:13:39.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 23:13:39.930; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 23:13:39.933; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 23:13:39.934; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SHnprq/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:39.967 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E CF AF CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:12.000 UTC",
#     "not  after"         : "2024-01-11 23:13:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 91 92 0F E3 E9 0D 23   FB 2F 4B 59 75 DE 31 3F  .......#./KYu.1?
#         0010: 36 7B 8A 67                                        6..g
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:39.972 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2C 66 8A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:04.000 UTC",
#     "not  after"         : "2024-01-11 23:13:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:39.988 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:40.362 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:40.362 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:40.363 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:40.363 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:40.521 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:40.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:40.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.543 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.543 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:40.546 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C7 5F AF D4 13 4F 07 A6 A3 F0 6E E0 DC E4 36 70 DF A9 B6 C3 F8 FC 2F 07 9A 7D 44 3A 40 13 07 30",
#   "session id"          : "E2 82 75 79 A4 07 F9 41 02 3D AA 74 EA 99 3F 0A 31 C7 6B A4 8E EE 0C 26 C6 61 34 CD BB 2D 57 02",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC EF 5C F5 CE EA 36 A3   9F 59 0A D3 28 78 28 E5  ..\...6..Y..(x(.
#             0010: 15 CE 1B 37 28 E1 91 C5   E0 22 66 94 A8 31 8F 1C  ...7(...."f..1..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.644 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9A 9B DB BD B2 30 0D 0B 71 57 E7 52 B4 7C 98 CF 79 A2 9D 9D 6D 1F 95 D1 62 09 B6 D1 F3 85 AC DD",
#   "session id"          : "E2 82 75 79 A4 07 F9 41 02 3D AA 74 EA 99 3F 0A 31 C7 6B A4 8E EE 0C 26 C6 61 34 CD BB 2D 57 02",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 35 32 9E 59 8E 26 28 8F   21 88 FB F3 37 95 67 07  52.Y.&(.!...7.g.
#           0010: 2A F9 B1 B2 21 E7 F8 3C   75 B3 A8 D6 5C 63 4D 4C  *...!..<u...\cML
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.645 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.645 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.646 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.648 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.651 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.651 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.653 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.653 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.663 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.664 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.668 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.671 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.672 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.672 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.672 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.674 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.675 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.679 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A0 5C BD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:08.000 UTC",
#       "not  after"         : "2024-01-11 23:13:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 15 54 66 54 FD 63 4A   9D FD E3 88 80 F1 56 F8  ..TfT.cJ......V.
#           0010: 2A EA B7 BF                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.679 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.783 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 05 1A EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 23:13:06.000 UTC",
#     "not  after"         : "2024-01-11 23:13:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#         0010: B3 C1 13 56                                        ...V
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#         0010: 29 F0 6F 12                                        ).o.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.787 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F 3F 77 C3 DB F2 B7 49   D9 E6 BF D5 FA EE 3F F2  O?w....I......?.
#     0010: 55 4E DB E7 12 A9 C3 B0   C0 E2 C7 51 CD DE 73 57  UN.........Q..sW
#     0020: DC FB A7 59 45 04 5C 0D   E6 EA A7 FA 4A 63 AC B7  ...YE.\.....Jc..
#     0030: BE FE 43 62 6E 2E 4A A3   76 C4 71 0C 4C 72 F8 D5  ..Cbn.J.v.q.Lr..
#     0040: BD 2A FC A9 6D 73 E6 4E   D8 17 39 63 00 1B 9B 1A  .*..ms.N..9c....
#     0050: 42 76 2F 5B F8 C4 9E AC   52 F9 C6 60 AA 84 CD BF  Bv/[....R..`....
#     0060: 45 A1 CB 14 C9 32 52 B5   65 32 B6 FC 4C D4 19 A9  E....2R.e2..L...
#     0070: F4 8D 70 EF 93 1D D6 01   33 BE CB 02 D2 24 8F 5B  ..p.....3....$.[
#     0080: 9D 99 2D BB 2A 96 21 A6   12 79 2C AF AD 3F 40 A6  ..-.*.!..y,..?@.
#     0090: 8B 70 4A 14 C4 E5 4B B0   03 B7 0B 98 C0 13 D4 77  .pJ...K........w
#     00A0: F1 87 54 EC AF D1 50 93   F7 16 8F 93 F9 06 CB 00  ..T...P.........
#     00B0: DD FD A5 23 13 5E A4 FC   E7 A0 09 23 4C 0E FB 44  ...#.^.....#L..D
#     00C0: 39 CD 6C 7A A5 3A 6E 8A   33 FB 9A 67 CB D1 F7 67  9.lz.:n.3..g...g
#     00D0: F7 45 36 D4 CA 8E C7 77   2F D2 44 55 E9 22 DA 3B  .E6....w/.DU.".;
#     00E0: 04 0E 8E 5A A1 B5 0D D4   60 41 20 A3 1F A5 9F 8F  ...Z....`A .....
#     00F0: B2 F8 5B CF C4 EC 46 A7   DB 2E 2A CA E0 43 CC D1  ..[...F...*..C..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.790 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DC 8F 33 BC E9 E7 88 CE   8C 27 94 83 90 FE A1 6E  ..3......'.....n
#     0010: 70 A9 AB 74 70 C1 71 97   51 B6 F9 A4 1F E0 6A BB  p..tp.q.Q.....j.
#     0020: 4D 2F 7C 96 61 38 BC 63   A5 2C 2E DF 06 FF 97 20  M/..a8.c.,.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.792 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:40.793 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.793 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:40.794 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.794 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 23:13:40.794 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:40.795 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.795 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.799 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E CF AF CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:12.000 UTC",
#       "not  after"         : "2024-01-11 23:13:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 91 92 0F E3 E9 0D 23   FB 2F 4B 59 75 DE 31 3F  .......#./KYu.1?
#           0010: 36 7B 8A 67                                        6..g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 05 1A EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:06.000 UTC",
#       "not  after"         : "2024-01-11 23:13:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#           0010: B3 C1 13 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.825 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 A1 AA 3F 68 F9 69 D6   9A FD 15 35 E2 B2 19 DD  C..?h.i....5....
#     0010: E3 DC 1A 5B 0D E5 5C 52   B1 D8 C7 B3 B6 AF 94 14  ...[..\R........
#     0020: 85 E0 09 8B 78 9C C7 07   D0 A4 DF 99 96 24 32 F9  ....x........$2.
#     0030: 78 00 E7 BF 11 91 1D C3   F8 86 2F FB 4B A4 6C 97  x........./.K.l.
#     0040: 69 72 49 95 C9 C3 5A 0B   F2 D5 91 36 FB 68 4F 6B  irI...Z....6.hOk
#     0050: 8B 8D D3 CD 64 BE 89 0C   45 63 D1 53 49 93 9A 59  ....d...Ec.SI..Y
#     0060: 31 31 25 4A 80 90 7D F6   2C F7 C8 94 04 7E 20 11  11%J....,..... .
#     0070: 0E 0E E1 C3 85 67 7C 24   87 49 97 BB DC 9E 35 A0  .....g.$.I....5.
#     0080: 62 25 D2 F5 67 A5 C8 74   49 21 03 C4 88 54 22 B3  b%..g..tI!...T".
#     0090: 80 42 CE 96 E5 79 51 11   25 C3 48 6E 0F C8 C1 90  .B...yQ.%.Hn....
#     00A0: B6 C2 DE EE 8D 21 41 1C   02 3B 59 58 C9 97 2B AF  .....!A..;YX..+.
#     00B0: 53 22 CA 53 EF E0 86 6E   29 58 F9 92 C1 B8 83 EB  S".S...n)X......
#     00C0: B3 EC 0E 2E 5A 54 ED 32   3D 80 56 DB B1 94 39 C9  ....ZT.2=.V...9.
#     00D0: FB B6 AF D1 A4 12 85 61   69 E9 AA CE CE 79 70 DC  .......ai....yp.
#     00E0: 4D 0A 12 54 0A 53 1E F2   C6 ED 7B 61 9C 74 1A FC  M..T.S.....a.t..
#     00F0: 23 FD 89 20 D7 C3 9A 8D   1D B0 E2 53 BD 4D AA 5F  #.. .......S.M._
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.827 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 26 BE EB F8 57 D9 53 07   71 95 F9 5B 30 B6 44 6F  &...W.S.q..[0.Do
#     0010: 8B 17 28 D0 37 AC 48 06   79 BF 2C E8 DB 9F 80 0C  ..(.7.H.y.,.....
#     0020: 10 6C DE 3D 01 EE C0 D4   9C 2A C2 78 C9 8D 64 1B  .l.=.....*.x..d.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.828 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:40.893 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "95 70 DF 35 49 3B 8E BC E2 91 7A 8E 41 BF 28 52 F6 65 50 D6 DD 08 79 7F 02 D0 04 9B 57 3B 88 DC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 23:13:41.186 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 23:13:41.187 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 23:13:52.674; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:53.008 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2C 66 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:04.000 UTC",
#       "not  after"         : "2024-01-11 23:13:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#           0010: B3 C1 13 56                                        ...V
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 05 1A EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 23:13:06.000 UTC",
#       "not  after"         : "2024-01-11 23:13:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD DC 57 BF 6A 7D 8B C4   48 04 D6 F4 FB B3 5A 82  ..W.j...H.....Z.
#           0010: B3 C1 13 56                                        ...V
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 62 53 57 48 9F 77 75 CE   2A 73 10 2B 35 9C B3 3F  bSWH.wu.*s.+5..?
#           0010: 29 F0 6F 12                                        ).o.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 23:13:53.024 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:53.125 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:53.125 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:53.126 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:13:53.126 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:53.265 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.265 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:53.267 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 23:13:53.267 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.272 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.284 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.284 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.284 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 23:13:53.286 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "DA 39 BA C8 D2 F5 A6 80 26 70 7D E4 2E 82 D9 D0 95 04 F0 03 21 CC EB 21 20 EC DA 29 B5 26 8E A2",
#     "session id"          : "45 14 23 62 BD 08 E3 2A F3 6D A1 DD 56 93 B2 B5 E8 6F D7 65 1D C6 BB A0 71 2D 38 AB 22 8C 58 7E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A1 B0 A6 AF 05 3C 45 25   86 A9 F0 31 5B 46 E7 22  .....<E%...1[F."
#               0010: 7A FB AA 0A 03 D4 B2 F4   F2 3D 99 1A 42 4A 95 6B  z........=..BJ.k
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.311 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "38 C8 0C A3 C8 95 87 E5 2F BF D3 9B 3F 98 1A DC 43 D6 9F FD 6D 67 F4 6D BF 39 B2 ED 1B 25 3E 27",
#     "session id"          : "45 14 23 62 BD 08 E3 2A F3 6D A1 DD 56 93 B2 B5 E8 6F D7 65 1D C6 BB A0 71 2D 38 AB 22 8C 58 7E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 B7 F7 0B A7 5F 84 DE   E3 51 FE 82 5D 49 04 F0  h...._...Q..]I..
#             0010: DA CA F0 BD B7 A8 AE 7C   5B 63 FF CD A2 E4 03 02  ........[c......
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.312 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.312 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.314 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.315 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.316 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.316 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.324 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.327 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.330 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.330 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.330 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:13:53.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 23:13:53.333 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 23:15:12.663 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:15:12.703 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:15:12.704 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:15:12.704 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 23:15:12.704 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40572/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28177ms
ok 65 stop command for single port in 31721ms
ok 66 status detects locally running solr in 14685ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2179ms
ok 69 copying files around in 6657ms
ok 70 upconfig in 2614ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 23s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m50s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5661 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5661/

All tests passed

Build Log:
[...truncated 1320 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34057/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 20:32:20.564; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 20:32:20.570; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 20:32:21.476; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 20:32:21.515; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22929ms
ok 61 start solr with client truststore and security manager in 25467ms
not ok 62 start solr with mTLS needed in 57910ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ft2iJ0/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34057.
#
# Started Solr server on port 34057 (pid=200443). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34058.
#
# Started Solr server on port 34058 (pid=200876). Happy searching!
#
# INFO  - 2023-10-13 20:33:45.286; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 20:33:45.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 20:33:45.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 20:33:45.669; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 20:33:45.669; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(ca,h=[localhost],a=[],w=[]) for Client@1d3ac898[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:45.702 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AF 11 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:21.000 UTC",
#     "not  after"         : "2024-01-11 20:33:21.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 DB 9F 22 CC D2 CC 07   98 76 B5 F4 7B 45 CD AA  ...".....v...E..
#         0010: BA 0B E9 04                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:45.746 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 D2 93 6D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:13.000 UTC",
#     "not  after"         : "2024-01-11 20:33:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:45.761 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:45.952 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.953 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:45.955 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:45.955 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.973 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.973 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:45.975 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A3 1D 5C F7 CE FE 40 FD CC 85 74 B2 6B FD EF B0 9F BC FA 07 B2 2B 87 25 95 A3 8A BB 14 74 3C EA",
#   "session id"          : "8C 4D E0 A7 92 5D 60 CF 2D 01 98 7F 8E 0F B2 41 11 24 86 61 B6 39 92 4A 14 77 3B 8C 86 9A B0 F7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 14 7F 05 91 78 DA 23 15   88 A4 50 D3 B2 78 EB 57  ....x.#...P..x.W
#             0010: 58 4C 46 A2 8A 19 73 D8   5E 8D FB B5 86 2E BA 7C  XLF...s.^.......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.087 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D0 B6 52 29 96 2A 06 EA 95 98 B2 DA CB CC 78 DA CD 36 49 8C 45 66 68 A5 2F 38 5C 37 4C 93 4F A5",
#   "session id"          : "8C 4D E0 A7 92 5D 60 CF 2D 01 98 7F 8E 0F B2 41 11 24 86 61 B6 39 92 4A 14 77 3B 8C 86 9A B0 F7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C5 FD 53 58 E7 14 8C 9F   F1 EB 58 E7 5C 3B AA 15  ..SX......X.\;..
#           0010: 31 0C 97 F3 BE 14 15 6D   18 31 48 CA 21 C9 AB 50  1......m.1H.!..P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.087 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.088 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.090 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.092 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.093 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.102 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.103 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.105 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.108 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.108 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.110 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.111 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.111 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.112 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.112 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.113 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.113 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.116 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 4E 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:17.000 UTC",
#       "not  after"         : "2024-01-11 20:33:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 E7 FB F1 22 E7 E3 DE   55 07 FE 04 DD C9 1F D7  ...."...U.......
#           0010: B1 44 6F 23                                        .Do#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:46.161 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:46.161 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:46.162 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:46.162 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.199 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.203 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F BC 82 F7 71 8B 1A 05   F8 5F 26 CE 77 98 68 E8  ....q...._&.w.h.
#     0010: F4 46 B0 96 20 D4 90 40   9C FF EB DE 13 83 24 E1  .F.. ..@......$.
#     0020: 73 75 5A EA 96 F0 2B 15   C9 74 11 4B B5 72 E5 2B  suZ...+..t.K.r.+
#     0030: FA 2C 2B 43 1D DF F9 59   5C 17 04 73 96 87 D0 97  .,+C...Y\..s....
#     0040: DF D5 EC 91 3C B2 7D 19   CF 27 4F C9 00 B7 8B 84  ....<....'O.....
#     0050: 67 A6 33 DA 60 19 F5 C7   D8 E0 0F 23 0F 22 0E D7  g.3.`......#."..
#     0060: 50 00 AB 0E 9D FE BE CA   41 7E AE DB 4C AB EB 59  P.......A...L..Y
#     0070: C0 37 3E 61 9A 82 21 4D   14 66 F0 D9 C0 6E ED B7  .7>a..!M.f...n..
#     0080: CB 43 D7 01 22 5C 45 6E   9F A6 1C DD A8 45 B0 DC  .C.."\En.....E..
#     0090: BB 66 21 E6 BE 23 9C 88   2A D2 DB BA CB 55 CB C5  .f!..#..*....U..
#     00A0: 96 48 C4 4F 7E 82 B2 60   3C E0 0A EA FD F3 DD C2  .H.O...`<.......
#     00B0: E3 BF AB 6A 0C 8C 25 0C   F7 8E 7C 0F C8 49 5C 2B  ...j..%......I\+
#     00C0: 16 52 46 93 E5 2A 4C 16   49 2C 0D AF 71 0B A8 EE  .RF..*L.I,..q...
#     00D0: 02 1B 64 FD 81 68 54 FF   DA B9 A4 C8 62 92 88 B9  ..d..hT.....b...
#     00E0: 46 ED 46 03 0A 39 0A CC   BC 54 E0 31 4B D1 3D 1A  F.F..9...T.1K.=.
#     00F0: 55 77 EA 5B A1 87 65 B7   E9 59 74 5B E3 93 BC 67  Uw.[..e..Yt[...g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.205 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EA 36 3A 3C 65 66 CF 26   09 C0 91 E2 05 40 B6 2E  .6:<ef.&.....@..
#     0010: 1E 36 78 96 B3 2F 19 CF   8A 8F D7 D7 4C C4 20 EA  .6x../......L. .
#     0020: 54 D3 BC B1 8B 57 B7 F4   E8 26 28 53 67 D9 D2 CC  T....W...&(Sg...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.207 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:46.208 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.208 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:46.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:46.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:46.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.210 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.212 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AF 11 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:21.000 UTC",
#       "not  after"         : "2024-01-11 20:33:21.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 DB 9F 22 CC D2 CC 07   98 76 B5 F4 7B 45 CD AA  ...".....v...E..
#           0010: BA 0B E9 04                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 34 94 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:15.000 UTC",
#       "not  after"         : "2024-01-11 20:33:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#           0010: FF E9 10 BA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.239 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 1A A9 BA 57 78 DB 00   EA 76 B4 48 F6 9C 78 FC  ....Wx...v.H..x.
#     0010: D9 17 28 D8 35 EB 70 BE   0E 75 7E 2C 23 E7 CB 4E  ..(.5.p..u.,#..N
#     0020: 1D 45 06 58 B7 40 E8 63   52 AE 62 4A D0 8A 5C 6D  .E.X.@.cR.bJ..\m
#     0030: 95 C5 9C 70 9C B1 B0 88   F1 21 6C BB EE A3 49 20  ...p.....!l...I
#     0040: 61 FE 74 FF 16 08 06 1A   EE C8 9F 94 58 CB 90 35  a.t.........X..5
#     0050: 9F AC 01 F4 59 30 EE 92   59 C4 5F 54 59 EF 73 99  ....Y0..Y._TY.s.
#     0060: 0D 97 12 76 FC 26 10 06   72 CB 72 D2 6C 27 DA 0B  ...v.&..r.r.l'..
#     0070: 06 0B C0 1A D6 61 E3 96   EF 90 A8 97 E5 62 58 6A  .....a.......bXj
#     0080: FC 98 89 F3 0B C3 C3 ED   C6 C3 74 A0 D1 92 B5 7A  ..........t....z
#     0090: 92 F0 FA 3A 5E C1 5C 32   90 44 C3 39 AE D6 60 92  ...:^.\2.D.9..`.
#     00A0: A8 2F F3 85 A3 12 A8 60   D3 9B B9 E3 2B D2 91 8F  ./.....`....+...
#     00B0: 56 24 63 1E 26 1A 5C 05   7F EF 72 87 15 4D AA 84  V$c.&.\...r..M..
#     00C0: EA 2A 36 92 20 4E FB 4A   57 27 17 1A 67 CA 7B 16  .*6. N.JW'..g...
#     00D0: 14 C5 E6 B9 D0 09 48 BE   39 B7 74 E0 71 1D 48 26  ......H.9.t.q.H&
#     00E0: 46 EF BE EF 44 A0 0C C8   93 B8 49 CD 7C F8 3D A3  F...D.....I...=.
#     00F0: E4 CE 41 C0 A2 D9 87 C8   00 D5 50 54 1B 1E 38 35  ..A.......PT..85
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.240 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E B2 A0 08 A1 EF F1 0C   DF 5D 5C BC 13 76 DF 4C  .........]\..v.L
#     0010: 54 96 0F FB 8B E7 5B C0   B2 2C B0 5C 69 87 79 76  T.....[..,.\i.yv
#     0020: 32 7A D8 3C 76 A2 9C FE   33 29 0F 2B FF E1 0A DB  2z.<v...3).+....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.241 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:46.297 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "46 87 93 85 D5 91 92 A7 78 E5 72 7C C6 68 16 C0 58 01 15 94 29 DA 70 77 92 87 92 AB A4 84 BE 49",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 20:33:46.591 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 20:33:46.592 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 20:33:47.553; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 20:33:47.559; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 20:33:47.956; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 20:33:47.959; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 20:33:47.960; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ft2iJ0/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:47.996 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AF 11 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:21.000 UTC",
#     "not  after"         : "2024-01-11 20:33:21.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 DB 9F 22 CC D2 CC 07   98 76 B5 F4 7B 45 CD AA  ...".....v...E..
#         0010: BA 0B E9 04                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:48.001 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 D2 93 6D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:13.000 UTC",
#     "not  after"         : "2024-01-11 20:33:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 20:33:48.017 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:48.400 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:48.400 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:48.401 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:33:48.401 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:48.551 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.552 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:48.553 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:33:48.554 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.572 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.573 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:33:48.576 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 1D C3 37 C0 84 C0 79 CA 69 A8 CB B8 56 3D 83 F6 63 92 D5 C3 7A 52 2F 23 11 65 EE FC 39 B6 5D",
#   "session id"          : "39 31 F8 34 42 1E 75 F2 A7 BF 07 16 30 B1 BD CA BE AB D6 F5 D3 42 61 EE 13 F1 8E DC A7 DE B6 99",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 17 69 63 25 9D 11 35 FA   9D 1E ED 85 3A 79 FA FB  .ic%..5.....:y..
#             0010: C1 56 30 60 35 5A 68 31   9D 87 7E F8 F4 09 3E 6E  .V0`5Zh1......>n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.674 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3A 45 06 FF B0 EA D8 CB 24 82 9F 7A A9 14 35 03 B2 A3 E4 1A 69 8F 4D 25 A0 1C 9C 52 2A 6A 89 4C",
#   "session id"          : "39 31 F8 34 42 1E 75 F2 A7 BF 07 16 30 B1 BD CA BE AB D6 F5 D3 42 61 EE 13 F1 8E DC A7 DE B6 99",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E1 3C 10 91 38 C1 41 69   DF E1 8C DA DD 06 A7 78  .<..8.Ai.......x
#           0010: 1D 57 ED A9 45 3D BD DA   6D 75 2F B4 DD FA A1 17  .W..E=..mu/.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.675 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.675 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.678 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.678 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.680 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.681 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.681 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.691 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.692 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.694 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.697 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.698 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.698 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.699 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.699 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.701 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.701 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.701 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.702 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.703 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.704 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.704 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.708 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 4E 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:17.000 UTC",
#       "not  after"         : "2024-01-11 20:33:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 E7 FB F1 22 E7 E3 DE   55 07 FE 04 DD C9 1F D7  ...."...U.......
#           0010: B1 44 6F 23                                        .Do#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.708 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.800 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 34 94 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 20:33:15.000 UTC",
#     "not  after"         : "2024-01-11 20:33:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#         0010: FF E9 10 BA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#         0010: 36 5D 28 27                                        6]('
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.804 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 32 86 0D 27 4B 1C 31   F5 95 41 2D 03 B3 D7 95  .2..'K.1..A-....
#     0010: 26 D7 DC 17 1A 30 A7 C8   F5 57 6B 2B ED F9 2B C7  &....0...Wk+..+.
#     0020: 51 53 55 78 66 B1 11 61   D8 61 2F 42 BD 17 05 27  QSUxf..a.a/B...'
#     0030: A5 24 DC 69 30 99 E6 2D   E7 58 B2 37 F6 D9 6D 04  .$.i0..-.X.7..m.
#     0040: EF D4 9E D2 D5 D1 36 34   59 26 A0 97 97 13 96 CC  ......64Y&......
#     0050: 6A EC 25 51 1C 4D 99 58   E7 B8 D2 00 29 B4 6E F3  j.%Q.M.X....).n.
#     0060: A3 AB A5 A2 57 A3 CA 3E   DF 7D 60 28 FE AC 54 91  ....W..>..`(..T.
#     0070: BE 19 62 F6 5D 3E D2 93   2A 3F D4 43 7C 5E D9 BC  ..b.]>..*?.C.^..
#     0080: A0 4C BC A1 D5 D1 67 9B   E1 3D 11 B1 E6 34 06 57  .L....g..=...4.W
#     0090: A6 E8 BC 24 9F D1 B5 13   51 06 9F E6 92 67 2E B6  ...$....Q....g..
#     00A0: 20 18 E7 19 05 18 6B 6E   1B EE 05 0B 02 D5 37 35   .....kn......75
#     00B0: 3D 5F 67 94 A3 1F D3 C8   17 42 07 B8 80 93 5A EE  =_g......B....Z.
#     00C0: 8C D8 C1 18 3F 74 BA 7D   CA 6C D6 C7 70 46 16 FF  ....?t...l..pF..
#     00D0: 19 E9 70 E2 67 7D FA 77   93 AF 1F 8E E5 46 D5 F8  ..p.g..w.....F..
#     00E0: D6 62 E2 08 8B 37 54 7B   50 C7 36 C2 4C 75 9B E5  .b...7T.P.6.Lu..
#     00F0: C2 EA 75 51 25 0A FC 95   16 36 3B 48 AC C8 F6 A9  ..uQ%....6;H....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.806 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A D6 9B 79 4D 19 08 EE   DA BA D8 36 5A 35 70 B9  ...yM......6Z5p.
#     0010: B6 49 E3 FE 6D AF 9D 92   F5 F5 84 9A 23 1B 6D AD  .I..m.......#.m.
#     0020: 11 5B 19 9A 03 E1 EA 47   86 87 D2 DF E3 67 17 20  .[.....G.....g.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.809 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:48.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.810 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:48.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.810 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 20:33:48.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:33:48.811 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.811 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.814 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AF 11 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:21.000 UTC",
#       "not  after"         : "2024-01-11 20:33:21.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 DB 9F 22 CC D2 CC 07   98 76 B5 F4 7B 45 CD AA  ...".....v...E..
#           0010: BA 0B E9 04                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 34 94 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:15.000 UTC",
#       "not  after"         : "2024-01-11 20:33:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#           0010: FF E9 10 BA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.839 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 4B 26 59 50 8D CE A9   47 69 3B D6 EC 51 A7 02  .K&YP...Gi;..Q..
#     0010: FB D1 B7 74 BC 24 81 7C   24 0A 4E 4E 97 A7 17 67  ...t.$..$.NN...g
#     0020: 8A FB 39 D3 EC 36 6C 13   7B 84 75 22 A4 F7 69 71  ..9..6l...u"..iq
#     0030: 3A 11 70 54 D7 55 F1 20   FB D6 E7 AB EA 86 93 43  :.pT.U. .......C
#     0040: AA DC D5 3F CB 83 D0 2C   BC D3 35 D4 92 4F E4 75  ...?...,..5..O.u
#     0050: 87 B2 AD F3 A9 D2 74 BC   0D 3D 02 78 F7 4A 81 7F  ......t..=.x.J..
#     0060: E2 2E F5 5C 3A 68 91 13   BD 7A 36 4D 8D B3 44 7B  ...\:h...z6M..D.
#     0070: BE 3A A6 99 90 30 3E 81   9B 7C 79 E1 FD EC 50 15  .:...0>...y...P.
#     0080: 19 DA EC 6E 67 F2 C6 48   42 2B 61 65 C3 95 07 96  ...ng..HB+ae....
#     0090: 02 BB 41 8E 7C AF 17 2B   05 09 A5 73 60 52 27 62  ..A....+...s`R'b
#     00A0: FB 88 B4 1C 39 5F 24 AC   AB EA A1 E0 07 52 D4 E5  ....9_$......R..
#     00B0: 8E 22 F5 BC 35 41 A0 E1   A4 6C 50 98 E5 2D 9B 5C  ."..5A...lP..-.\
#     00C0: 9D B1 3E 93 5A 0B 20 0C   42 B9 2A 4C 85 5C 57 46  ..>.Z. .B.*L.\WF
#     00D0: B2 C0 A3 AA C2 CF 46 B9   68 66 35 87 18 30 7D 38  ......F.hf5..0.8
#     00E0: BB 30 F7 40 1E 15 40 33   49 59 FC BD 4C 45 8A 62  .0.@..@3IY..LE.b
#     00F0: 04 CA 37 5F 1F BB 2C C0   53 46 BE 0A 02 92 D5 A7  ..7_..,.SF......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.841 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 9A 59 E9 BB F0 53 3B   EC 8E 9E 69 14 C6 88 A2  9.Y...S;...i....
#     0010: 72 F1 52 C4 51 43 DE DA   6B FF 63 47 E2 0E C7 C9  r.R.QC..k.cG....
#     0020: 9F 55 29 91 15 3E 9D D1   23 E4 EB 5C BF F4 FB 83  .U)..>..#..\....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.842 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:33:48.906 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E 9B F4 64 87 0B 64 74 86 5E F5 E8 A4 A6 7B 7C FA 06 35 A6 51 7E A9 14 16 3F 11 AA 63 CF 49 B4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 20:33:49.248 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 20:33:49.250 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 20:34:00.652; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 20:34:00.985 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 34 94 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:15.000 UTC",
#       "not  after"         : "2024-01-11 20:33:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#           0010: FF E9 10 BA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 85 D6 B6 AF 0F F5 BF   42 77 A1 F8 71 56 B1 A0  ........Bw..qV..
#           0010: 36 5D 28 27                                        6]('
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 D2 93 6D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 20:33:13.000 UTC",
#       "not  after"         : "2024-01-11 20:33:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 79 4D DF 5B 97 F0 25   7D CB 18 C3 80 2A E0 B7  .yM.[..%.....*..
#           0010: FF E9 10 BA                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 20:34:01.001 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:34:01.432 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:34:01.432 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:34:01.433 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:34:01.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:34:01.523 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.524 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:34:01.526 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 20:34:01.526 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.531 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.543 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.544 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 20:34:01.546 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "9E 23 49 52 5D D1 74 CC 87 AF 61 96 EC 6A 4C BD D1 6A 4A 02 83 C6 28 89 AD DC 9E A0 2D 08 89 2B",
#     "session id"          : "AE 72 D8 67 AC 62 D9 15 E6 18 83 39 11 F0 85 61 90 D7 8C 09 C7 C1 AF BC 5F 37 F7 D7 7B 53 93 8C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 86 D7 AD 12 E8 76 9F E1   4B CE BD A7 F7 BD 84 0C  .....v..K.......
#               0010: 9C 7E C9 EB 46 C2 C5 82   A6 9A 78 E7 CF 44 DC 02  ....F.....x..D..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.566 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "65 A9 D3 AA C5 49 A3 75 78 AC 0C C7 B7 77 FB D6 E8 E9 AB BB 87 CD EF BF 5C F4 EB 02 0A DD 14 73",
#     "session id"          : "AE 72 D8 67 AC 62 D9 15 E6 18 83 39 11 F0 85 61 90 D7 8C 09 C7 C1 AF BC 5F 37 F7 D7 7B 53 93 8C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FB 18 12 19 3A 01 4B D2   7B 27 57 3A A9 5E 82 D0  ....:.K..'W:.^..
#             0010: AC 7F 40 C4 81 2C 25 DF   93 F9 C6 57 36 93 C5 56  ..@..,%....W6..V
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.566 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.566 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.569 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.571 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.571 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.571 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:34:01.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.580 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.582 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.583 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.587 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:34:01.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:34:01.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 20:34:01.589 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes"

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 20:35:21.478 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:35:21.530 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:35:21.530 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:35:21.531 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 20:35:21.531 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34058/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28495ms
ok 65 stop command for single port in 31310ms
ok 66 status detects locally running solr in 14744ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2217ms
ok 69 copying files around in 6753ms
ok 70 upconfig in 2792ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1241ms
ok 73 Cleanup in 1230ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 21m 38s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m3.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5660 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5660/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42575/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 16:24:56.952; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 16:24:56.958; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 16:24:57.865; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 16:24:57.905; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22543ms
ok 61 start solr with client truststore and security manager in 25405ms
not ok 62 start solr with mTLS needed in 56645ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-d6H3lX/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42575.
#
# Started Solr server on port 42575 (pid=199285). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42576.
#
# Started Solr server on port 42576 (pid=199741). Happy searching!
#
# INFO  - 2023-10-13 16:26:20.851; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 16:26:20.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 16:26:21.215; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 16:26:21.218; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 16:26:21.219; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:21.249 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 35 2B 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:57.000 UTC",
#     "not  after"         : "2024-01-11 16:25:57.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 73 78 D3 93 B4 1B 21   FB 4C D6 B6 38 EE 62 97  .sx....!.L..8.b.
#         0010: FE 74 3A 44                                        .t:D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:21.253 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 0D ED F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:48.000 UTC",
#     "not  after"         : "2024-01-11 16:25:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:21.267 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:21.338 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:21.339 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:21.339 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:21.339 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:21.489 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:21.490 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:21.491 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.495 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.506 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.506 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.506 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:21.508 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF F6 54 42 71 7E 64 EE EE 1D 7F EF 4F 99 B6 21 3A 41 BA D4 38 5D 9D 9B 12 64 D3 E9 34 9E 83 02",
#   "session id"          : "D8 A4 4C 80 8F 84 4B 2C DD 84 69 B6 E3 97 9B EA 50 D0 00 A1 D4 CA D5 3C 7C 11 8E 23 4D 51 94 A7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 8D EE 2E 78 E0 57 33   F2 34 01 05 E6 5D 28 7F  ....x.W3.4...](.
#             0010: 94 0C 6D 0A 54 97 93 0F   50 4D 98 00 E7 F9 FC 00  ..m.T...PM......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.649 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FF 7C BA 0E 41 B6 88 DD 3E 8C 95 E8 FD BB EC D1 F9 DB 92 EE FD 54 EA 2C 85 89 D1 75 8B D2 12 C1",
#   "session id"          : "D8 A4 4C 80 8F 84 4B 2C DD 84 69 B6 E3 97 9B EA 50 D0 00 A1 D4 CA D5 3C 7C 11 8E 23 4D 51 94 A7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 DD 83 90 CE 3F E3 D0   D6 81 9E 2F 46 50 C7 2B  .....?...../FP.+
#           0010: 46 30 3D AA D9 25 74 0D   19 46 42 61 27 33 1A 3A  F0=..%t..FBa'3.:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.649 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.649 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.651 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.662 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.663 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.664 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.668 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.668 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.669 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.669 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.669 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.670 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.671 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.671 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.671 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.672 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.673 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.676 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 C2 4B 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:53.000 UTC",
#       "not  after"         : "2024-01-11 16:25:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 50 DB 7C 2A BD 7F 12   32 00 4B AF 90 42 7A D8  .P..*...2.K..Bz.
#           0010: A9 96 71 B7                                        ..q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.676 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.752 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.755 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 6F ED 6C 95 68 0C C9   69 16 23 BD 8E 04 43 24  oo.l.h..i.#...C$
#     0010: 54 CC 18 09 AA 11 BF E9   0C 32 67 8F A1 94 09 A7  T........2g.....
#     0020: CC 57 81 FF FA FC F4 4B   58 01 BF DF BC 21 B7 FB  .W.....KX....!..
#     0030: A7 36 06 61 22 E8 2C 5A   73 5F 8D DC 6A A8 57 43  .6.a".,Zs_..j.WC
#     0040: 42 99 22 70 42 C8 4D 1B   D1 F6 D5 5D 41 7C 35 90  B."pB.M....]A.5.
#     0050: 1A A9 4F 3A 1E 88 2E C8   22 C4 81 76 58 33 84 15  ..O:...."..vX3..
#     0060: B8 41 7C 76 8B F9 E1 14   99 BC CC AE 02 C2 F2 E4  .A.v............
#     0070: 89 A7 51 20 20 59 BA FB   C2 1B 52 17 DA 9D D9 B0  ..Q  Y....R.....
#     0080: A4 19 76 15 17 0F E8 67   11 11 C6 90 F7 21 C4 FD  ..v....g.....!..
#     0090: AD AC 1C A7 8D EE 11 1E   2D 00 FC E9 5C E2 D7 E9  ........-...\...
#     00A0: 7A 22 52 D9 62 05 32 CF   75 84 09 61 97 E6 48 75  z"R.b.2.u..a..Hu
#     00B0: DA 15 E8 4E CB 14 0E 49   7F 2A FB 6D FE 83 B4 5A  ...N...I.*.m...Z
#     00C0: D7 99 D9 62 A1 BB 44 E9   43 BF 99 76 0C AC 3C C3  ...b..D.C..v..<.
#     00D0: D6 63 55 F1 8D 16 D9 2E   02 18 0C 26 3B 29 69 F7  .cU........&;)i.
#     00E0: 23 83 FA BE 4E 78 98 24   7F 33 05 72 9D 84 C4 B0  #...Nx.$.3.r....
#     00F0: 14 AC 87 93 9B C9 48 32   D3 BF DA C8 F7 51 C4 25  ......H2.....Q.%
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.757 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F 84 46 E7 72 5B F9 A2   42 E6 83 06 2A 88 E3 F8  o.F.r[..B...*...
#     0010: EF 15 CB 54 C4 4E 03 6A   F1 7D CE 81 DC 5E DB AD  ...T.N.j.....^..
#     0020: 1C E2 3B 9B 63 6D D0 79   F3 01 2A B0 9B 82 94 C6  ..;.cm.y..*.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.759 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:21.760 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.760 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:21.761 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.761 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:21.761 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:21.761 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.762 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.764 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 35 2B 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:57.000 UTC",
#       "not  after"         : "2024-01-11 16:25:57.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 73 78 D3 93 B4 1B 21   FB 4C D6 B6 38 EE 62 97  .sx....!.L..8.b.
#           0010: FE 74 3A 44                                        .t:D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 1E B1 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:50.000 UTC",
#       "not  after"         : "2024-01-11 16:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#           0010: 66 5D D1 97                                        f]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.791 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 46 A1 03 4C B7 1F 42   1D 5F 2F 1B 34 28 F8 E7  UF..L..B._/.4(..
#     0010: A0 C6 A7 AD 05 37 9A 94   68 C0 63 1F C2 E8 85 D2  .....7..h.c.....
#     0020: 69 65 82 02 56 27 9C A8   CF 8E 0B 20 24 1A C5 62  ie..V'..... $..b
#     0030: 7D D4 D2 95 87 85 EB A7   70 C1 91 15 51 16 1D 61  ........p...Q..a
#     0040: B7 0E 7D 3F EF 8F 01 76   2D 15 55 98 F1 32 F0 A9  ...?...v-.U..2..
#     0050: D5 D7 BE E8 3B D9 B2 C0   27 74 80 05 41 26 95 1D  ....;...'t..A&..
#     0060: DA C3 E5 FE F2 80 A4 52   56 45 D8 A5 22 C9 7B 6F  .......RVE.."..o
#     0070: 90 89 CB EC 94 36 6A 37   38 46 C8 44 84 FF 03 EC  .....6j78F.D....
#     0080: 58 D5 78 EA 4A 1D 47 64   3E C8 15 87 0A 97 6B 5A  X.x.J.Gd>.....kZ
#     0090: 9B 2D BA DB 74 04 E6 A6   46 A6 BA 5C 7A FA 79 A0  .-..t...F..\z.y.
#     00A0: 20 20 D1 9F 22 9E 26 BC   2F D7 47 DD 8A 80 B0 E7    ..".&./.G.....
#     00B0: 2B FB BC 68 84 D6 E1 3F   D9 DA DB 22 65 C3 25 0C  +..h...?..."e.%.
#     00C0: 24 03 24 1D 31 83 9A 5F   F2 84 07 DD 6B 79 4C E2  $.$.1.._....kyL.
#     00D0: AE BE CC 4F 72 EB 25 9B   8F C5 23 B1 E0 2F 2A A1  ...Or.%...#../*.
#     00E0: 31 83 8B 7A B7 18 52 C7   47 A5 BF B5 53 52 0E DA  1..z..R.G...SR..
#     00F0: 2C 31 CD A0 F3 AC 0A 24   17 29 4E 12 D5 83 56 ED  ,1.....$.)N...V.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.791 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8F 10 6A 90 74 D2 18 E1   9A 80 F5 AC D6 4A DB 38  ..j.t........J.8
#     0010: 69 8C FD C2 11 CD C2 5D   53 60 A1 A9 11 B7 47 AA  i......]S`....G.
#     0020: FD F9 B1 7C EB 67 1D 9B   08 F2 06 37 AA C6 D1 9C  .....g.....7....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.792 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:21.847 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "83 7D D3 86 17 68 A4 7B 72 A2 AD 18 42 27 82 83 7F FF 2F 1E 3A 74 B3 99 96 5F 37 F1 83 80 31 17",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 16:26:22.153 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 16:26:22.154 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 16:26:23.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 16:26:23.058; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 16:26:23.415; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 16:26:23.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 16:26:23.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-d6H3lX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:23.449 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 35 2B 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:57.000 UTC",
#     "not  after"         : "2024-01-11 16:25:57.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 73 78 D3 93 B4 1B 21   FB 4C D6 B6 38 EE 62 97  .sx....!.L..8.b.
#         0010: FE 74 3A 44                                        .t:D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:23.453 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 0D ED F0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:48.000 UTC",
#     "not  after"         : "2024-01-11 16:25:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:23.466 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:23.549 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:23.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:23.551 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:23.551 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:23.692 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.692 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:23.694 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:23.694 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.710 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.711 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:23.713 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "32 35 4C 3D 99 7F D2 8F 51 AA 54 AC 1D AF 46 1A 45 B4 1F 2C 65 3E A8 65 A3 64 D4 7E 17 98 F4 71",
#   "session id"          : "5D 8D 5F FE 92 EF 6A 8B 0E A2 6D 71 03 C7 F9 BC 2D 5B AB 3B 51 C8 47 2C B6 CE 78 DD E2 5F 25 65",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A4 98 54 08 17 C0 61 D2   F1 DC 73 3F 2F 1F 1E 78  ..T...a...s?/..x
#             0010: 1D 99 63 EC F3 42 73 48   35 71 22 93 EB 5E 88 0C  ..c..BsH5q"..^..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.803 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7C A0 58 D4 8D B8 C0 15 F0 76 50 1E BF 94 FE C8 FF 8F B8 EC 1C 4D 66 C3 5A C9 29 C0 22 F8 2B 9F",
#   "session id"          : "5D 8D 5F FE 92 EF 6A 8B 0E A2 6D 71 03 C7 F9 BC 2D 5B AB 3B 51 C8 47 2C B6 CE 78 DD E2 5F 25 65",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C0 99 98 E0 8B 94 B4 F0   D7 2A 4F 4A 0F C6 FC 28  .........*OJ...(
#           0010: 09 D9 F4 A2 41 55 C9 CA   98 F1 73 8D 64 D7 D6 6F  ....AU....s.d..o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.803 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.804 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.806 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.807 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.808 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.809 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.816 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.817 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.818 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.822 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.822 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.822 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.822 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.822 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.823 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.823 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.824 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.825 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.825 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.825 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.826 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.827 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.827 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.829 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 C2 4B 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:53.000 UTC",
#       "not  after"         : "2024-01-11 16:25:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 50 DB 7C 2A BD 7F 12   32 00 4B AF 90 42 7A D8  .P..*...2.K..Bz.
#           0010: A9 96 71 B7                                        ..q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.830 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.907 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 1E B1 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 16:25:50.000 UTC",
#     "not  after"         : "2024-01-11 16:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#         0010: 66 5D D1 97                                        f]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#         0010: 3B 5C E3 45                                        ;\.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.911 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E 1D 9C FB 0B DD 19 D9   2E E4 3F 61 1C 28 E5 62  N.........?a.(.b
#     0010: B6 2F 7A 3E D0 4F 9C 67   BD 4C 39 84 81 63 E2 21  ./z>.O.g.L9..c.!
#     0020: A1 62 47 3E 9B 23 7B 4D   5A 9E 1F B7 9A 6B 22 D5  .bG>.#.MZ....k".
#     0030: 72 B4 AF 46 00 F0 D1 CF   17 D6 97 73 FC 93 0A 52  r..F.......s...R
#     0040: 2F 5D 31 D8 9D D8 6D E0   A7 69 A4 22 A9 AE 37 E5  /]1...m..i."..7.
#     0050: 58 77 DC 56 68 47 EA 29   21 92 AD CE 82 80 5D 08  Xw.VhG.)!.....].
#     0060: 0C 15 06 6D 35 75 60 93   BA 9D EF B2 DF 59 46 DC  ...m5u`......YF.
#     0070: 33 4E 9E 89 26 F3 90 BC   F1 AA 0E A5 7E 1D 6B 07  3N..&.........k.
#     0080: 16 1D F1 41 55 32 CF FF   66 38 0C 7F 4F 76 08 90  ...AU2..f8..Ov..
#     0090: A8 38 79 2E 7A 5E 31 C2   AC AD F2 1F F3 B5 B5 8A  .8y.z^1.........
#     00A0: 2E 2B AE 88 4F CE 79 70   9E AC 31 2F 47 CC 85 73  .+..O.yp..1/G..s
#     00B0: 28 62 F8 5F 6F D8 A0 A6   7E AC 2F 38 C7 7D C6 0B  (b._o...../8....
#     00C0: 33 DD B5 3F 5A FB E7 29   30 D3 B4 57 8C 31 46 02  3..?Z..)0..W.1F.
#     00D0: 79 D1 1F 40 24 FF 14 04   70 EA 5B 4B 87 1C 22 07  y..@$...p.[K..".
#     00E0: C0 D2 B1 88 D2 5D FD C0   3E BC 67 A6 D4 4E 28 BA  .....]..>.g..N(.
#     00F0: AB BD BC 51 A5 08 6C F1   D0 48 44 1F 23 59 61 3A  ...Q..l..HD.#Ya:
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.913 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6D 65 45 1D BC F3 76 C6   5E 7A 87 CD 70 09 32 78  meE...v.^z..p.2x
#     0010: 6B 57 A5 6B 03 92 84 2B   33 6C AC 7D 53 5F 28 44  kW.k...+3l..S_(D
#     0020: FF A5 8F E2 4C 93 05 1A   B6 83 BF D1 93 34 27 4C  ....L........4'L
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.915 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:23.916 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.917 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.919 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 35 2B 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:57.000 UTC",
#       "not  after"         : "2024-01-11 16:25:57.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 73 78 D3 93 B4 1B 21   FB 4C D6 B6 38 EE 62 97  .sx....!.L..8.b.
#           0010: FE 74 3A 44                                        .t:D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 1E B1 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:50.000 UTC",
#       "not  after"         : "2024-01-11 16:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#           0010: 66 5D D1 97                                        f]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.944 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 EB 47 92 C2 3E F1 D5   C5 7F D1 DA C1 7D FD 8A  4.G..>..........
#     0010: EB 67 DC C4 E1 77 AB D4   EA 1A E7 D4 83 2F 76 99  .g...w......./v.
#     0020: F9 C1 00 FD 2F 88 FE 0B   B7 FB 86 B5 A6 72 80 1A  ..../........r..
#     0030: 44 D3 7E 4B E3 2B 5E E3   51 CC DE 2D C9 68 1E 80  D..K.+^.Q..-.h..
#     0040: 57 F0 CC 4F 39 0D 71 5B   2A 39 9B F3 45 A8 76 76  W..O9.q[*9..E.vv
#     0050: 61 06 64 73 62 69 FD 38   69 4E F2 61 2C A1 F4 DC  a.dsbi.8iN.a,...
#     0060: 20 E0 4B 6E 08 9A 02 43   59 CB CA A7 06 10 DD 55   .Kn...CY......U
#     0070: 29 00 16 6E 2A 76 07 9C   93 3A 05 62 B5 46 E5 5E  )..n*v...:.b.F.^
#     0080: C1 05 12 49 CC 77 50 97   D3 50 6A CE 41 74 7C 71  ...I.wP..Pj.At.q
#     0090: 4F C4 49 E6 DC 4C 32 00   36 04 03 B8 35 28 86 D0  O.I..L2.6...5(..
#     00A0: B2 48 2A A6 9D 40 45 C1   82 D7 6F 8B 48 AE FB EF  .H*..@E...o.H...
#     00B0: 0A 51 12 A9 84 4D 3A 21   E1 82 3C C1 6E 58 A1 B2  .Q...M:!..<.nX..
#     00C0: 9C 22 81 C1 CF 23 05 F1   16 52 0A F1 66 C5 63 7A  ."...#...R..f.cz
#     00D0: 0E 36 5F 95 0B F6 B6 18   F3 7E 3E 32 68 74 15 AE  .6_.......>2ht..
#     00E0: ED 69 B7 1C FE 4D 84 7E   E3 EF A4 82 A7 E7 C4 4C  .i...M.........L
#     00F0: 40 9C C2 41 97 D4 75 DF   28 A3 24 7F 6B 23 20 32  @..A..u.(.$.k# 2
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.945 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 1F 94 EF 1D 56 CD 73   40 5C 5C 88 D4 48 E7 A2  .....V.s@\\..H..
#     0010: 4B 0C 79 FC BC AC 4B A1   3D 1B D8 CA B3 62 BE 06  K.y...K.=....b..
#     0020: F2 DD C2 16 80 A7 F1 27   A4 38 A6 41 43 3B 3D 96  .......'.8.AC;=.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:23.946 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:24.002 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5C 16 5D C7 5C 91 3C CD 72 66 A6 BD EB CE 57 0D 2B EE 49 7C 20 FD 46 0D 6D B9 16 DA 2A FD 67 59",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 16:26:24.276 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 16:26:24.277 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 16:26:35.732; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:36.059 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 1E B1 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:50.000 UTC",
#       "not  after"         : "2024-01-11 16:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#           0010: 66 5D D1 97                                        f]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 92 C8 C4 32 EC FC D3 55   22 2F 29 0E 1F 0A 24 7C  ...2...U"/)...$.
#           0010: 3B 5C E3 45                                        ;\.E
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 0D ED F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 16:25:48.000 UTC",
#       "not  after"         : "2024-01-11 16:25:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 44 F5 36 9B A3 40 17   98 9D 06 89 D9 3D 96 38  ?D.6..@......=.8
#           0010: 66 5D D1 97                                        f]..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 16:26:36.073 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:36.222 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:36.223 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:36.223 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:26:36.223 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:36.304 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:36.306 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 16:26:36.307 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.311 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 16:26:36.325 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "36 5D FD 71 CD 9C AB 50 02 2B 11 D8 BC 8A B4 72 3D 7B FF 36 E9 1F 5A 90 37 66 2E 83 C5 AF 89 A5",
#     "session id"          : "B1 6C 67 FB 7C 5A 5C 51 9C 5D F3 40 F2 84 9B 62 83 82 C5 6B 4B B2 F3 1F A4 0C 41 C7 E4 66 9A AC",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C6 8E 2E 66 C6 A1 A6 46   DE 94 91 5B DD 12 65 B8  ...f...F...[..e.
#               0010: DC B4 F2 C5 BE F3 A1 B5   33 0D 6D 6E D4 73 95 28  ........3.mn.s.(
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.348 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "ED 99 10 FE 54 2D 33 34 90 4D 23 D8 7E A9 37 03 D7 52 A2 15 1D C0 17 EE 32 AE 64 48 DC 3E 87 E5",
#     "session id"          : "B1 6C 67 FB 7C 5A 5C 51 9C 5D F3 40 F2 84 9B 62 83 82 C5 6B 4B B2 F3 1F A4 0C 41 C7 E4 66 9A AC",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 02 6B 1E DF 4F 0A 8B 3F   9F 05 10 4E 95 56 49 EE  .k..O..?...N.VI.
#             0010: 98 C1 CD 12 E2 2A 63 8C   1B 96 42 3C E1 50 66 5E  .....*c...B<.Pf^
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.349 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.349 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.351 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.353 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.353 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.353 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.354 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.362 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.363 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.364 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.367 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:26:36.368 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 16:26:36.370 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

nection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 16:27:54.063 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:27:54.110 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:27:54.111 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:27:54.111 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 16:27:54.111 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42576/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28360ms
ok 65 stop command for single port in 31226ms
ok 66 status detects locally running solr in 14326ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2141ms
ok 69 copying files around in 6468ms
ok 70 upconfig in 2594ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 23m 19s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m56s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5659 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5659/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34055/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 13:39:10.740; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:39:10.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 13:39:11.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 13:39:11.692; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22339ms
ok 61 start solr with client truststore and security manager in 25371ms
not ok 62 start solr with mTLS needed in 60717ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UIpnTO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34055.
#
# Started Solr server on port 34055 (pid=196104). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34056.
#
# Started Solr server on port 34056 (pid=196532). Happy searching!
#
# INFO  - 2023-10-13 13:40:34.339; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:40:34.345; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 13:40:34.727; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:34.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:34.731; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.765 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 9D 5D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:10.000 UTC",
#     "not  after"         : "2024-01-11 13:40:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  ....,..F..y.R.].
#         0010: F2 1D 17 0C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.769 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D FD 23 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:02.000 UTC",
#     "not  after"         : "2024-01-11 13:40:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:34.785 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.162 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:35.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.300 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.302 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:35.303 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.309 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:35.323 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 1A 70 6D 64 72 3C 5B 76 81 2C 56 0F 20 6C 19 86 FE 26 2E C4 77 D3 1F 27 ED 1B B0 70 FF 4D 88",
#   "session id"          : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 A3 57 E0 5E D2 DF 69   38 D1 12 02 75 A0 83 1F  b.W.^..i8...u...
#             0010: 1B 3D 0C 36 CF FA 4A AE   F3 21 1F 91 85 C8 9B 61  .=.6..J..!.....a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E6 40 FE 3A 58 75 E5 8A 3F 39 9F 60 96 B4 34 45 62 D2 37 63 59 63 09 C4 C0 5D EE C9 33 5E B2 ED",
#   "session id"          : "B0 EC BB 40 A3 E1 9F 49 C4 D2 5D 18 E0 56 C2 B9 DE 3D 17 BE A4 E1 9D 89 B1 C7 1A C5 99 7F 35 D3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 89 BE C7 02 E5 CF B7 51   6D 50 C4 E6 6F 66 05 EA  .......QmP..of..
#           0010: BB 91 9A 67 51 8D 88 D9   75 84 FC 12 51 84 67 2E  ...gQ...u...Q.g.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.420 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.422 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.423 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.425 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.426 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.427 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.436 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.437 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.438 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.442 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.443 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.445 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.446 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.447 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 05 DB D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:06.000 UTC",
#       "not  after"         : "2024-01-11 13:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E5 07 73 76 B3 00 E7   9C 0E 76 91 7B 20 EE E5  ...sv.....v.. ..
#           0010: AF 96 CC BE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.536 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.540 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 6D 97 BD 09 11 DC 1F   59 D1 CE B4 EB 3A D9 EF  dm......Y....:..
#     0010: C0 B3 92 D7 38 91 31 6D   A8 DD 3F 6A 33 6A 49 C2  ....8.1m..?j3jI.
#     0020: 5D F2 74 EC E9 B4 D1 7E   56 A2 98 56 09 25 88 FA  ].t.....V..V.%..
#     0030: 40 6F 57 82 B5 64 15 2B   25 D4 E7 87 63 4D 3D 29  @oW..d.+%...cM=)
#     0040: 46 A7 54 E5 44 B4 92 E7   A4 6E 05 9F 16 E7 4D 89  F.T.D....n....M.
#     0050: 27 96 D4 17 AC 8E B4 D8   BE 21 3F C3 31 16 00 0C  '........!?.1...
#     0060: 13 07 1E 23 40 86 13 5B   E4 63 C8 64 80 CC 45 81  ...#@..[.c.d..E.
#     0070: EB 79 8D ED 39 CE F1 4C   91 76 0C 22 69 09 63 02  .y..9..L.v."i.c.
#     0080: BC 8A CA 01 BA BB 72 D1   DB 0F 20 97 AE D4 D2 80  ......r... .....
#     0090: 76 AF D2 10 5F 61 21 4B   C8 FC 22 C5 6A 60 74 18  v..._a!K..".j`t.
#     00A0: 11 16 94 9B A4 E4 B0 4A   B7 FB 01 DC BB 4F 17 F3  .......J.....O..
#     00B0: 7C B2 A9 14 BA 82 BD 03   88 65 39 D0 50 91 A9 4C  .........e9.P..L
#     00C0: AE 5C FE 07 BD AF EE 34   9D FB 0F 4A C2 6E 24 D0  .\.....4...J.n$.
#     00D0: 79 E7 CD 25 83 72 8F 49   37 96 41 43 ED 56 0A 32  y..%.r.I7.AC.V.2
#     00E0: 79 AA D0 13 20 99 D0 DC   7A D5 AD DD 56 1D 8E 5E  y... ...z...V..^
#     00F0: 66 1F 87 1D 2D F4 F5 21   6D AD D1 F5 F2 55 3F 10  f...-..!m....U?.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.543 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 EB A9 C2 66 B5 F3 80   BA 8F A5 03 37 9D EB 1C  Y...f.......7...
#     0010: 8C 08 40 FB 8B 7A E1 57   FC AC 4A 4C CA A8 FF 29  ..@..z.W..JL...)
#     0020: 91 AD 37 70 C9 AE DD 85   86 12 45 9B 78 91 BA 0E  ..7p......E.x...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.545 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.546 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:35.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.548 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.552 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 9D 5D 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:10.000 UTC",
#       "not  after"         : "2024-01-11 13:40:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  ....,..F..y.R.].
#           0010: F2 1D 17 0C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.577 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C5 83 AF 51 6F 31 76 39   DA 00 3E 46 23 BB 4A 4E  ...Qo1v9..>F#.JN
#     0010: BA 77 A5 F3 3B 78 78 CD   34 9B 0D 8B DE 5D 9C 17  .w..;xx.4....]..
#     0020: 7D 94 1E D1 2E 3A 08 F2   6B 8D E0 CE EA B4 FD 36  .....:..k......6
#     0030: 62 BC 4C 22 AD B3 A3 A7   51 8F 11 9E 75 C6 17 D8  b.L"....Q...u...
#     0040: 68 EF 3D FE 39 CD 4F A0   BF 31 5E 3A 02 6C 67 D5  h.=.9.O..1^:.lg.
#     0050: 15 6D 15 8A D2 95 37 BF   18 F4 51 7E 0F D7 B5 0C  .m....7...Q.....
#     0060: 35 EF 59 6D 5C D8 55 8E   34 51 2B 5A A3 B5 A7 A0  5.Ym\.U.4Q+Z....
#     0070: BE 93 39 DE 1D 5F 25 D2   16 21 3B 16 97 65 1A 77  ..9.._%..!;..e.w
#     0080: 27 CC D2 AC C0 32 D1 1C   BC 0C 2B 73 1E B7 B6 DB  '....2....+s....
#     0090: DC B8 43 38 2F 78 BE 2E   E4 FC 1F C6 34 D6 34 35  ..C8/x......4.45
#     00A0: C1 ED F7 15 58 F6 E5 02   79 8A 3B 68 A9 73 90 20  ....X...y.;h.s.
#     00B0: 90 4E D6 89 8D D6 B6 28   F1 A1 C7 34 5E 67 F4 54  .N.....(...4^g.T
#     00C0: 59 FE E0 BE 12 01 8D D6   0B AB 15 8C A1 F0 19 89  Y...............
#     00D0: 1A 9B 74 09 D5 9A 55 38   60 C4 5E 04 4C 65 77 DA  ..t...U8`.^.Lew.
#     00E0: 77 2C D0 5C D6 7D CF FD   F2 23 26 D4 ED D1 5E CA  w,.\.....#&...^.
#     00F0: 41 51 F7 3B AF 66 67 A1   63 E2 FA 51 03 A8 67 BA  AQ.;.fg.c..Q..g.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.579 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F FE AC CA 53 63 6D 77   ED 6D AA B0 2A 61 E5 98  ....Scmw.m..*a..
#     0010: 50 17 69 11 5D 4D 4F 66   BB 69 CF C3 61 CE 8B 51  P.i.]MOf.i..a..Q
#     0020: DF CE E8 CF B0 A7 F8 16   E0 4F 7F 25 76 3B 78 D1  .........O.%v;x.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.580 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:35.642 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 B8 4D BB 73 47 36 49 98 CC 0D 54 E3 52 0A FA BC B4 F3 21 61 31 D5 27 02 E8 E5 F9 D3 A5 D9 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 13:40:35.937 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 13:40:35.938 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 13:40:36.899; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 13:40:36.905; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 13:40:37.281; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:37.284; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 13:40:37.285; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UIpnTO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.316 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 9D 5D 3F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:10.000 UTC",
#     "not  after"         : "2024-01-11 13:40:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  ....,..F..y.R.].
#         0010: F2 1D 17 0C                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.321 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D FD 23 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:02.000 UTC",
#     "not  after"         : "2024-01-11 13:40:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:37.335 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.674 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.676 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:37.677 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.835 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.837 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:37.838 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.844 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:37.860 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "67 2D 3D E3 92 95 1A 58 C6 ED 7D 28 04 58 C4 BE 21 32 25 98 A8 7E 7E 1F 40 CD B7 EA 0F 0A 71 19",
#   "session id"          : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 54 6B 7A 41 7F 8E 61   91 FF 39 F5 C6 3E C6 14  .TkzA..a..9..>..
#             0010: 95 38 6F CF 97 45 0B 80   5F 01 4C 7D CE F3 5A 04  .8o..E.._.L...Z.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.955 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C C8 41 B3 29 ED 6B 0B 0A 8A 67 DF F5 9D 73 19 40 1A 75 34 83 87 02 9F C2 0C 97 7B 45 C2 AF 96",
#   "session id"          : "D1 90 BA 2F A8 C1 80 80 7D A2 F9 30 71 32 95 92 BA 22 5E BB 60 2F 3C B7 EC 74 74 BF F3 DF F8 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C2 EB 42 77 03 1C 14 F0   98 0C F0 79 16 48 57 7C  ..Bw.......y.HW.
#           0010: 17 10 9E AE 48 44 C9 01   F7 51 D0 DF CC 4A B6 6C  ....HD...Q...J.l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.956 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.958 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.961 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.963 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.970 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.972 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.973 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.976 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.977 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.978 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.980 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.982 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:37.983 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 05 DB D8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:06.000 UTC",
#       "not  after"         : "2024-01-11 13:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E5 07 73 76 B3 00 E7   9C 0E 76 91 7B 20 EE E5  ...sv.....v.. ..
#           0010: AF 96 CC BE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:37.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.084 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 29 EF 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 13:40:04.000 UTC",
#     "not  after"         : "2024-01-11 13:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#         0010: AD BE 87 5A                                        ...Z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#         0010: 47 74 35 E4                                        Gt5.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.087 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 09 1D 75 51 F3 F2 D5   98 14 DA DD B0 2C 79 09  -..uQ........,y.
#     0010: AB DD 0E EE 78 5C 09 1A   FA 1B BD C7 B7 94 08 5E  ....x\.........^
#     0020: 8C C0 79 68 D1 CE 07 C0   70 EC 4F 9E 2F F2 4F 7F  ..yh....p.O./.O.
#     0030: C2 7A 38 E2 5E 8B 04 B1   D3 1C 49 DE 54 C1 D9 B5  .z8.^.....I.T...
#     0040: E1 FF 5E 58 CD 76 9B 92   33 82 1C 5E A4 06 D6 E2  ..^X.v..3..^....
#     0050: 1A CA B6 F6 74 4E 0A DD   C1 00 C9 41 54 5B 59 D8  ....tN.....AT[Y.
#     0060: A0 58 51 0D 9B 71 E9 C5   7F 28 6A D3 6C 53 2F 35  .XQ..q...(j.lS/5
#     0070: 8D 90 01 8F B7 5B B3 25   D8 EC 03 BD E2 DC 49 A2  .....[.%......I.
#     0080: E3 68 0B 8B E9 88 FC 5B   CA 46 D7 75 CE B2 1D 69  .h.....[.F.u...i
#     0090: 03 7E 17 25 C0 4E 5F 2A   DA 0E 4A E4 46 EF 71 D0  ...%.N_*..J.F.q.
#     00A0: AE 94 6B AB 07 45 C6 3D   68 61 0E C2 8C 6B 78 05  ..k..E.=ha...kx.
#     00B0: 6D 2C EF CF 13 1B F5 EC   E5 16 49 FD B3 46 AC 2D  m,........I..F.-
#     00C0: D1 77 4A EF E9 86 05 01   B2 75 11 6F 0D 7B 35 EA  .wJ......u.o..5.
#     00D0: 58 7D F7 3F 69 9A 22 79   79 AA B7 D7 4C 3B 3E 45  X..?i."yy...L;>E
#     00E0: 87 B1 6D F5 2A 40 84 86   95 6B 14 33 79 35 D6 24  ..m.*@...k.3y5.$
#     00F0: 68 37 B9 09 9B 0A 05 41   CD F1 8F E1 A1 81 6A B0  h7.....A......j.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.089 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 28 72 69 EA FE 2A BF E4   3D 3F CD 21 1F 32 87 C6  (ri..*..=?.!.2..
#     0010: A3 32 03 CC 1D 04 06 57   CF A1 07 C3 FE C5 5E 08  .2.....W......^.
#     0020: 1F 52 19 6E D2 56 48 C6   C3 19 12 C5 4E 53 FB 9F  .R.n.VH.....NS..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.091 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.092 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:38.093 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.094 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.096 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 9D 5D 3F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:10.000 UTC",
#       "not  after"         : "2024-01-11 13:40:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 09 7E 09 C1 2C B6 C9 46   17 D2 79 CD 52 9E 5D D1  ....,..F..y.R.].
#           0010: F2 1D 17 0C                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.122 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 31 B8 2D 44 AD DA 23   E0 EE E2 E4 CA 51 C0 69  C1.-D..#.....Q.i
#     0010: 0A E7 AE DA 6F D3 07 AF   B7 E6 28 41 1F A5 59 E1  ....o.....(A..Y.
#     0020: 64 73 ED E5 A8 E1 AF 28   CD E2 A3 0F 87 4D 31 F7  ds.....(.....M1.
#     0030: 62 84 05 C3 2D 2A AF 25   C5 21 06 53 EC 98 07 3E  b...-*.%.!.S...>
#     0040: 55 66 C8 BA 30 A1 76 B7   BD AB B3 80 53 3A 6E ED  Uf..0.v.....S:n.
#     0050: 8E 8F 70 A8 C8 21 16 D4   09 69 89 D5 AC 94 8B 9E  ..p..!...i......
#     0060: 85 FB 7F CE 49 7C 32 25   B0 1E BD 11 B9 35 07 CC  ....I.2%.....5..
#     0070: 96 52 1E D1 A4 09 77 0C   BB 05 36 C2 1E 6C 46 A7  .R....w...6..lF.
#     0080: 8F 94 29 57 2F F2 C1 3C   FA 47 0F DD 51 E9 84 20  ..)W/..<.G..Q..
#     0090: A7 49 A2 73 65 9E ED F4   06 92 A1 E8 09 3E 9B 86  .I.se........>..
#     00A0: 3A F8 80 FA 4E ED 66 33   5F 08 F2 9C E9 F4 B2 43  :...N.f3_......C
#     00B0: 54 2F D6 82 13 99 B7 40   92 BA 8E 6E 4D 5C 67 AD  T/.....@...nM\g.
#     00C0: 83 3F 2A 84 4E EB A2 10   02 18 D3 85 8C 97 83 37  .?*.N..........7
#     00D0: FA 59 46 F8 17 91 4E D6   F4 47 BB B2 74 8B A2 78  .YF...N..G..t..x
#     00E0: 99 26 42 5D 1A E8 9D 44   79 B7 C8 E1 8E 5E 91 C1  .&B]...Dy....^..
#     00F0: 32 09 2D 70 05 A7 34 7A   97 85 EA 48 0C 81 6C 4A  2.-p..4z...H..lJ
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.123 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 62 6C FA 1B 6B B7 64 80   43 8A 02 96 A0 04 70 B0  bl..k.d.C.....p.
#     0010: 98 A8 CC 49 3E AB 17 9E   A5 2D 3E 49 D9 4E 46 7D  ...I>....->I.NF.
#     0020: E3 C9 C3 1C 9A 17 CE 0D   7D EB B7 B1 3F 23 3A 92  ............?#:.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.124 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:38.189 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 8A 18 F4 61 1D 5D D4 73 79 41 56 02 06 00 21 AE 35 41 0C 1E 60 FE EA 04 90 2F C4 37 19 DA 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 13:40:38.514 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 13:40:38.515 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 13:40:49.442; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.766 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D FD 23 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:02.000 UTC",
#       "not  after"         : "2024-01-11 13:40:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 29 EF 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 13:40:04.000 UTC",
#       "not  after"         : "2024-01-11 13:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 E4 85 B2 8C 45 BD EE   08 7F FF B9 9D A9 33 24  .....E........3$
#           0010: AD BE 87 5A                                        ...Z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 2A 8A 23 88 D5 01 B0   B8 7E 07 10 94 28 3A 6A  #*.#.........(:j
#           0010: 47 74 35 E4                                        Gt5.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 13:40:49.782 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.934 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:40:49.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 13:40:50.016 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 13:40:50.035 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6B F1 FB 7E E5 EE 21 18 E2 AF 44 7B F0 E3 23 CA 92 4F A9 F4 F1 4E 06 20 A5 BA 89 65 1C 39 92 FE",
#     "session id"          : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CE D1 A8 38 E2 85 69 35   DC 16 B3 D2 44 63 1A 15  ...8..i5....Dc..
#               0010: D9 65 95 F2 43 ED DB 16   13 83 38 C6 BA CB 0E 48  .e..C.....8....H
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "0C A8 E6 7D 06 A8 AA 8F 09 44 5C 7D 53 8E 2A 31 A9 ED 55 25 21 FC 51 C6 5B 24 16 7A FD 12 DB 12",
#     "session id"          : "DC DA 51 0B 7F 9C 5B 13 E9 B6 29 21 B9 BD A8 4C FF 36 66 F8 C1 6D B8 39 B1 5C 3C 71 EC 07 1C 24",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E4 CC C8 B5 84 48 A6 5B   60 2A BE C6 6D CB 3A 46  .....H.[`*..m.:F
#             0010: 05 B9 93 CC F5 88 1D 43   3F 52 91 23 0C E1 BE 2B  .......C?R.#...+
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.053 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.055 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.056 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.058 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.066 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.068 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.069 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.072 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:40:50.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 13:40:50.074 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

ection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 13:42:12.575 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.624 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 13:42:12.625 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34056/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28584ms
ok 65 stop command for single port in 30661ms
ok 66 status detects locally running solr in 14337ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6510ms
ok 70 upconfig in 2596ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 4s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m33.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5658 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5658/

All tests passed

Build Log:
[...truncated 1320 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34555/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 11:27:05.518; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 11:27:05.523; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 11:27:06.424; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 11:27:06.464; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22284ms
ok 61 start solr with client truststore and security manager in 24609ms
not ok 62 start solr with mTLS needed in 56472ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-COGpC9/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34555.
#
# Started Solr server on port 34555 (pid=201308). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34556.
#
# Started Solr server on port 34556 (pid=201764). Happy searching!
#
# INFO  - 2023-10-13 11:28:28.375; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 11:28:28.380; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 11:28:28.754; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 11:28:28.757; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 11:28:28.757; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:28.789 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 B6 26 32",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:28:04.000 UTC",
#     "not  after"         : "2024-01-11 11:28:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F 9C 97 6C E6 65 59 E3   B4 BB 66 07 B8 61 2C B3  /..l.eY...f..a,.
#         0010: AF 8B 01 80                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:28.794 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 78 D4 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:56.000 UTC",
#     "not  after"         : "2024-01-11 11:27:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:28.808 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:28.901 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:28.901 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:28.902 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:28.902 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:29.038 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.038 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:29.040 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:29.040 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.045 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.057 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.057 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.057 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:29.059 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E2 55 34 62 F3 52 30 7D 6C B9 65 E9 B1 3B 1B 24 43 80 19 76 3A 1C E7 F5 06 BB 6D 14 64 5A 9E D0",
#   "session id"          : "4B 16 51 6A 86 1E 83 6D 12 6B 18 E9 33 15 F4 E7 37 87 6E DF F3 E2 C8 B2 68 52 26 66 D5 85 76 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 66 FF 27 F8 D6 25 7D   51 2D EA D4 EF 8B 79 0D  .f.'..%.Q-....y.
#             0010: 09 A3 60 A6 64 9D 7E 52   D7 D0 56 FE 29 E5 E2 45  ..`.d..R..V.)..E
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.173 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EA 21 59 6D B7 9F 27 B1 9F FB 06 19 A9 90 E0 EF 6A 6D 4F 49 B3 74 39 B1 11 E6 8E 2E F9 99 7B 0E",
#   "session id"          : "4B 16 51 6A 86 1E 83 6D 12 6B 18 E9 33 15 F4 E7 37 87 6E DF F3 E2 C8 B2 68 52 26 66 D5 85 76 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A7 2E 10 AD 99 C8 B9 4E   F0 A3 ED 83 98 34 F3 2E  .......N.....4..
#           0010: 45 E6 B9 63 05 6A D6 C2   C5 B7 30 C0 A1 42 CB 2A  E..c.j....0..B.*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.173 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.173 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.175 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.178 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.178 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.179 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.187 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.188 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.189 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.193 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.193 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.196 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.196 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.196 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.197 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.197 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.198 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.201 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 28 4A 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:28:00.000 UTC",
#       "not  after"         : "2024-01-11 11:28:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 0C 70 B1 4D BF 96 C2   C1 02 7D 89 7D FE 32 6B  E.p.M.........2k
#           0010: C3 E4 E8 B4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.282 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.285 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2A 45 DC BD 6E EC CC EA   3C 21 C0 20 46 CC 70 E3  *E..n...<!. F.p.
#     0010: 84 D0 8F 5C 01 67 52 B3   AE 8C 3F 91 F8 D9 69 FE  ...\.gR...?...i.
#     0020: 29 05 B3 98 E3 DB DF DD   56 0E 0C 65 A5 49 BF 8E  ).......V..e.I..
#     0030: CA 5C EE E0 22 D4 0B C2   FE C0 97 42 BC EC 50 EE  .\.."......B..P.
#     0040: CC 46 85 04 82 28 7A BC   5C 61 D9 62 31 D9 02 7C  .F...(z.\a.b1...
#     0050: 33 F5 B3 A8 81 F1 E2 5C   EB 58 7A 6B 48 36 DD 3A  3......\.XzkH6.:
#     0060: 9A 84 97 38 DE DE B1 A2   3E 90 83 E6 A3 DB EA A7  ...8....>.......
#     0070: FA 24 8D 89 6C 7E 1E 7B   76 B4 BF 26 51 75 7B BE  .$..l...v..&Qu..
#     0080: E6 AD 2B 73 B0 CB 64 57   9D 17 75 74 F3 8C 71 3E  ..+s..dW..ut..q>
#     0090: 9E 8B CE 4C 7F 0E BB 12   69 1B 1C 31 26 8B 9A 70  ...L....i..1&..p
#     00A0: 22 1B 31 C7 5B 28 B4 3B   B9 F9 D6 81 EA DE 16 43  ".1.[(.;.......C
#     00B0: 74 EB B2 A7 BD DA CC 64   98 79 71 63 E4 FA E7 11  t......d.yqc....
#     00C0: D9 B5 09 1D 92 4D 9E BD   90 E0 FE F9 4B 6E 46 55  .....M......KnFU
#     00D0: 8B 73 45 CA 31 E4 EE 75   B2 78 B6 C3 AD 46 15 79  .sE.1..u.x...F.y
#     00E0: CB 80 84 5E F6 1F 1A 23   C4 31 9D 64 73 7A 93 AE  ...^...#.1.dsz..
#     00F0: F4 89 F8 A3 5F 4D 4C C7   14 49 A4 05 1E 4E AC ED  ...._ML..I...N..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.287 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2E 18 02 0B 07 5A 9F 79   FD BB 3E C9 A5 33 08 A5  .....Z.y..>..3..
#     0010: E4 14 2C E9 44 5A 3F 7A   AB 22 27 15 34 0A 20 C5  ..,.DZ?z."'.4. .
#     0020: 70 4B EE 6E 04 17 ED 5D   D1 E3 BB 02 C4 00 3F 51  pK.n...]......?Q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.290 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:29.291 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.291 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:29.291 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.291 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:29.291 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:29.292 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.292 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.295 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 B6 26 32",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:28:04.000 UTC",
#       "not  after"         : "2024-01-11 11:28:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F 9C 97 6C E6 65 59 E3   B4 BB 66 07 B8 61 2C B3  /..l.eY...f..a,.
#           0010: AF 8B 01 80                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 60 E1 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:27:58.000 UTC",
#       "not  after"         : "2024-01-11 11:27:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#           0010: C7 BF EC FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.324 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: D3 B0 6B C7 E7 96 6A 03   78 22 80 7C 85 D1 79 AD  ..k...j.x"....y.
#     0010: 84 09 27 32 2F A6 AF 04   C7 3F BD EF CC 95 F8 4D  ..'2/....?.....M
#     0020: 3E F5 BE C4 12 E1 C9 2F   D3 02 BB F5 04 E1 36 88  >....../......6.
#     0030: 38 22 D5 58 2E A5 7F 07   2A 9C 03 E7 8B 60 30 78  8".X....*....`0x
#     0040: 4F 8F BE 1E 1E CA D6 62   0B 91 92 6B 14 89 44 63  O......b...k..Dc
#     0050: 90 07 F9 F1 D2 49 6D F1   F1 97 92 4D 27 76 82 C6  .....Im....M'v..
#     0060: FC D5 D7 24 35 6C BF F3   4B 91 74 98 54 19 7D FF  ...$5l..K.t.T...
#     0070: B5 FC 1E E1 D7 A8 66 0F   B3 7A FB CE 09 DA 0C 31  ......f..z.....1
#     0080: B2 93 EF 39 D3 26 C3 F7   08 FE 44 BF 52 97 43 9B  ...9.&....D.R.C.
#     0090: 84 94 54 65 8A 64 A6 F6   8E 95 EA 80 71 96 D6 DE  ..Te.d......q...
#     00A0: 0A 02 9C 66 41 20 6E 42   AD 84 4F 92 F0 52 B9 BE  ...fA nB..O..R..
#     00B0: CA B1 D5 FC 41 2C 32 F8   C1 E3 48 18 24 A4 2F 0B  ....A,2...H.$./.
#     00C0: DB 48 B3 03 D1 6A 82 E6   3E AF A6 D9 F0 53 D5 2A  .H...j..>....S.*
#     00D0: FE 89 61 27 BB EB 31 FD   48 A0 EF 78 47 D1 83 8F  ..a'..1.H..xG...
#     00E0: 85 4D CB D3 23 68 56 C6   E7 3D AD C1 30 5C 4A 49  .M..#hV..=..0\JI
#     00F0: 31 4A DA EA 4A 87 10 4C   12 C6 BA 51 DC 09 EB 0D  1J..J..L...Q....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.325 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B2 7B E6 4A 27 41 8F EE   19 6C 41 EE F5 03 84 4C  ...J'A...lA....L
#     0010: BE 5B 32 03 F7 BA 89 02   6D 61 79 62 CC 28 0B 54  .[2.....mayb.(.T
#     0020: D6 50 06 DC B6 29 2D 4B   53 6A 51 5F C8 85 2F 04  .P...)-KSjQ_../.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:29.389 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F6 5E 8F 63 74 35 8A 36 7E 20 85 35 8A D6 09 95 1F 23 EF AF A9 0D 8B D8 FC 4A 02 56 EA A3 22 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 11:28:29.715 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 11:28:29.716 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 11:28:30.651; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 11:28:30.657; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 11:28:31.027; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 11:28:31.030; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 11:28:31.031; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-COGpC9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:31.063 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 B6 26 32",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:28:04.000 UTC",
#     "not  after"         : "2024-01-11 11:28:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2F 9C 97 6C E6 65 59 E3   B4 BB 66 07 B8 61 2C B3  /..l.eY...f..a,.
#         0010: AF 8B 01 80                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:31.068 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 78 D4 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:56.000 UTC",
#     "not  after"         : "2024-01-11 11:27:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:31.083 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:31.431 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:31.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:31.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:31.438 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:31.591 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.591 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:31.593 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:31.594 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.612 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.612 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.612 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:31.615 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 B8 86 E2 E4 2A 6B 37 CD F9 DD 16 2B 7C 92 39 88 00 86 F7 90 DA BA 6F 23 5F F2 B2 68 40 DC 5B",
#   "session id"          : "C0 00 26 83 D6 20 03 F4 CA E6 C5 A3 0F 0B E5 FC 68 AE BB 1A 04 16 8D 8C E4 14 2C 0D 7E 34 79 0A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7E 86 8F 14 5B DA 33 53   B4 6F 5D F3 37 58 51 EA  ....[.3S.o].7XQ.
#             0010: C4 59 E6 9C 4D 21 80 14   B8 74 D4 05 52 B8 39 0D  .Y..M!...t..R.9.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.706 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F1 41 26 14 10 D8 A0 24 5C 07 B1 A8 C5 BE D6 AD 56 C4 61 41 47 7F E6 37 E4 DF D2 F6 9A CE 7A 68",
#   "session id"          : "C0 00 26 83 D6 20 03 F4 CA E6 C5 A3 0F 0B E5 FC 68 AE BB 1A 04 16 8D 8C E4 14 2C 0D 7E 34 79 0A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 65 CC B1 3E 34 C3 E9 86   F8 17 AB 97 E1 B4 6A DB  e..>4.........j.
#           0010: 40 7A 62 D1 90 88 7A E7   C5 FE 2F 51 4E BD 54 48  @zb...z.../QN.TH
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.706 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.707 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.708 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.708 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.708 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.708 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.708 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.709 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.709 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.709 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.711 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.711 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.712 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.713 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.713 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.720 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.722 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.723 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.726 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.727 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.727 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.727 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.727 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.729 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.730 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.730 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.730 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.731 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.732 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.734 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 28 4A 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:28:00.000 UTC",
#       "not  after"         : "2024-01-11 11:28:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 0C 70 B1 4D BF 96 C2   C1 02 7D 89 7D FE 32 6B  E.p.M.........2k
#           0010: C3 E4 E8 B4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.735 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.816 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A 60 E1 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 11:27:58.000 UTC",
#     "not  after"         : "2024-01-11 11:27:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#         0010: C7 BF EC FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#         0010: 00 85 51 AE                                        ..Q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.820 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D C0 88 A0 01 4A 8A 4E   CE 7B 63 7B FF 26 FD 76  m....J.N..c..&.v
#     0010: CA 03 62 02 30 27 0D F0   D7 AE 6A 4B 6A 59 AF 9F  ..b.0'....jKjY..
#     0020: 0D 96 53 22 AF 7B D6 B2   83 69 CD D4 72 AB AA 6C  ..S".....i..r..l
#     0030: 95 B9 53 17 FF A6 C6 93   27 A9 91 5E 8B A6 9A 5C  ..S.....'..^...\
#     0040: 06 F0 A6 A9 61 C0 82 D9   DF 38 D7 78 E3 C6 EF 9B  ....a....8.x....
#     0050: D3 2A F5 70 F7 84 DC EC   AD DD 4E BA 70 BE F1 A8  .*.p......N.p...
#     0060: B4 FA A2 16 D0 F4 EC D4   4C 64 90 85 E5 2D DD 4E  ........Ld...-.N
#     0070: 65 A8 F5 90 72 F4 DE 48   76 15 E9 FA BB BF D8 42  e...r..Hv......B
#     0080: 29 BD E3 18 02 B2 D4 FE   F5 08 B4 DC FC C0 8A 27  )..............'
#     0090: 75 6E 9A 9E 96 56 42 10   78 A7 E5 55 FA 59 01 CE  un...VB.x..U.Y..
#     00A0: A4 D5 28 FF 3A F2 DC 5E   33 12 00 9F A9 9E 0F 65  ..(.:..^3......e
#     00B0: BE F3 84 71 4F EF 94 C8   45 35 03 97 93 93 66 77  ...qO...E5....fw
#     00C0: BE 6E EB 86 83 7E 66 4E   9C 6E 84 47 DE 08 82 D4  .n....fN.n.G....
#     00D0: E0 2E D3 9C 5C 25 91 D4   C3 0A 30 19 9F FC B5 FD  ....\%....0.....
#     00E0: E1 67 C4 3C 29 7F E9 4B   D3 66 76 E1 60 7B 45 FF  .g.<)..K.fv.`.E.
#     00F0: 65 B5 F4 BC B9 73 F2 89   9D 9F B1 F4 AC FC 40 2F  e....s........@/
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.822 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 68 E5 5D 39 40 5C 6A BC   A5 2F 4C B5 8C 29 70 96  h.]9@\j../L..)p.
#     0010: 17 54 F7 5E CA 75 D8 C6   9C A3 C4 E6 69 BE 40 CF  .T.^.u......i.@.
#     0020: 82 E6 34 19 59 75 38 21   81 DC F8 2B 5F 92 5F 12  ..4.Yu8!...+_._.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.824 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:31.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:31.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 11:28:31.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:31.826 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.826 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.828 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 B6 26 32",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:28:04.000 UTC",
#       "not  after"         : "2024-01-11 11:28:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2F 9C 97 6C E6 65 59 E3   B4 BB 66 07 B8 61 2C B3  /..l.eY...f..a,.
#           0010: AF 8B 01 80                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 60 E1 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:27:58.000 UTC",
#       "not  after"         : "2024-01-11 11:27:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#           0010: C7 BF EC FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.855 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B1 78 CC ED 01 9A B1 45   71 54 39 60 56 62 7E 86  .x.....EqT9`Vb..
#     0010: 2A AF 7D B9 AE D7 31 AD   61 9D 9D AA EE 44 97 B2  *.....1.a....D..
#     0020: ED 6E E3 AB C6 32 28 3A   3A 0E 87 8F 40 58 3A C6  .n...2(::...@X:.
#     0030: 75 0F 1E 2A 79 CA 40 4B   FE B8 17 E6 FF 16 7E D2  u..*y.@K........
#     0040: A8 3D C8 F3 41 FB 66 7E   D7 00 B9 12 59 38 00 2C  .=..A.f.....Y8.,
#     0050: D0 96 06 BD D6 E0 5A 65   A7 F0 D5 D8 89 85 A7 58  ......Ze.......X
#     0060: C6 6C 86 35 E5 9E 90 8C   EE B5 11 37 69 FF 02 AF  .l.5.......7i...
#     0070: A7 41 35 49 14 17 27 B1   87 A2 BD D2 E5 86 35 63  .A5I..'.......5c
#     0080: 6F 56 C6 F7 9B B7 CC 61   5F 35 2D 5C 8D F6 57 64  oV.....a_5-\..Wd
#     0090: BD 36 9A BA 2A 95 FD F0   8E 0F DE 38 24 95 7D 11  .6..*......8$...
#     00A0: B3 EA 33 B5 81 EC 16 2A   90 6C BB 84 77 62 51 B8  ..3....*.l..wbQ.
#     00B0: 95 02 4F 04 DE 89 E6 12   60 A6 38 72 98 CE 47 93  ..O.....`.8r..G.
#     00C0: CD D8 C3 0F 83 88 25 82   73 9B 53 CE 18 A1 89 17  ......%.s.S.....
#     00D0: D2 72 8E A6 8A C9 50 E6   91 C5 1A 83 5A D9 45 DB  .r....P.....Z.E.
#     00E0: DA 08 D1 2F 96 06 74 12   8B 60 15 5E E9 F2 89 6B  .../..t..`.^...k
#     00F0: 9E 56 AE 86 A2 3F D8 A4   53 E8 56 24 C8 7D 6E 39  .V...?..S.V$..n9
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.856 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD 16 1A BD F5 82 C7 A4   BC F7 2F 5E CE BC 41 36  ........../^..A6
#     0010: A8 50 28 4E 5C 82 E1 BF   16 5D 68 34 79 75 11 43  .P(N\....]h4yu.C
#     0020: D2 BE 4D 21 F9 59 4F 23   4B 76 5C 14 AE D6 90 A0  ..M!.YO#Kv\.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.857 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:31.919 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DE 93 B6 C4 E6 49 0C 20 A6 87 9F 98 49 B3 F3 80 39 4D B0 6F DF D1 8A 7A 8D E6 A4 E1 3D 80 97 19",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 11:28:32.184 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 11:28:32.185 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 11:28:43.090; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:43.425 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 60 E1 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:27:58.000 UTC",
#       "not  after"         : "2024-01-11 11:27:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#           0010: C7 BF EC FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C2 D6 81 AF 04 9C 63 78   48 55 13 E2 C8 05 42 08  ......cxHU....B.
#           0010: 00 85 51 AE                                        ..Q.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 78 D4 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 11:27:56.000 UTC",
#       "not  after"         : "2024-01-11 11:27:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 F8 90 7E D8 55 D1 E9   DA C9 02 E3 76 B8 E5 9F  .....U......v...
#           0010: C7 BF EC FC                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 11:28:43.440 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:43.603 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:43.604 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:43.604 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:28:43.604 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:43.689 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:43.691 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 11:28:43.691 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.696 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.707 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.708 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 11:28:43.710 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "21 AE C7 DA 35 60 8A 99 03 85 AB D6 59 8C 48 08 84 43 84 9C 95 82 15 35 E0 C6 B8 D5 9D 28 BC 42",
#     "session id"          : "F6 DD 47 99 25 C0 6F 75 60 14 2A CA 3A 89 7F 7C AD B2 92 97 34 82 AD 16 62 67 A6 68 3C 4F 01 CA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 0F 0C 37 02 93 2B 46 ED   7D AE 26 A8 01 49 2E 8C  ..7..+F...&..I..
#               0010: 92 38 36 42 A0 53 2C 04   2A 0A 0C 75 55 25 00 17  .86B.S,.*..uU%..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.735 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "0F 72 9C 7B 17 98 F8 F5 13 0A 7B EA 11 4B 4D 03 E1 CC 65 CA 6B 6B 54 16 91 77 76 A8 F2 7E 29 A2",
#     "session id"          : "F6 DD 47 99 25 C0 6F 75 60 14 2A CA 3A 89 7F 7C AD B2 92 97 34 82 AD 16 62 67 A6 68 3C 4F 01 CA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 28 82 41 F1 02 54 56   11 32 D0 CB BE 4C 6B BD  h(.A..TV.2...Lk.
#             0010: 67 39 A0 B6 56 A2 96 8C   63 69 4E A8 EC DE 4D 7E  g9..V...ciN...M.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.735 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.735 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.736 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.736 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.737 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.739 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.740 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.749 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.750 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.752 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.755 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.755 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.755 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:28:43.756 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 11:28:43.758 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

nnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 11:30:01.398 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:30:01.441 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:30:01.441 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:30:01.441 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 11:30:01.441 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34556/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28313ms
ok 65 stop command for single port in 30672ms
ok 66 status detects locally running solr in 14314ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2164ms
ok 69 copying files around in 6586ms
ok 70 upconfig in 2592ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 1s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m40s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5657 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5657/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33755/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 09:11:03.949; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 09:11:03.954; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 09:11:04.836; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 09:11:04.876; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22515ms
ok 61 start solr with client truststore and security manager in 24896ms
not ok 62 start solr with mTLS needed in 60782ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-9yv82q/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33755.
#
# Started Solr server on port 33755 (pid=198113). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33756.
#
# Started Solr server on port 33756 (pid=198564). Happy searching!
#
# INFO  - 2023-10-13 09:12:27.499; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 09:12:27.505; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 09:12:27.863; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 09:12:27.866; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 09:12:27.867; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:27.900 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C D7 59 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:12:03.000 UTC",
#     "not  after"         : "2024-01-11 09:12:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 A6 4E 01 8C A0 27 76   B0 50 E5 19 75 EE 64 51  ..N...'v.P..u.dQ
#         0010: CD 2E A0 A6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:27.904 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 C6 B6 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:55.000 UTC",
#     "not  after"         : "2024-01-11 09:11:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:27.918 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:27.993 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:27.994 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:27.995 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:27.995 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:28.154 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.154 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:28.156 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:28.156 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.161 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.173 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.174 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.174 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:28.176 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "96 93 9F C9 BC 82 94 91 72 3C 50 0D 5D DA CA 87 E5 B7 F7 C0 F5 93 4C 7B 92 6D 25 5E 15 01 FB A3",
#   "session id"          : "87 4C 2F 75 51 BB 45 AF 50 5C 5D 29 01 7E FB 71 09 79 FA 6A 75 82 BB AE B6 0A B2 E8 02 EC 0A 90",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F8 DC DF AE 43 6F 69 5E   BB 85 AA 52 8A B8 B9 0E  ....Coi^...R....
#             0010: F7 C4 37 F4 EA 70 20 84   16 9D D9 9D FA E2 09 60  ..7..p ........`
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.283 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C5 F0 48 E6 58 4A 9D EF 32 FA C7 E3 D5 E7 E4 59 FC 45 53 56 C5 11 76 46 79 2C 60 FC 8C 95 9E 07",
#   "session id"          : "87 4C 2F 75 51 BB 45 AF 50 5C 5D 29 01 7E FB 71 09 79 FA 6A 75 82 BB AE B6 0A B2 E8 02 EC 0A 90",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 07 61 68 83 DF EB B5 F1   3D 59 BD 0E EB 84 DA 41  .ah.....=Y.....A
#           0010: 35 F8 1B F4 5A 4D 61 75   CC FF 18 2A D6 C1 9E 34  5...ZMau...*...4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.284 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.284 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.285 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.285 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.285 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.285 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.286 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.288 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.289 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.291 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.297 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.299 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.300 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.304 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.304 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.304 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.304 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.307 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.308 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.308 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.312 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F A5 79 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:59.000 UTC",
#       "not  after"         : "2024-01-11 09:11:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 14 F8 47 CC 9A 17 D1   5F 5E FC 36 CD A4 66 D5  ...G...._^.6..f.
#           0010: 1B C1 21 E8                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.312 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.390 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.394 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C D3 BF 47 7C D8 A8 60   0D DB 01 92 13 34 C5 F5  ,..G...`.....4..
#     0010: 02 69 D5 64 99 C2 94 5E   0C 24 4E C6 69 26 13 03  .i.d...^.$N.i&..
#     0020: 99 4B 1D 18 EB 47 E8 1A   0B D5 44 61 8A 45 86 E7  .K...G....Da.E..
#     0030: 9D 27 EF CE E9 39 AC 4F   8F E1 10 A4 56 F2 57 51  .'...9.O....V.WQ
#     0040: C9 3C DE 31 9F 37 7A 13   EF E1 AF 30 70 B6 46 BF  .<.1.7z....0p.F.
#     0050: BA 35 E3 CA 10 B2 85 6D   B6 D3 B9 FC 2C C5 23 2C  .5.....m....,.#,
#     0060: FD CD A6 5C D6 34 6B 0D   89 91 7F CB 92 0D 3C F9  ...\.4k.......<.
#     0070: F9 CB 93 7E 23 F1 C1 D2   62 E3 CC 53 8F FD 5E 93  ....#...b..S..^.
#     0080: 89 04 6B F5 2E 30 69 F5   0E 72 62 20 EF 33 78 65  ..k..0i..rb .3xe
#     0090: 38 FA 10 42 76 70 0C 7A   91 E5 3F 02 E0 69 8F 1B  8..Bvp.z..?..i..
#     00A0: 88 DB 5E DF B0 25 67 D8   FF 08 4A 29 F8 E7 57 FD  ..^..%g...J)..W.
#     00B0: 56 10 1D 14 8A 93 06 A3   50 FE C2 86 F7 3C 6D 60  V.......P....<m`
#     00C0: D1 9A BE 79 B5 3A B8 26   40 D7 F2 45 0D 2D 6E F9  ...y.:.&@..E.-n.
#     00D0: 0C 21 43 F1 66 59 DD A3   CF FE 7B 6F BA A6 88 B8  .!C.fY.....o....
#     00E0: DE B6 18 CE A1 C6 36 FB   06 62 0D D8 D0 C2 E4 FB  ......6..b......
#     00F0: 78 F3 09 01 D2 CF 33 FD   76 8C 0F FB A0 BB B9 88  x.....3.v.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.396 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF F4 4F 16 C2 39 86 94   14 B9 7A CC 02 6B A8 5B  ..O..9....z..k.[
#     0010: C1 C2 5A E8 8C 1B 93 17   53 E1 AE F5 3D 90 69 B1  ..Z.....S...=.i.
#     0020: 15 27 75 4B 81 6C AF 61   94 25 0F 0F 47 3A 89 99  .'uK.l.a.%..G:..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.398 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:28.399 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.399 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:28.400 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.400 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:28.400 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:28.400 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.400 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.403 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C D7 59 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:12:03.000 UTC",
#       "not  after"         : "2024-01-11 09:12:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 A6 4E 01 8C A0 27 76   B0 50 E5 19 75 EE 64 51  ..N...'v.P..u.dQ
#           0010: CD 2E A0 A6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 5D 21 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:57.000 UTC",
#       "not  after"         : "2024-01-11 09:11:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#           0010: 41 D8 07 0D                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.429 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 A8 E3 38 65 46 10 D0   33 E8 03 3F BC 61 29 E6  7..8eF..3..?.a).
#     0010: 74 CB A6 B1 99 1C 6D 2C   F9 A5 E5 22 91 DB 2C 48  t.....m,..."..,H
#     0020: 0C C6 93 50 D9 C3 36 F0   73 94 A6 40 C9 7C C3 15  ...P..6.s..@....
#     0030: 7A FA 12 3B 85 5A D2 42   5A 04 F6 22 77 DB F2 A9  z..;.Z.BZ.."w...
#     0040: 67 4C DB A1 02 70 27 5D   40 B7 15 9B FC 35 E5 2E  gL...p']@....5..
#     0050: 98 B8 A8 1B 0A AA 6C 4B   29 A2 EE AF A8 C4 0D 2F  ......lK)....../
#     0060: 64 5E 73 D2 4A 85 E1 87   51 A7 A0 19 ED 72 5C 5D  d^s.J...Q....r\]
#     0070: FC 45 B6 1C 1B 7F 7C B6   52 3A BA 75 ED DB 39 22  .E......R:.u..9"
#     0080: 34 0D 94 AC A2 26 3D 38   21 71 F8 8C 7B 1F 6B EC  4....&=8!q....k.
#     0090: CC 9E D9 62 FB E5 85 0B   B3 17 70 2F D4 B2 35 63  ...b......p/..5c
#     00A0: 33 B9 0A 49 7F 7F DE D1   27 22 FE C6 07 CB 0E F7  3..I....'"......
#     00B0: C0 C8 F4 E7 83 E7 C5 3F   81 36 2A FB 4F 13 B2 2C  .......?.6*.O..,
#     00C0: 2F 2E 56 B0 B8 25 30 C2   9C 11 AE 10 DD 1D 58 BF  /.V..%0.......X.
#     00D0: BD 8A 74 4D 85 75 3F 8C   38 CB 52 40 45 65 72 68  ..tM.u?.8.R@Eerh
#     00E0: 70 32 58 55 8B 07 41 49   98 4A D6 0D 82 D9 D6 C0  p2XU..AI.J......
#     00F0: 99 84 9E B2 62 BF E4 51   22 4F 4D AA 7E C3 B6 E8  ....b..Q"OM.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.430 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC 1A E6 60 1F 9F D5 85   AF A0 C3 3B 14 65 FF 26  ...`.......;.e.&
#     0010: 2C 48 F7 12 44 65 0E 5B   D0 AD 09 91 B8 98 28 BD  ,H..De.[......(.
#     0020: 79 8B F8 0E 88 9F 19 D6   F5 E2 EF D6 7F 9A 38 55  y.............8U
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.431 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:28.487 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "07 C2 79 71 8A 29 F1 9A F3 B5 DE DA 49 1D 08 40 16 22 1F 33 E8 A7 58 2F 75 12 7B 78 2F FE 6B E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 09:12:28.787 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 09:12:28.789 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 09:12:29.717; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 09:12:29.722; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 09:12:30.083; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 09:12:30.086; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 09:12:30.087; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9yv82q/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:30.118 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C D7 59 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:12:03.000 UTC",
#     "not  after"         : "2024-01-11 09:12:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 A6 4E 01 8C A0 27 76   B0 50 E5 19 75 EE 64 51  ..N...'v.P..u.dQ
#         0010: CD 2E A0 A6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:30.123 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 C6 B6 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:55.000 UTC",
#     "not  after"         : "2024-01-11 09:11:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:30.137 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:30.232 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:30.232 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:30.232 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:30.233 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:30.371 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.371 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:30.373 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:30.373 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.378 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.390 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:30.392 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6D 70 BD B1 D5 34 46 8A F3 C4 DB 20 0F CC 0A 89 8C 2C FF 1E 1F 72 84 B3 53 CB 94 E8 C7 75 92 2F",
#   "session id"          : "CF FF 3D 55 53 13 0D A0 70 6D 0C 45 94 58 EC 32 61 FF E2 81 96 0B BD BC 6C 7F 3F 7A A4 B3 68 4A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 29 DB 90 8B 0E 2D E0 76   68 90 AF 3A 44 16 06 C4  )....-.vh..:D...
#             0010: 5C 1B 5E C7 5E 9C 1A A9   E0 11 3A 16 13 D5 EE 68  \.^.^.....:....h
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.482 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "66 F2 01 2F A4 D5 D8 53 0E 92 D6 C5 37 85 CE 5C E8 1E 14 8C 1B C2 A3 60 71 20 32 4D 79 61 88 E0",
#   "session id"          : "CF FF 3D 55 53 13 0D A0 70 6D 0C 45 94 58 EC 32 61 FF E2 81 96 0B BD BC 6C 7F 3F 7A A4 B3 68 4A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 17 3D CD BA AE 46 68 64   BD BA 30 6C 2E AA 79 AF  .=...Fhd..0l..y.
#           0010: 5C EB AB A3 ED 80 0D D5   69 AE FD 86 C5 1E A3 05  \.......i.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.482 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.483 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.483 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.485 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.487 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.487 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.497 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.499 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.501 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.504 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.505 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.505 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.505 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.505 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.508 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.508 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.508 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.509 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.510 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.511 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.511 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.515 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F A5 79 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:59.000 UTC",
#       "not  after"         : "2024-01-11 09:11:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 14 F8 47 CC 9A 17 D1   5F 5E FC 36 CD A4 66 D5  ...G...._^.6..f.
#           0010: 1B C1 21 E8                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.604 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 5D 21 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 09:11:57.000 UTC",
#     "not  after"         : "2024-01-11 09:11:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#         0010: 41 D8 07 0D                                        A...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#         0010: 2F 93 22 43                                        /."C
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.608 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 EF 18 8E 7A EF 34 A7   26 F9 C6 EF 0E D6 18 60  ....z.4.&......`
#     0010: 5E 35 70 13 9F 53 DC BE   05 DE F4 AD 5F 39 D0 F7  ^5p..S......_9..
#     0020: 2B CE 73 88 A6 44 14 C4   32 64 AD 2A 0B 45 90 80  +.s..D..2d.*.E..
#     0030: 3E 3A DA 56 DD 1F 29 1A   BD 5F 65 5C A4 46 7D BF  >:.V..).._e\.F..
#     0040: CC 6F 0B FC DC 58 F1 E4   67 4F 7B E9 34 62 D7 34  .o...X..gO..4b.4
#     0050: 7B 3C C8 76 E8 2E 35 3B   A3 6E EB 65 E7 C8 A0 AD  .<.v..5;.n.e....
#     0060: FB 1B 1C 09 68 E1 CA 55   05 78 A8 6E 81 BA 6E AD  ....h..U.x.n..n.
#     0070: E2 97 1B F9 86 0B 19 BA   96 3A 44 94 EC EF E0 C2  .........:D.....
#     0080: 6D 53 31 75 B2 9B B4 8F   0C 19 83 B0 A3 A4 ED EE  mS1u............
#     0090: 17 85 A9 9F 00 8B 2A 0D   05 75 D1 DC 0F 15 29 F0  ......*..u....).
#     00A0: EF 17 8B B1 D6 55 1E DF   B8 A5 7E 98 EB 20 13 A9  .....U....... ..
#     00B0: E6 91 25 31 A3 92 B0 AF   4A 1C 6B A4 14 2B 7E 65  ..%1....J.k..+.e
#     00C0: D3 89 E0 47 19 50 06 D3   52 D3 F8 6E 34 40 17 E4  ...G.P..R..n4@..
#     00D0: DC 70 25 E2 4A 13 AA 0A   F0 0E 92 17 79 79 F3 6D  .p%.J.......yy.m
#     00E0: 6E C9 36 E8 F4 5B A8 01   08 BA 10 A9 10 B5 AB FB  n.6..[..........
#     00F0: 7C 9B FC 3D 2D A3 C0 0F   80 D1 83 FE 47 D9 43 07  ...=-.......G.C.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.610 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C0 7F 26 07 65 3A 39 9E   92 82 E8 94 89 6B A5 7B  ..&.e:9......k..
#     0010: 18 9B 8C 53 01 5A 95 B2   03 6F 40 46 3F 8A A4 60  ...S.Z...o@F?..`
#     0020: DB DF 01 39 AC D6 5E 5D   93 86 B4 BC AB 65 E5 5D  ...9..^].....e.]
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:30.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:30.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 09:12:30.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:30.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.614 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.617 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C D7 59 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:12:03.000 UTC",
#       "not  after"         : "2024-01-11 09:12:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 A6 4E 01 8C A0 27 76   B0 50 E5 19 75 EE 64 51  ..N...'v.P..u.dQ
#           0010: CD 2E A0 A6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 5D 21 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:57.000 UTC",
#       "not  after"         : "2024-01-11 09:11:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#           0010: 41 D8 07 0D                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.643 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 36 76 73 EE EF E9 62   F7 AA C0 F1 C5 34 E6 73  r6vs...b.....4.s
#     0010: 2E D2 16 F2 74 12 AA 10   6A 15 81 C6 94 21 38 FA  ....t...j....!8.
#     0020: 93 C3 11 9C 11 EE F1 80   22 D2 7A 61 01 E3 E5 F6  ........".za....
#     0030: 40 62 B8 5A 95 0A AD 43   3D E1 00 82 60 C3 69 01  @b.Z...C=...`.i.
#     0040: 59 D1 88 A9 AF E4 82 7A   CF E5 F2 FE F9 A3 48 87  Y......z......H.
#     0050: 8B 37 50 E1 41 EB 5E F0   FD 54 B0 AE F0 14 9C 9A  .7P.A.^..T......
#     0060: 0F 82 04 D6 7E D1 C4 49   33 50 B0 51 D3 2C A9 8D  .......I3P.Q.,..
#     0070: B8 73 E1 E8 26 28 55 DA   0D 17 F8 68 8D 59 B5 25  .s..&(U....h.Y.%
#     0080: 29 F0 25 27 37 2C AB 43   37 22 5A 4C 66 F2 98 47  ).%'7,.C7"ZLf..G
#     0090: 5A 70 1A 01 E6 85 DA 1A   4C B6 3B D4 AB 50 79 6C  Zp......L.;..Pyl
#     00A0: 55 AD CA 15 58 8C 59 6F   D9 70 4A BE FC C2 C4 72  U...X.Yo.pJ....r
#     00B0: 99 83 B8 D5 B5 0E BE 19   A5 9D 87 AA 70 2C 2D E7  ............p,-.
#     00C0: 38 05 DF 40 06 85 D7 58   40 A6 56 E3 9A 64 F4 1E  8..@...X@.V..d..
#     00D0: AC 2E 33 56 8F 21 FE EB   B4 D0 9B ED 65 F7 0A 0B  ..3V.!......e...
#     00E0: 1F BB 68 CC 16 20 45 57   C2 3C DB 5D 60 AE 77 8B  ..h.. EW.<.]`.w.
#     00F0: 63 A2 19 62 04 EA 80 D9   4B 06 32 E3 12 7B A7 C6  c..b....K.2.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.644 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F A4 33 6F 53 2B F0 F3   30 95 33 64 DA CA 19 07  ..3oS+..0.3d....
#     0010: 91 1D F5 21 89 7F F9 5E   57 EB 76 62 0E B7 2A 81  ...!...^W.vb..*.
#     0020: A9 FD 14 B1 07 48 C7 C4   02 58 E5 A1 2D 4A 1A 8D  .....H...X..-J..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.645 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:30.706 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 CA F8 B4 4F 89 98 33 B1 C2 F5 46 B1 90 62 6A E1 19 D7 BF D4 04 FD 76 51 99 8D 46 97 B3 71 49",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 09:12:30.982 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 09:12:30.983 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 09:12:41.700; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:42.033 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 C6 B6 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:55.000 UTC",
#       "not  after"         : "2024-01-11 09:11:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#           0010: 41 D8 07 0D                                        A...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 5D 21 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 09:11:57.000 UTC",
#       "not  after"         : "2024-01-11 09:11:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A1 A3 1A D6 9C 50 07 DD   21 EB 71 E2 AF 11 28 07  .....P..!.q...(.
#           0010: 41 D8 07 0D                                        A...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 06 54 5D 9C 36 57 51   86 9A 8A DB DF EA 0E E9  ..T].6WQ........
#           0010: 2F 93 22 43                                        /."C
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 09:12:42.051 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:42.426 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:42.426 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:42.426 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:12:42.427 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:42.579 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.579 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:42.581 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 09:12:42.582 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.587 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.600 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 09:12:42.603 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F5 9C EC 23 24 17 75 BC 8D 39 BA CE 35 A5 28 E2 3C F7 52 82 B2 F5 CC 70 4D C3 E4 80 0F AD 21 3F",
#     "session id"          : "69 F3 6D B9 ED A8 F1 3F 16 69 B8 C6 23 F9 E3 5A DF 74 19 D8 C9 4D EE F5 12 E3 90 AA DD 30 86 A8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B1 7C 02 12 5F 6F BF 8F   81 F8 E9 04 08 E5 FC 15  ...._o..........
#               0010: 9A D0 48 7F 45 A9 66 76   8E 00 AA D8 A4 F7 9C 14  ..H.E.fv........
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.621 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4A 06 9E 1C DC BB 4E 59 5E 15 BE 8A 51 52 28 3D 0C 89 7E 3E D4 48 7C 8F 28 FC 01 63 A6 FD 3E F4",
#     "session id"          : "69 F3 6D B9 ED A8 F1 3F 16 69 B8 C6 23 F9 E3 5A DF 74 19 D8 C9 4D EE F5 12 E3 90 AA DD 30 86 A8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 04 E6 0A 64 11 3E 6E 4E   50 21 22 AA 83 96 58 19  ...d.>nNP!"...X.
#             0010: 92 18 1C 86 C7 B9 F4 DC   14 36 2E E2 34 6F 89 0C  .........6..4o..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.621 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.621 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.622 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.622 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.626 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.626 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:42.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:42.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.635 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.637 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.638 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.642 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.643 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:42.643 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:12:42.643 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 09:12:42.644 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

nection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 09:14:05.060 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:14:05.106 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:14:05.106 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:14:05.107 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 09:14:05.107 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33756/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28054ms
ok 65 stop command for single port in 30934ms
ok 66 status detects locally running solr in 14673ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2191ms
ok 69 copying files around in 6538ms
ok 70 upconfig in 2651ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 18s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m49s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5656 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5656/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36709/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 07:04:10.199; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 07:04:10.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 07:04:11.151; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 07:04:11.193; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22760ms
ok 61 start solr with client truststore and security manager in 24708ms
not ok 62 start solr with mTLS needed in 60124ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Pm4rS7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36709.
#
# Started Solr server on port 36709 (pid=200122). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36710.
#
# Started Solr server on port 36710 (pid=200574). Happy searching!
#
# INFO  - 2023-10-13 07:05:33.691; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 07:05:33.696; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 07:05:34.052; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 07:05:34.055; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 07:05:34.056; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:34.087 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 BE 04 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:09.000 UTC",
#     "not  after"         : "2024-01-11 07:05:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 D3 BA EB FE 6A 4B 95   02 F3 B0 46 6E 70 37 62  .....jK....Fnp7b
#         0010: B1 25 5D 44                                        .%]D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:34.091 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 16 30 A3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:01.000 UTC",
#     "not  after"         : "2024-01-11 07:05:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:34.105 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:34.332 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.332 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:34.334 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:34.334 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.339 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.351 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:34.353 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "49 83 06 47 B0 C7 AE 9D 70 BB 53 AF 66 81 59 43 B8 CE B4 2D D6 A1 70 91 B0 73 3A 2D 9B CA BE 3E",
#   "session id"          : "26 8F FE 2D DC 43 15 10 66 FA 6F A0 19 DF CD 0A B4 3E 78 4C 7C F7 D5 B9 95 59 06 EB DF 71 0C CA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CF 6B B1 F5 6C F3 4E 46   0A 8D 6B 19 88 13 66 07  .k..l.NF..k...f.
#             0010: E1 9D 1F BB 66 5F CE C3   16 6F AB 2F A0 71 98 53  ....f_...o./.q.S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.470 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DE C2 7A 91 12 B7 71 E3 E7 4B 59 D2 69 C1 2F 99 E4 E1 ED EB 23 13 DB A7 94 C0 97 A8 00 D3 DA 12",
#   "session id"          : "26 8F FE 2D DC 43 15 10 66 FA 6F A0 19 DF CD 0A B4 3E 78 4C 7C F7 D5 B9 95 59 06 EB DF 71 0C CA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DB F5 37 ED 0D 05 8F 24   C2 F5 01 A0 28 9D 75 46  ..7....$....(.uF
#           0010: D0 E6 59 73 B7 EB 06 7F   35 5C 13 73 B6 E0 42 59  ..Ys....5\.s..BY
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.471 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.471 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.472 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.473 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.475 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.476 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.476 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.478 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.485 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.487 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.488 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.492 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.492 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.492 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.492 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.492 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.495 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.495 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.495 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.495 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.496 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.497 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.497 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.500 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 0D 1C BD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:06.000 UTC",
#       "not  after"         : "2024-01-11 07:05:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 3C 08 F4 C2 64 21 8B   11 89 45 50 58 F8 08 CC  .<...d!...EPX...
#           0010: 15 03 CA 39                                        ...9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.500 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:34.550 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:34.550 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:34.550 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:34.551 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.579 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.582 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 13 FD A4 C9 D4 D7 7B   34 3D BF BD 39 C6 B8 09  ........4=..9...
#     0010: 82 90 2E 31 39 B9 3E AE   62 89 36 20 85 EE A2 F8  ...19.>.b.6 ....
#     0020: 4C CC 01 5E 81 A0 78 38   82 1C 61 D2 28 61 64 13  L..^..x8..a.(ad.
#     0030: 4B A0 11 F2 26 0A 35 BC   68 B3 12 DE 2F 2A CD 3D  K...&.5.h.../*.=
#     0040: 03 33 6E F6 94 9F D3 98   E1 55 7F 65 29 AB 8F B9  .3n......U.e)...
#     0050: 0E 7F 4C F0 5C 12 39 F5   BB C1 75 49 D4 41 83 55  ..L.\.9...uI.A.U
#     0060: 13 BE BE 99 0A B2 AC 73   F3 6E E4 B6 EF D9 48 E9  .......s.n....H.
#     0070: 0A 78 1D 0E 38 3F A1 9E   AD 0D 84 DE DA 3A 2C 2B  .x..8?.......:,+
#     0080: 93 37 F3 48 89 7D EE 41   58 CF CA 23 EE 00 D6 F3  .7.H...AX..#....
#     0090: C8 79 7B 77 C6 6C B2 6F   9F F3 FC 3A 61 FB C1 21  .y.w.l.o...:a..!
#     00A0: 91 92 58 9C CA 22 23 5A   A5 81 B5 6C 38 E2 AB 4A  ..X.."#Z...l8..J
#     00B0: 86 91 19 F3 6B FA 1F 8B   0A F6 C8 13 B8 1F 16 5F  ....k.........._
#     00C0: 03 7C F4 44 57 6E A6 34   7F 69 58 C3 BC 69 59 2F  ...DWn.4.iX..iY/
#     00D0: 5B A3 F6 08 5B 0D AC 82   19 34 6D 80 36 1A E1 DC  [...[....4m.6...
#     00E0: 03 4D B7 49 27 9E D3 2B   55 9C 8E CB 12 43 EF 7A  .M.I'..+U....C.z
#     00F0: 5E B8 8D 24 74 58 82 A7   6C 87 9E D0 D1 15 7A 38  ^..$tX..l.....z8
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.584 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F5 31 01 DE 02 FE C7 7D   C8 EE 3C 74 B0 0E 1E 80  .1........<t....
#     0010: A3 4F C9 6F 4B CF 03 16   76 E0 39 46 70 86 F0 CD  .O.oK...v.9Fp...
#     0020: A3 57 FC 04 96 8E 42 D2   B4 76 3C 01 B3 76 49 8E  .W....B..v<..vI.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.586 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:34.587 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:34.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:34.588 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:34.588 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.589 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.591 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 BE 04 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:09.000 UTC",
#       "not  after"         : "2024-01-11 07:05:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 D3 BA EB FE 6A 4B 95   02 F3 B0 46 6E 70 37 62  .....jK....Fnp7b
#           0010: B1 25 5D 44                                        .%]D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 35 BB EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:03.000 UTC",
#       "not  after"         : "2024-01-11 07:05:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#           0010: BD 40 71 FB                                        .@q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.618 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 70 3B F8 AA A7 2E 6F   4E CA C0 0A B3 9F AF ED  .p;....oN.......
#     0010: 04 0E 13 D1 01 0D C5 8F   AD 41 99 DE A3 90 F2 E8  .........A......
#     0020: 4B 43 85 09 F1 B7 7D 6E   3F 4E 37 B3 25 FC 5B 5D  KC.....n?N7.%.[]
#     0030: EE B2 CA F2 D8 F3 E7 B7   19 21 BC 8D 91 A4 69 76  .........!....iv
#     0040: EF 16 02 60 AA D7 AD D6   BB 90 15 51 1A B8 75 B0  ...`.......Q..u.
#     0050: 8B B8 88 ED 07 0F 1F 98   79 E9 FC 7A E3 71 3B 2F  ........y..z.q;/
#     0060: B2 09 18 51 0B 65 42 FA   F2 A2 A9 70 03 2C 80 10  ...Q.eB....p.,..
#     0070: C6 37 27 AB 62 DE 6A 5F   D7 7A AA 54 9B 7C D4 55  .7'.b.j_.z.T...U
#     0080: A1 C1 E5 8F 9F 07 F8 E6   FB 08 EE 21 08 07 B2 14  ...........!....
#     0090: 73 6A 7D A2 06 4F 21 1B   F7 43 CE 45 D1 46 8F CE  sj...O!..C.E.F..
#     00A0: 55 E6 92 E1 23 2F 1E B1   6B 2F C3 D5 80 09 58 E4  U...#/..k/....X.
#     00B0: 39 26 04 AA BC E4 C4 D2   31 71 F7 2E E5 ED EB FF  9&......1q......
#     00C0: CD 4B 9D 22 81 1C 5E 87   2E F4 71 2D DE 53 A6 D7  .K."..^...q-.S..
#     00D0: 41 BA 5E 86 EC 1C 13 AD   14 8D 66 03 13 B2 2C 92  A.^.......f...,.
#     00E0: D6 AA 1B 3E C1 9B 03 A0   E1 B2 97 7B 73 BC 83 07  ...>........s...
#     00F0: FE 6B C8 84 55 2B D2 2F   BB 4A F2 23 E4 D4 CE 34  .k..U+./.J.#...4
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.619 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 84 CC B0 91 8F 44 39 4A   4F 12 F6 C0 41 27 6B F3  .....D9JO...A'k.
#     0010: 9E 1D EA E4 12 59 CB 60   49 18 52 13 D2 68 58 7B  .....Y.`I.R..hX.
#     0020: 22 AC 52 4F 13 98 D9 AB   61 C6 B7 8A 64 62 75 7A  ".RO....a...dbuz
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.620 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:34.676 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C7 EC 94 BC 31 79 B9 43 42 C5 19 40 6B 6D 1C 93 67 F2 8E C9 7C C3 AE 00 C7 72 5F 2E A7 21 42 DD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 07:05:35.016 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 07:05:35.018 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 07:05:35.929; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 07:05:35.934; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 07:05:36.285; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 07:05:36.287; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 07:05:36.288; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Pm4rS7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:36.320 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 BE 04 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:09.000 UTC",
#     "not  after"         : "2024-01-11 07:05:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 D3 BA EB FE 6A 4B 95   02 F3 B0 46 6E 70 37 62  .....jK....Fnp7b
#         0010: B1 25 5D 44                                        .%]D
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:36.325 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 16 30 A3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:01.000 UTC",
#     "not  after"         : "2024-01-11 07:05:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:36.339 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:36.427 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:36.428 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:36.428 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:05:36.428 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:36.568 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.569 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:36.570 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:36.571 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.588 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.588 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.589 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:36.591 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0E 42 94 71 C4 62 8D AB 32 E8 0D 8B 23 45 DF 5D 6C D9 32 9D 2F 6D 46 DE BA 7F EA 88 E9 BB F8 CF",
#   "session id"          : "0A 7F 31 4F 45 57 FE AF 23 2F 20 8F A7 DE 4F 12 1E 7F 0C EC 51 6E 6A 3A F1 9F 93 7B D6 93 2F A3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 97 BF 1D 21 CE 5D D7 9C   7F FC 16 F7 A7 46 AF 8E  ...!.].......F..
#             0010: A6 66 4D 5C C2 DD 99 17   2D B6 84 C0 01 35 2E 75  .fM\....-....5.u
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.693 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "79 AA 06 A8 A7 85 C4 E7 02 4F 61 5E 4A 81 C1 E5 5E DC A2 09 C0 02 5F B2 2D C1 DB 75 88 28 15 27",
#   "session id"          : "0A 7F 31 4F 45 57 FE AF 23 2F 20 8F A7 DE 4F 12 1E 7F 0C EC 51 6E 6A 3A F1 9F 93 7B D6 93 2F A3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 99 89 27 10 EE 72 E5 DA   7A 7D 15 38 E3 80 4F A0  ..'..r..z..8..O.
#           0010: 6F 87 FD 41 A3 8A AB ED   D6 B6 16 0A 48 91 3E 5C  o..A........H.>\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.694 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.694 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.696 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.699 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.699 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.699 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.700 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.701 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.709 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.711 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.712 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.716 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.716 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.716 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.717 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.717 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.717 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.717 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.719 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.719 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.719 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.719 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.720 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.721 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.721 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.724 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 0D 1C BD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:06.000 UTC",
#       "not  after"         : "2024-01-11 07:05:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 3C 08 F4 C2 64 21 8B   11 89 45 50 58 F8 08 CC  .<...d!...EPX...
#           0010: 15 03 CA 39                                        ...9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.801 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 35 BB EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 07:05:03.000 UTC",
#     "not  after"         : "2024-01-11 07:05:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#         0010: BD 40 71 FB                                        .@q.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#         0010: BE 7C 2E 59                                        ...Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.804 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5B 17 D8 C1 AF 31 0B 15   33 CF B5 51 6C B5 91 70  [....1..3..Ql..p
#     0010: 20 4D B3 56 E8 07 31 75   65 3B CC 00 FC 7A BE DC   M.V..1ue;...z..
#     0020: 40 5A 6D 33 B4 9D 7C D1   6A BD 65 18 02 43 EB 67  @Zm3....j.e..C.g
#     0030: E2 14 C7 F4 50 AD 4D 10   AF F6 F4 AB 3B 29 60 30  ....P.M.....;)`0
#     0040: 29 5A 76 31 45 E2 89 A4   58 F7 19 BF C3 FF C0 51  )Zv1E...X......Q
#     0050: AF 4A 44 93 C7 B9 00 C1   0B CA 7D E4 27 53 1B 89  .JD.........'S..
#     0060: 20 A6 47 FA E9 64 46 15   A4 A5 AD 32 76 5C A6 C4   .G..dF....2v\..
#     0070: 3B 53 57 55 59 12 7B 28   ED AC 12 AC 4A 9A 20 05  ;SWUY..(....J. .
#     0080: 2F 20 23 31 88 C7 27 4C   01 6C D7 96 93 0A 6A DC  / #1..'L.l....j.
#     0090: 0E 40 72 D3 68 24 13 17   DC 89 82 4F 6B DF 45 0F  .@r.h$.....Ok.E.
#     00A0: 95 7C FC CB E9 2B AC 62   E9 73 DB 16 01 53 67 65  .....+.b.s...Sge
#     00B0: B7 A1 ED 78 85 7F BA C6   6E 31 47 51 DC EE A6 8F  ...x....n1GQ....
#     00C0: 56 04 5A 4C ED 61 BB 91   6B B9 3F 51 F1 D5 D2 7F  V.ZL.a..k.?Q....
#     00D0: 9B 47 3D 21 73 A5 72 44   38 14 37 F5 F2 44 C2 BC  .G=!s.rD8.7..D..
#     00E0: DD EC B5 DB 7F 7F 88 04   89 BB BC F4 22 BB AC 7F  ............"...
#     00F0: 14 E7 7A BC D1 F3 36 59   F8 50 86 B6 55 A2 61 6A  ..z...6Y.P..U.aj
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.806 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 72 36 DF C2 8D BF 2E   87 2D 95 A9 0A 1E 57 AC  0r6......-....W.
#     0010: A6 9E 81 18 7B D2 A4 51   74 BB 6F 7E 1D 8E E4 82  .......Qt.o.....
#     0020: 1D 00 DC 65 6C A2 1C AC   08 39 C5 79 03 89 5F 62  ...el....9.y.._b
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.808 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:36.809 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.809 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:36.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.810 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 07:05:36.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:36.811 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.811 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.813 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 BE 04 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:09.000 UTC",
#       "not  after"         : "2024-01-11 07:05:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 D3 BA EB FE 6A 4B 95   02 F3 B0 46 6E 70 37 62  .....jK....Fnp7b
#           0010: B1 25 5D 44                                        .%]D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 35 BB EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:03.000 UTC",
#       "not  after"         : "2024-01-11 07:05:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#           0010: BD 40 71 FB                                        .@q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.840 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 FA E2 AE CF 97 36 20   A4 03 01 21 7C 6D A8 00  (.....6 ...!.m..
#     0010: 6E 6E FA 03 51 31 FF 82   91 11 65 B3 31 D9 50 3E  nn..Q1....e.1.P>
#     0020: 04 F3 B9 B5 30 87 9C 6B   2D 0D 5C 5B 49 13 57 10  ....0..k-.\[I.W.
#     0030: B0 B9 9E 7D 84 2B E5 7A   1E 2E 42 39 2A F7 6E 02  .....+.z..B9*.n.
#     0040: 7D 0E 6C 10 AB 8B CA 04   53 FE 90 B7 C0 02 6C 85  ..l.....S.....l.
#     0050: A7 F4 3B D2 0D 0B E9 F6   13 6D 7B 12 66 02 A8 6F  ..;......m..f..o
#     0060: 02 D2 B3 15 D5 1C FD 1F   43 5D D6 DE BB 50 9D 5A  ........C]...P.Z
#     0070: BE A2 1F 85 F0 E3 13 D6   61 88 8B 26 6D BD 7A 99  ........a..&m.z.
#     0080: 64 3D 9C 71 0E 8D EF 9E   18 0C 28 6E DB 47 66 6C  d=.q......(n.Gfl
#     0090: 53 E6 CC A9 75 B3 F4 FC   8B 9C F0 23 4E 80 48 D7  S...u......#N.H.
#     00A0: A4 F2 A4 40 C1 2B 66 64   79 D9 43 36 73 EE C1 EC  ...@.+fdy.C6s...
#     00B0: DD 9E BA 64 E7 C0 69 3A   1C 1E 96 18 F9 9F 9B E1  ...d..i:........
#     00C0: 70 BE 97 46 92 D5 E9 2A   AF 99 97 4A FB F0 56 B5  p..F...*...J..V.
#     00D0: 70 B8 99 29 E2 1A A3 22   B0 E0 25 4C E9 C9 42 52  p..)..."..%L..BR
#     00E0: A8 00 B6 FD 6F 33 82 6C   26 0D FD BD 5A C2 B5 A1  ....o3.l&...Z...
#     00F0: D4 AC C9 47 B0 13 35 F6   E8 56 1D 63 55 6F BA E1  ...G..5..V.cUo..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.841 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B D0 05 22 1D 2B 0E 7C   EB D5 DB C3 55 75 B9 3F  +..".+......Uu.?
#     0010: 07 70 55 49 D7 40 61 62   0E 77 FB 44 A8 A0 5B 29  .pUI.@ab.w.D..[)
#     0020: DB 43 0E 8A 77 60 47 04   CC 56 96 86 B9 5A 3A 64  .C..w`G..V...Z:d
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.841 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:36.897 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 95 7D 51 5E 09 FA 23 2E 81 99 E4 FA 39 46 9E B5 BB 2F 4E B7 81 19 AC 67 71 75 96 C6 65 56 A5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 07:05:37.178 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 07:05:37.179 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 07:05:47.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:48.249 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 35 BB EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:03.000 UTC",
#       "not  after"         : "2024-01-11 07:05:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#           0010: BD 40 71 FB                                        .@q.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 C3 1A A1 71 F9 2E F9   A4 D8 49 38 3C 25 24 B6  ....q.....I8<%$.
#           0010: BE 7C 2E 59                                        ...Y
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 16 30 A3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 07:05:01.000 UTC",
#       "not  after"         : "2024-01-11 07:05:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 21 BD 9B 68 02 93 B2   43 89 FF 0F 11 A5 81 5C  .!..h...C......\
#           0010: BD 40 71 FB                                        .@q.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 07:05:48.267 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:48.533 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.533 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:48.535 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 07:05:48.535 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.554 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 07:05:48.557 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F C1 EA 6E CA D4 A1 80 15 97 CA 13 B8 AA 16 2B 19 37 7C 97 B0 09 BE D8 21 1C 64 A3 14 12 0F FE",
#     "session id"          : "B8 6D 1B 11 1E 3F FB DE 4B 2D 6C 90 B2 8C 2D AF BB 3C 85 8A A1 39 01 67 2D 44 54 65 C8 2E D8 66",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 83 FB F8 C7 D1 B9 36 10   AD 37 E1 B4 DD 5F 94 6F  ......6..7..._.o
#               0010: 56 B0 59 2E 6B 01 A7 A4   A1 1B DC BA DB E6 95 48  V.Y.k..........H
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.583 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CF 16 51 7B C5 EF 8D 41 2A E5 C4 84 1E D7 11 ED 7A 13 48 8A EB 0E C4 38 96 06 CB 3A D0 A9 37 7C",
#     "session id"          : "B8 6D 1B 11 1E 3F FB DE 4B 2D 6C 90 B2 8C 2D AF BB 3C 85 8A A1 39 01 67 2D 44 54 65 C8 2E D8 66",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A C9 85 9E C3 B8 81 AB   F7 8C 5E 95 EC 73 4E 0D  Z.........^..sN.
#             0010: 01 63 F5 88 77 1E BB EE   08 8D E9 7C 88 EF 26 25  .c..w.........&%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.584 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.584 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.585 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.586 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.589 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.589 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.589 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:48.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:48.591 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.591 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.599 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.601 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.602 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.606 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:05:48.607 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 07:05:48.609 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae

[...truncated too long message...]

ction$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 07:07:11.390 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:07:11.444 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:07:11.448 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:07:11.449 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 07:07:11.449 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36710/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28036ms
ok 65 stop command for single port in 30971ms
ok 66 status detects locally running solr in 14623ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2166ms
ok 69 copying files around in 6527ms
ok 70 upconfig in 2626ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1217ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 24s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m57.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5655 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5655/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45761/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 03:59:12.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 03:59:12.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 03:59:12.924; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 03:59:12.965; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22646ms
ok 61 start solr with client truststore and security manager in 24828ms
not ok 62 start solr with mTLS needed in 56124ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fAyZh9/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45761.
#
# Started Solr server on port 45761 (pid=198887). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45762.
#
# Started Solr server on port 45762 (pid=199340). Happy searching!
#
# INFO  - 2023-10-13 04:00:35.295; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:00:35.300; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 04:00:35.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:00:35.661; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:00:35.662; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:35.693 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 F6 68 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:11.000 UTC",
#     "not  after"         : "2024-01-11 04:00:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 12 6D A4 D9 ED 43 61   20 14 BA 61 01 90 78 FF  ..m...Ca ..a..x.
#         0010: F9 DB 9E C1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:35.697 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 8A 02 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:03.000 UTC",
#     "not  after"         : "2024-01-11 04:00:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:35.712 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:35.799 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:35.803 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:35.803 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:35.803 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:35.941 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.941 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:35.943 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:35.943 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.960 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:35.962 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1D 67 DF 25 60 91 F6 7C 35 BF 69 05 4A D1 EB C2 34 BD 19 1E F9 0A AE 2F 72 3C B7 33 31 45 B0 3F",
#   "session id"          : "95 54 B3 A2 50 18 BA DB E4 A3 B2 87 D3 7E 08 E2 4A BF F7 17 56 5D 7F EF 38 8D 65 21 2B 46 C5 50",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 99 27 CF BC D0 8A D1 EF   BC A3 91 EE 75 D5 AB 12  .'..........u...
#             0010: DA 66 D4 34 3E 15 47 7D   40 E1 4C 6E 30 34 79 00  .f.4>.G.@.Ln04y.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.066 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5B 7F 66 FF AA 49 2F B5 11 8C F1 93 01 E6 7B 21 77 17 DC C3 82 AB 85 89 4E 76 84 9B 94 B6 43 41",
#   "session id"          : "95 54 B3 A2 50 18 BA DB E4 A3 B2 87 D3 7E 08 E2 4A BF F7 17 56 5D 7F EF 38 8D 65 21 2B 46 C5 50",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1B A4 5A 36 A4 BE CE 34   01 03 98 6A 23 EA 30 4B  ..Z6...4...j#.0K
#           0010: 2B 37 DF FD B9 0B 66 41   A7 0E B6 36 27 EA 66 17  +7....fA...6'.f.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.066 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.068 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.070 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.071 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.079 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.081 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.082 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.085 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.085 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.088 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.088 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.088 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.089 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.089 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.090 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.093 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 45 10 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:07.000 UTC",
#       "not  after"         : "2024-01-11 04:00:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 69 1B 29 3C B4 E1 D6   D8 AC 89 DC 01 AF F4 28  .i.)<..........(
#           0010: 5D 49 E8 96                                        ]I..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.093 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.169 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.173 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 08 6A 5F 9F B2 4E 67 67   EC 2F 7A B3 7B 75 C8 1C  .j_..Ngg./z..u..
#     0010: 09 B9 88 70 B2 97 4F 6C   42 CF 2E 6F 16 87 90 89  ...p..OlB..o....
#     0020: 8C F6 D9 22 ED 25 1B AA   EB A3 DD 83 44 86 D0 DE  ...".%......D...
#     0030: AA D1 7F 02 B2 96 F1 B3   CD 02 53 39 FC D2 27 F6  ..........S9..'.
#     0040: 87 C0 9B 4D D3 C7 0F 6C   F5 22 2E 61 3A FC A0 24  ...M...l.".a:..$
#     0050: A3 98 7E 5C 5A 24 4B FA   77 6E C3 50 96 DB 58 5B  ...\Z$K.wn.P..X[
#     0060: 23 18 F3 C9 85 FF A6 AA   1C 51 B9 7E 71 E4 21 07  #........Q..q.!.
#     0070: F8 AA 28 28 4B 89 8A D5   00 EF BA 63 88 A3 F2 4B  ..((K......c...K
#     0080: 16 EB DB AB 79 E3 B5 08   3E 25 D4 DA B6 1E C6 36  ....y...>%.....6
#     0090: 59 16 29 E0 A2 1D 65 D2   74 18 FB F7 A9 16 53 5B  Y.)...e.t.....S[
#     00A0: BE 50 F7 E3 05 E6 00 F8   F1 ED 07 68 2B 2F BD 0C  .P.........h+/..
#     00B0: 62 2A 3E 92 1A E7 66 9F   18 C3 13 DD 78 CC 31 60  b*>...f.....x.1`
#     00C0: 13 8F 4D D4 9A CC DE 93   63 F2 B5 DF A6 AF 65 DC  ..M.....c.....e.
#     00D0: 21 46 FF DB 3F 66 C1 BA   4C 17 87 E0 A3 44 42 0B  !F..?f..L....DB.
#     00E0: EC DC 0C 8C 90 CE 19 F9   81 09 F6 A7 51 F5 7F DC  ............Q...
#     00F0: 95 83 23 BB 0A A8 8B C9   44 92 0F B8 83 C4 4C 1A  ..#.....D.....L.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.175 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E1 BD 4E E2 A3 9D 6F C4   C8 A6 F0 47 95 C8 18 E7  ..N...o....G....
#     0010: FD 10 95 3E 3E 9B 7C 1D   7D 4F 99 8D C5 A6 76 40  ...>>....O....v@
#     0020: 6A BF A3 FB 48 C1 FA 27   CC EC B2 66 54 2A 7D 08  j...H..'...fT*..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.177 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:36.178 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.178 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:36.178 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.179 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:36.179 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:36.179 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.179 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.182 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 F6 68 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:11.000 UTC",
#       "not  after"         : "2024-01-11 04:00:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 12 6D A4 D9 ED 43 61   20 14 BA 61 01 90 78 FF  ..m...Ca ..a..x.
#           0010: F9 DB 9E C1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 4D 66 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:05.000 UTC",
#       "not  after"         : "2024-01-11 04:00:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#           0010: 5E A7 62 5E                                        ^.b^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.208 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 27 96 B9 37 88 52 3F   F5 8F 62 8E 83 A6 0A 0A  5'..7.R?..b.....
#     0010: DF 90 F0 AC F8 1A C8 50   41 D0 52 3C E1 79 20 60  .......PA.R<.y `
#     0020: C5 93 CA E2 70 84 B8 21   5E CC D8 7A 69 CC F1 49  ....p..!^..zi..I
#     0030: 3E A2 33 CA B6 73 07 84   4F D4 F9 61 8C 4F F7 64  >.3..s..O..a.O.d
#     0040: 0D C0 B7 3D F1 97 73 00   DA 02 55 CA 9A 0E 4E E2  ...=..s...U...N.
#     0050: 46 C0 4A 01 C6 CD 62 36   8D 18 12 CF 6A 97 F7 FF  F.J...b6....j...
#     0060: 61 E1 4C 45 FC EA 8E D2   3B 98 3D 39 AE 47 C0 DF  a.LE....;.=9.G..
#     0070: 83 87 9B EA A5 34 3C 45   B9 54 1E E0 D8 DF 04 6D  .....4<E.T.....m
#     0080: 12 ED A5 04 32 4A C2 D1   E8 43 C2 7D 92 82 68 71  ....2J...C....hq
#     0090: D0 3C 6D CA BD C5 9A FA   A3 CE 46 5F 85 FD C4 83  .<m.......F_....
#     00A0: 26 E7 7C BC A3 D9 70 DF   3C 32 0E 2B 5A 92 E6 CA  &.....p.<2.+Z...
#     00B0: C5 11 98 45 88 DE 8C EF   25 71 F6 72 9A 56 AB A3  ...E....%q.r.V..
#     00C0: 07 CB C8 BA 4D 0D 3E 18   1C B9 14 BD A4 EC EA 94  ....M.>.........
#     00D0: 9C D0 F5 5E 1B 58 1B 73   BE CC 2D 3F E8 75 86 E9  ...^.X.s..-?.u..
#     00E0: 18 15 2A 05 B0 A9 E9 EA   31 B1 C6 C8 BB 4A 9F 2C  ..*.....1....J.,
#     00F0: A8 5F F1 BC E9 41 56 EF   02 1A CC 11 21 A0 5A 09  ._...AV.....!.Z.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.209 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F 87 DF 98 4B 09 00 22   FF 4F 0B EC 16 F9 6A E8  ....K..".O....j.
#     0010: 88 D9 A4 E7 BF C3 C1 4E   0E 3F CF D6 44 8D 85 C9  .......N.?..D...
#     0020: 68 0A 7B 41 D7 06 78 41   04 AE 57 E8 7E FC FC 89  h..A..xA..W.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.209 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:36.263 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 E5 8B BC D8 9A 36 57 92 5B 92 13 EC 0C 12 28 B6 FD CB 47 D6 BE 4C F8 B4 09 8E DB F8 94 4A 49",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 04:00:36.541 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 04:00:36.542 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 04:00:37.466; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:00:37.472; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 04:00:37.846; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:00:37.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:00:37.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fAyZh9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:37.882 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 F6 68 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:11.000 UTC",
#     "not  after"         : "2024-01-11 04:00:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BA 12 6D A4 D9 ED 43 61   20 14 BA 61 01 90 78 FF  ..m...Ca ..a..x.
#         0010: F9 DB 9E C1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:37.887 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 8A 02 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:03.000 UTC",
#     "not  after"         : "2024-01-11 04:00:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:37.903 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:38.001 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:38.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:38.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:00:38.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:38.134 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:38.137 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:38.137 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.143 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.154 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.154 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.154 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:38.157 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D1 A5 A7 CD D6 6D 66 75 F3 C4 E1 1B AE 60 E5 D2 85 6F D0 2D 15 C3 D2 EB 6E EC 5E F3 1C 9F F1 90",
#   "session id"          : "5F FC 2C A8 C8 88 8A 5A 77 C5 C6 5C A9 55 D7 42 B2 FD EF 7F 96 E7 53 A3 45 CD 13 34 46 17 B0 FD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F3 B7 42 52 C6 A6 50 84   91 D7 85 F3 0C 6B 93 A3  ..BR..P......k..
#             0010: 1D ED 0D 83 22 39 7D 1F   7C 94 4E 96 BF 29 3D 67  ...."9....N..)=g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.248 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "46 42 56 04 11 53 B4 F7 61 DA 34 C9 8C 85 45 12 50 D8 B2 18 9B 55 92 99 C3 93 FB 93 C6 8A E3 E9",
#   "session id"          : "5F FC 2C A8 C8 88 8A 5A 77 C5 C6 5C A9 55 D7 42 B2 FD EF 7F 96 E7 53 A3 45 CD 13 34 46 17 B0 FD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 19 CB 5B E9 BA 62 F6 9D   EB 22 79 35 05 7C B3 5E  ..[..b..."y5...^
#           0010: 72 02 90 3C 90 DF 4B EE   96 9F 3E A4 F0 81 B6 1F  r..<..K...>.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.248 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.249 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.249 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.251 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.253 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.253 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.263 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.264 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.265 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.269 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.269 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.269 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.270 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.272 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.273 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.273 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.274 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.277 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 45 10 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:07.000 UTC",
#       "not  after"         : "2024-01-11 04:00:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 69 1B 29 3C B4 E1 D6   D8 AC 89 DC 01 AF F4 28  .i.)<..........(
#           0010: 5D 49 E8 96                                        ]I..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.277 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.356 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 4D 66 42",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:00:05.000 UTC",
#     "not  after"         : "2024-01-11 04:00:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#         0010: 5E A7 62 5E                                        ^.b^
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#         0010: 48 DF 3D 97                                        H.=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.360 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 62 94 35 C2 69 F7 46   CE EC 8E 06 D6 F1 F2 31  nb.5.i.F.......1
#     0010: 28 26 89 7C 41 0C B4 5F   30 0D B4 64 92 52 81 1D  (&..A.._0..d.R..
#     0020: 8A 43 16 94 1D E6 1D A7   3D 3E E7 7C F9 95 16 E2  .C......=>......
#     0030: 33 88 A3 83 71 72 6E 8D   34 05 3B 14 31 0D 02 42  3...qrn.4.;.1..B
#     0040: 32 7E 95 AD EC 89 62 33   86 5B 43 45 20 3A 02 76  2.....b3.[CE :.v
#     0050: E2 61 7E F5 FE 5E BF 61   0C F6 12 FD C8 63 45 9B  .a...^.a.....cE.
#     0060: 46 AF A5 BE E4 76 3B BA   8C 4C 1A B2 45 95 21 E7  F....v;..L..E.!.
#     0070: B2 CB 37 86 77 60 4C E2   B0 9F A4 62 AE 7B 14 D6  ..7.w`L....b....
#     0080: 50 A5 04 DB 30 CA B9 32   D8 4E A1 27 6E B6 6E 83  P...0..2.N.'n.n.
#     0090: BD 43 65 11 89 DF 46 77   45 C2 72 D1 31 C1 AF 4C  .Ce...FwE.r.1..L
#     00A0: 31 48 4F 26 87 16 46 0B   5B 50 8D B0 F4 41 9E 09  1HO&..F.[P...A..
#     00B0: 3C 61 80 C8 35 E9 AF 90   27 76 F8 08 E0 32 74 CE  <a..5...'v...2t.
#     00C0: 45 26 C7 E7 F8 F6 F0 6D   18 84 09 0F 9D 51 21 71  E&.....m.....Q!q
#     00D0: 60 F7 5C 35 04 37 A5 80   B9 97 7E 46 A3 22 E1 F4  `.\5.7.....F."..
#     00E0: 13 04 F4 D6 0A 61 E4 36   47 4F D8 0F FE C9 8A B2  .....a.6GO......
#     00F0: 2E F1 84 8C 40 8F 09 D9   B3 AD B5 A7 C3 7D BA 42  ....@..........B
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.361 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 38 1A F7 BB EE 9D 12 97   4A 76 CF 3B A9 4D 57 74  8.......Jv.;.MWt
#     0010: 0A 74 AA 38 E3 20 0D C9   D8 B5 40 C0 77 A4 2E D7  .t.8. ....@.w...
#     0020: 4A A3 71 F9 52 62 BA 2A   F4 9B F0 68 64 83 1A 3C  J.q.Rb.*...hd..<
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.364 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:38.364 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.365 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:38.365 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.365 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 04:00:38.365 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:38.365 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.366 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.368 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 F6 68 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:11.000 UTC",
#       "not  after"         : "2024-01-11 04:00:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 12 6D A4 D9 ED 43 61   20 14 BA 61 01 90 78 FF  ..m...Ca ..a..x.
#           0010: F9 DB 9E C1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 4D 66 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:05.000 UTC",
#       "not  after"         : "2024-01-11 04:00:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#           0010: 5E A7 62 5E                                        ^.b^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.394 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 E4 84 EA 3D 59 51 AB   13 70 82 10 44 6E 20 1A  q...=YQ..p..Dn .
#     0010: 83 E8 8B C2 25 11 91 5A   51 59 C2 04 FE 73 10 F1  ....%..ZQY...s..
#     0020: 34 B9 D7 48 7C 3B 16 EA   C1 C5 E1 18 99 0D A0 FA  4..H.;..........
#     0030: 9C 23 79 4B 3A CD D2 F2   2B 63 EA C7 9E F3 19 59  .#yK:...+c.....Y
#     0040: 64 5F E4 88 E7 D4 E7 D0   D2 22 D2 FC 72 2D 29 3C  d_......."..r-)<
#     0050: 72 24 96 6A 2F 0B A3 BE   AC E3 2A D5 57 E9 3E BC  r$.j/.....*.W.>.
#     0060: AB 0F 78 D7 42 0B 18 A3   BF 94 50 5E 98 3C 8A 8F  ..x.B.....P^.<..
#     0070: 3B 2B DC AA F2 02 B9 9C   6A F8 28 35 70 74 42 73  ;+......j.(5ptBs
#     0080: EA 27 86 92 B6 25 B3 F5   6E 99 DF 33 DA A6 16 E6  .'...%..n..3....
#     0090: D3 98 C4 A5 83 91 B7 E9   AE F1 95 5F BD 07 8D B4  ..........._....
#     00A0: 58 50 6A F5 19 D1 A4 F8   96 DD 5E E0 0A 33 63 6C  XPj.......^..3cl
#     00B0: AA 7F B1 68 07 10 1A A3   DC E4 31 AE 48 91 47 ED  ...h......1.H.G.
#     00C0: C0 AA B9 B5 E3 90 5F EB   CC F4 79 C4 B1 DB C1 94  ......_...y.....
#     00D0: BC B3 3B B0 94 22 44 BC   D5 DC EE 97 C0 B5 A0 C2  ..;.."D.........
#     00E0: B1 94 0B 50 0E DF 88 1A   6E 48 8F D4 CA 78 C0 65  ...P....nH...x.e
#     00F0: 74 0E AD 13 0D 00 75 8F   65 20 5A 58 3C 31 15 B5  t.....u.e ZX<1..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.395 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 6E F2 D8 F8 77 51 A7   06 9E B0 55 8B F2 09 03  .n...wQ....U....
#     0010: EF F4 88 42 EC 64 80 22   65 5E C8 56 4A A4 24 4A  ...B.d."e^.VJ.$J
#     0020: BB 9B 50 48 5B 60 22 1D   FA 88 B8 87 20 22 99 EA  ..PH[`"..... "..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.396 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:38.450 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 0E 15 6F 3E 1C 14 DA F5 49 E7 0F 40 70 BD 74 BB 22 FF F3 6A 34 31 E8 A8 EE 07 69 1E EF 1A D1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 04:00:38.716 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 04:00:38.716 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 04:00:49.801; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:50.145 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 4D 66 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:05.000 UTC",
#       "not  after"         : "2024-01-11 04:00:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#           0010: 5E A7 62 5E                                        ^.b^
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 1C 9A 6B B7 B7 3C 62   58 75 ED B5 7E 3D 13 48  ...k..<bXu...=.H
#           0010: 48 DF 3D 97                                        H.=.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 8A 02 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:00:03.000 UTC",
#       "not  after"         : "2024-01-11 04:00:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 BF 42 F3 5C 72 B1 47   37 7A 1C 54 08 C2 2B 13  ..B.\r.G7z.T..+.
#           0010: 5E A7 62 5E                                        ^.b^
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 04:00:50.164 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:50.419 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:50.421 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 04:00:50.421 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.428 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.440 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.440 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.440 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 04:00:50.444 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "FE C5 A4 28 96 FC 13 B5 C9 E0 4E BF AA B5 B3 91 D7 9F 09 A1 E5 18 F3 C8 75 D7 35 B1 FE 08 BE E9",
#     "session id"          : "87 5A 9E 6F 28 19 A7 3D 35 CE 83 11 B3 60 55 82 4B 4A 6F AC DF 94 1B 86 EA BF F9 73 1E 37 BD 12",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5E 19 2C 31 A9 EE 5C FF   FD E8 52 66 C4 42 FF 76  ^.,1..\...Rf.B.v
#               0010: B5 00 07 D3 2A B0 4D 44   75 0D 63 EF 83 2C E6 3B  ....*.MDu.c..,.;
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.464 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B6 43 7E 4C E3 C1 49 AE 37 4C B6 82 4F 35 C9 DE ED 87 A1 0B FD EB 4B F3 4C 86 BB F6 9B 62 4F A1",
#     "session id"          : "87 5A 9E 6F 28 19 A7 3D 35 CE 83 11 B3 60 55 82 4B 4A 6F AC DF 94 1B 86 EA BF F9 73 1E 37 BD 12",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 BD 1A 27 05 6C 1E 17   A9 B3 53 C9 BC 7D 39 B4  ...'.l....S...9.
#             0010: A5 47 1F 4F 0E 73 85 AE   BB 0F C5 F5 9B AF F5 6F  .G.O.s.........o
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.464 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.464 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.467 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.469 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.469 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.470 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:50.471 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:50.472 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.480 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.482 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.483 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.488 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:50.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:00:50.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 04:00:50.491 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsa

[...truncated too long message...]

ction$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 04:02:09.559 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:02:09.598 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:02:09.599 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:02:09.599 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:02:09.599 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45762/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28120ms
ok 65 stop command for single port in 31051ms
ok 66 status detects locally running solr in 14378ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6555ms
ok 70 upconfig in 2659ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 23m 28s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m56.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5654 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5654/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44941/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-13 00:43:27.431; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 00:43:27.437; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-13 00:43:28.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 00:43:28.380; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23246ms
ok 61 start solr with client truststore and security manager in 25402ms
not ok 62 start solr with mTLS needed in 59611ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eQdmPt/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44941.
#
# Started Solr server on port 44941 (pid=200756). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44942.
#
# Started Solr server on port 44942 (pid=201210). Happy searching!
#
# INFO  - 2023-10-13 00:44:52.190; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 00:44:52.195; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 00:44:52.592; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 00:44:52.596; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 00:44:52.596; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:52.630 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 AC 96 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:28.000 UTC",
#     "not  after"         : "2024-01-11 24:44:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 E3 CA 3B CE 58 4D 29   E9 43 CA 34 E9 63 48 91  ...;.XM).C.4.cH.
#         0010: 41 7D 3C 7F                                        A.<.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:52.635 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 18 09 24",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:20.000 UTC",
#     "not  after"         : "2024-01-11 24:44:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:52.650 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:52.997 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:52.999 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:52.999 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:52.999 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:53.171 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:53.173 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:53.173 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.192 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:53.195 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7C F9 D0 9F F0 FF 58 A6 68 9D F5 8C 79 38 05 7F 12 6E 17 E8 A1 B1 56 87 51 DA 31 13 F8 A9 C5 CA",
#   "session id"          : "EE 3A CA E8 66 22 24 D5 C3 5E EA 32 E4 2E 7F 21 54 1B 46 76 67 73 E1 B8 3E FD E5 79 21 ED 82 86",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 72 A2 2A 4E 9E B3 A4 25   2D 81 05 0D 42 A6 99 E2  r.*N...%-...B...
#             0010: D5 79 9E 87 D3 D6 94 94   2C 5A F4 65 49 76 F0 34  .y......,Z.eIv.4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.307 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0F 34 7F BE 46 70 DE A1 33 08 17 E1 8C B5 99 D9 E0 45 2A CD 83 FD 5F 76 5E 4D 4C EC E8 C9 AD B6",
#   "session id"          : "EE 3A CA E8 66 22 24 D5 C3 5E EA 32 E4 2E 7F 21 54 1B 46 76 67 73 E1 B8 3E FD E5 79 21 ED 82 86",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8B 8D 8B F0 79 46 7C D3   75 B2 0A 3D F4 BB 62 20  ....yF..u..=..b
#           0010: 07 9A 00 03 68 55 2B 91   49 8F EE E9 AD 96 68 38  ....hU+.I.....h8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.307 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.307 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.309 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.310 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.312 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.312 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.312 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.313 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.321 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.322 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.324 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.327 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.327 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.328 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.330 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.330 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.331 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.332 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.335 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 D0 68 49",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:24.000 UTC",
#       "not  after"         : "2024-01-11 24:44:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD F6 65 0E CB 32 E6 94   FC FD 65 EE 5B 66 81 57  ..e..2....e.[f.W
#           0010: 3C 06 EA DF                                        <...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.336 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.416 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.420 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: CF 07 B2 03 A9 2F B9 B2   56 A4 28 CA 84 0B 7C 9D  ...../..V.(.....
#     0010: C3 AD A6 C2 7B 57 AA 65   52 43 DD C2 31 84 F6 BD  .....W.eRC..1...
#     0020: 44 DD 86 DC 58 AD 19 8F   82 7B A1 A7 5B 63 0D 34  D...X.......[c.4
#     0030: FA A0 3B 92 F5 08 05 7B   F9 5C F7 E3 F2 2A 6F EA  ..;......\...*o.
#     0040: 5E 08 2D E3 8F AF B0 89   DF D7 F8 92 85 AE 91 FE  ^.-.............
#     0050: 1E F0 05 79 98 9E D1 7D   61 B2 E0 26 39 D9 62 A0  ...y....a..&9.b.
#     0060: 4F 5F A5 5F CA E8 18 7E   80 37 FE 39 16 48 EE DB  O_._.....7.9.H..
#     0070: 26 EE 66 B1 38 94 E5 77   CC 6A 7B 00 1C 42 10 21  &.f.8..w.j...B.!
#     0080: C2 28 1A DD 79 4F 2E 42   D9 17 0D A0 03 28 2D D7  .(..yO.B.....(-.
#     0090: 01 98 68 27 D0 CA BA 3A   88 60 11 E0 C5 D6 F9 70  ..h'...:.`.....p
#     00A0: 8C EE 65 2C 42 9A BF C5   D6 46 84 D6 2A 4E A0 01  ..e,B....F..*N..
#     00B0: BF 68 32 66 D4 B5 75 2E   A0 58 22 AD 12 7C 2E 29  .h2f..u..X"....)
#     00C0: F1 D5 87 72 48 DE F4 C2   F8 90 18 25 AF 25 49 C1  ...rH......%.%I.
#     00D0: 53 13 7C 89 29 00 A8 DC   DA A4 EF 41 D6 6C F6 A1  S...)......A.l..
#     00E0: 08 3C 78 09 E7 56 78 8B   DA 06 EC DB 3A D8 24 A3  .<x..Vx.....:.$.
#     00F0: 08 ED 48 2F 12 DB C0 09   FB 1B F4 10 EA F1 B0 AA  ..H/............
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.421 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 6A 99 AD A5 73 E0 9D   C0 FD 88 04 C1 DF E9 D3  Cj...s..........
#     0010: 4F 14 72 F9 C2 BC 4C A2   1A E6 A6 17 DB 47 1A 19  O.r...L......G..
#     0020: B2 43 DF 38 15 7E 4C 30   5C CC 6F DC 65 BE 03 71  .C.8..L0\.o.e..q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.424 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:53.425 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.425 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:53.426 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.426 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:53.426 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:53.426 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.426 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.429 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 AC 96 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:28.000 UTC",
#       "not  after"         : "2024-01-11 24:44:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 E3 CA 3B CE 58 4D 29   E9 43 CA 34 E9 63 48 91  ...;.XM).C.4.cH.
#           0010: 41 7D 3C 7F                                        A.<.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 36 B1 DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:22.000 UTC",
#       "not  after"         : "2024-01-11 24:44:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#           0010: 44 8D 21 04                                        D.!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.455 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 DC 7F 12 BE B5 9B 19   17 5A BE C6 B5 D9 CC E8  .........Z......
#     0010: 9F DE FF F2 1C 94 26 B7   34 A9 7A 28 2D 2A 92 6B  ......&.4.z(-*.k
#     0020: E5 96 39 A8 9E BE C8 9E   44 B0 B3 23 96 71 93 44  ..9.....D..#.q.D
#     0030: 08 34 B7 1C 70 E9 2E C5   02 09 4E FC 5A 65 17 28  .4..p.....N.Ze.(
#     0040: 5F 2B C2 B3 49 75 5A BE   20 00 44 BA 6D B0 72 81  _+..IuZ. .D.m.r.
#     0050: 35 90 95 65 87 66 F1 F5   7E 95 64 EC 01 BC 74 76  5..e.f....d...tv
#     0060: E8 4E D6 CD 63 35 9A 48   26 64 8B 75 24 70 7B 96  .N..c5.H&d.u$p..
#     0070: 74 87 27 04 FC A3 F4 33   41 C3 6E E9 27 08 40 8B  t.'....3A.n.'.@.
#     0080: DB 39 70 28 5F 99 06 5B   4A 32 30 F4 C6 62 EA 1A  .9p(_..[J20..b..
#     0090: B2 47 F3 18 38 ED EC C8   9A 2B 0A 35 0A 1A A8 6D  .G..8....+.5...m
#     00A0: 5F E4 10 EA F0 44 00 9B   EB E9 42 2F 6A E3 20 1D  _....D....B/j. .
#     00B0: 14 9A 2E B6 7F A2 9F 57   D3 17 4D CA F4 7B 31 83  .......W..M...1.
#     00C0: 5D 44 54 AC 02 F2 79 D9   72 23 8A C6 25 3A 12 3E  ]DT...y.r#..%:.>
#     00D0: 37 09 02 0F 72 05 50 CB   77 DE 58 4D A9 BC 6C F1  7...r.P.w.XM..l.
#     00E0: E1 0B 5E C4 10 65 72 76   70 33 84 31 F7 D7 30 2E  ..^..ervp3.1..0.
#     00F0: 23 E2 E0 83 CB 98 BF 19   A8 D1 A4 06 0F 14 F1 1D  #...............
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.456 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 2D EE 4E 94 06 A8 2E   3E 7D 42 D4 95 90 DA B3  .-.N....>.B.....
#     0010: C3 FD 31 89 3A A9 F6 89   5D E3 A5 1F 07 11 47 42  ..1.:...].....GB
#     0020: A2 E8 52 24 5A 8E 5D 10   26 DD 45 BB 35 AF 05 BE  ..R$Z.].&.E.5...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.457 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:53.519 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 FB 40 27 A4 EA F9 4C E5 DC B6 D0 86 5E 97 0D B3 15 28 EF 68 47 0D 70 61 7E 32 00 4F 65 79 FB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 24:44:53.806 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 24:44:53.807 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 00:44:54.730; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 00:44:54.736; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 00:44:55.108; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 00:44:55.111; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 00:44:55.112; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eQdmPt/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:55.143 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 AC 96 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:28.000 UTC",
#     "not  after"         : "2024-01-11 24:44:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 E3 CA 3B CE 58 4D 29   E9 43 CA 34 E9 63 48 91  ...;.XM).C.4.cH.
#         0010: 41 7D 3C 7F                                        A.<.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:55.148 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 18 09 24",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:20.000 UTC",
#     "not  after"         : "2024-01-11 24:44:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 24:44:55.162 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:55.392 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.392 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:55.394 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:44:55.394 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.412 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.412 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:44:55.414 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0F 64 3E 35 AB A2 35 AE 47 AA 27 91 AD 36 11 EF 52 57 A6 05 2B C7 26 1B 71 39 FA C8 12 17 E3 17",
#   "session id"          : "DD 83 00 07 F9 F0 27 A0 AF 44 83 5C F8 34 DD 21 7A 0F 44 5E 77 B7 3D AE 49 A1 7A 22 70 84 27 A6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 84 E1 3F 46 51 3A D0   AE DC A6 F4 73 FA 7C B3  ...?FQ:.....s...
#             0010: A3 BF 70 37 FF 75 8A 70   FA BA BF 0E 3E 0D BD 6D  ..p7.u.p....>..m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.516 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "82 B4 C5 4E 76 12 9E 26 89 B5 C6 03 57 F4 70 1B 21 A9 33 19 67 15 9A FE EF AF F8 AC 13 6D 6D 5E",
#   "session id"          : "DD 83 00 07 F9 F0 27 A0 AF 44 83 5C F8 34 DD 21 7A 0F 44 5E 77 B7 3D AE 49 A1 7A 22 70 84 27 A6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1B 75 FE 86 91 5C 0B 62   12 8A 2E 2F CB 16 B4 9F  .u...\.b.../....
#           0010: DC E4 86 BC 37 33 AB E0   6D A7 6D 3E AA 01 14 12  ....73..m.m>....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.516 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.516 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.521 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.521 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.521 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.522 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.523 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.523 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.523 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.530 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.532 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.533 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.537 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.537 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.537 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.537 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.537 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.538 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.538 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.538 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.538 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.539 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.539 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.540 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.540 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.541 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.541 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.542 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.544 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 D0 68 49",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:24.000 UTC",
#       "not  after"         : "2024-01-11 24:44:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD F6 65 0E CB 32 E6 94   FC FD 65 EE 5B 66 81 57  ..e..2....e.[f.W
#           0010: 3C 06 EA DF                                        <...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.545 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:55.602 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:55.603 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:55.603 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:44:55.603 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.626 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 36 B1 DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 24:44:22.000 UTC",
#     "not  after"         : "2024-01-11 24:44:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#         0010: 44 8D 21 04                                        D.!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#         0010: BD 89 67 CD                                        ..g.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.630 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AD 59 8F C7 0C F7 99 63   2A 3C 34 BA B8 56 53 EF  .Y.....c*<4..VS.
#     0010: 24 FE 3A 87 8C DD 80 87   B7 85 B1 AA CB 57 62 6F  $.:..........Wbo
#     0020: 04 7A DA 59 97 B2 4A ED   1A 00 6F EA E0 86 EE B5  .z.Y..J...o.....
#     0030: 77 35 33 B9 8F 34 59 C3   86 E1 69 D8 56 52 78 62  w53..4Y...i.VRxb
#     0040: CE A3 D2 45 3C 0A CA 4F   CB 6B D5 1D C7 72 87 5D  ...E<..O.k...r.]
#     0050: 6A 49 A4 2E 3C FD 83 0D   9C D7 FD 30 39 3F A8 D4  jI..<......09?..
#     0060: C5 A6 F8 D7 63 99 51 6A   80 88 82 FB 76 43 E8 06  ....c.Qj....vC..
#     0070: 2E B3 1C CE 9A FB 83 C4   6C A2 71 2E 61 6E D5 51  ........l.q.an.Q
#     0080: 8D 52 94 0A A0 80 C8 CC   D2 BA 8A FD 9A 3F 78 33  .R...........?x3
#     0090: 13 6E 4A C9 B1 07 AC BE   B6 CE F6 CA 25 8E 61 3E  .nJ.........%.a>
#     00A0: 62 4E 54 C4 23 23 38 0E   B2 6E B6 81 81 19 15 23  bNT.##8..n.....#
#     00B0: 3E 9A 70 A3 DE A8 48 77   06 D4 76 9D DE 9F BB B6  >.p...Hw..v.....
#     00C0: 5E D4 0B 9D 96 1B 09 11   31 67 14 4B 34 D4 B7 C3  ^.......1g.K4...
#     00D0: D3 B3 A6 57 C4 B1 C1 E7   3D 9F E5 84 43 DF CA F8  ...W....=...C...
#     00E0: 70 B2 A6 D4 08 74 48 F5   6F C9 76 1F EA 4A D9 55  p....tH.o.v..J.U
#     00F0: 8A 5C 1E 8A B4 80 D8 B5   89 66 AA DF 43 E8 24 CA  .\.......f..C.$.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.632 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B2 CC 54 19 24 B9 B8 56   2B 23 23 81 4F 28 06 C9  ..T.$..V+##.O(..
#     0010: 7F 14 09 EB DB 36 87 EE   D2 23 83 0C 38 FD D1 57  .....6...#..8..W
#     0020: E7 E6 23 93 85 1F 70 48   FE 6E 1A 23 32 8F EA E3  ..#...pH.n.#2...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.634 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:55.635 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.636 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:55.636 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.636 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-13 24:44:55.636 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:44:55.636 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.637 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.639 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 AC 96 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:28.000 UTC",
#       "not  after"         : "2024-01-11 24:44:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 E3 CA 3B CE 58 4D 29   E9 43 CA 34 E9 63 48 91  ...;.XM).C.4.cH.
#           0010: 41 7D 3C 7F                                        A.<.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 36 B1 DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:22.000 UTC",
#       "not  after"         : "2024-01-11 24:44:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#           0010: 44 8D 21 04                                        D.!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.665 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 49 EB 69 F2 2A F6 01   47 B8 D4 94 02 E3 45 18  .I.i.*..G.....E.
#     0010: 73 51 99 B8 EF 0E 34 3B   CF EE 72 82 64 0D 77 7F  sQ....4;..r.d.w.
#     0020: 3D CA E0 9F 29 6B 69 2D   2F 33 3C 99 E7 A7 FE B5  =...)ki-/3<.....
#     0030: 03 A3 48 CE 69 A9 E9 E0   C4 9C 68 90 77 23 E4 F9  ..H.i.....h.w#..
#     0040: 0F 21 93 6A C3 93 73 A2   BF E0 70 D3 7F 0F 31 55  .!.j..s...p...1U
#     0050: CB 88 B2 AE BC CF F5 BA   2C F4 CE D5 D2 D1 1F B9  ........,.......
#     0060: AE 0E AB DA 8A CC B8 D9   A7 16 94 D6 24 A4 4E 76  ............$.Nv
#     0070: C7 A5 6C 1E 66 73 12 A9   E5 8A AB 16 F8 AE 7F 41  ..l.fs.........A
#     0080: ED 40 2D 54 AE F8 D6 7B   D8 C4 71 64 1E DE 58 2E  .@-T......qd..X.
#     0090: F0 84 3F 90 E8 92 1E 59   43 7F E6 31 2D 8E 71 EC  ..?....YC..1-.q.
#     00A0: DD A3 39 7E D8 50 BC 9F   DC FF 06 A2 B6 E2 AC F0  ..9..P..........
#     00B0: 9B 81 CC 75 8E BE 62 0A   DA 84 49 12 2E D4 08 D0  ...u..b...I.....
#     00C0: 08 18 93 53 1D F9 8D 21   16 60 93 21 7D 8C 70 E4  ...S...!.`.!..p.
#     00D0: 17 99 01 49 58 28 7A 48   16 89 90 55 8B 5E 0C FA  ...IX(zH...U.^..
#     00E0: FE C6 02 7A D8 07 FE 2F   32 56 B7 43 58 99 7E A5  ...z.../2V.CX...
#     00F0: 27 1C 8C FB 20 CA F8 38   42 1D 52 65 F0 9E 6E 57  '... ..8B.Re..nW
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.666 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EB 30 17 1A 71 3F 01 21   6D 24 5C A8 46 70 7A BE  .0..q?.!m$\.Fpz.
#     0010: B5 2B 87 92 AE 88 80 D1   B1 83 6E C8 2C E0 F2 13  .+........n.,...
#     0020: D2 64 5C 76 FA C1 E1 5C   0F FA 2D D4 A5 FE 66 C6  .d\v...\..-...f.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.666 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:44:55.722 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EE 09 B7 AF F1 15 B5 66 EC CD 3A DB FA 61 65 B3 29 73 3F A6 79 25 A3 21 32 0A 3D 59 CB 54 2E BD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 24:44:56.014 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 24:44:56.015 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 00:45:07.285; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 24:45:07.611 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 36 B1 DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:22.000 UTC",
#       "not  after"         : "2024-01-11 24:44:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#           0010: 44 8D 21 04                                        D.!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F E5 C6 FD A5 F3 B0 57   22 D8 40 6C 3A F8 F1 A0  _......W".@l:...
#           0010: BD 89 67 CD                                        ..g.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 18 09 24",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 24:44:20.000 UTC",
#       "not  after"         : "2024-01-11 24:44:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 E0 B9 62 B0 22 EC 2E   23 A3 69 2D 21 04 CB 98  ...b."..#.i-!...
#           0010: 44 8D 21 04                                        D.!.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 24:45:07.628 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:45:08.049 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:45:08.050 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:45:08.051 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:45:08.051 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:45:08.138 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.139 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:45:08.140 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-13 24:45:08.141 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.146 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.158 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.158 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.158 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-13 24:45:08.161 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5C 31 8E FB 1A 60 3E 9D A6 61 DE 48 5F 78 27 FA CB 49 B6 D3 DF 0E 56 80 10 70 7B 0A 72 1F D4 40",
#     "session id"          : "8C 8D F9 9C 81 19 2F 4D AC 39 25 ED BA 40 52 2A 9F 57 82 36 B4 18 34 41 1E 25 D6 DA 8A B7 16 4C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E5 25 65 85 39 96 F1 CB   1E 94 F2 95 4C 8C C4 CA  .%e.9.......L...
#               0010: 78 8C E6 17 48 17 17 70   A8 FB DA 3C 59 5E 5E 43  x...H..p...<Y^^C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.180 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 82 BA C0 AC 1B 40 46 8C CC C1 73 7E C2 86 35 BE 64 97 01 0A B3 FA 7A 44 73 6C C0 C6 C4 73 E5",
#     "session id"          : "8C 8D F9 9C 81 19 2F 4D AC 39 25 ED BA 40 52 2A 9F 57 82 36 B4 18 34 41 1E 25 D6 DA 8A B7 16 4C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 98 3C A7 38 AE 1E 91 C3   92 95 6F 32 75 19 3B 0E  .<.8......o2u.;.
#             0010: E9 9F 3C 96 0B FC 38 C0   D3 4B 5C B0 D9 24 DA 1B  ..<...8..K\..$..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.180 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.180 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.182 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.184 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.186 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.186 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.186 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:45:08.186 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:45:08.186 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.193 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.195 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.196 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.200 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.200 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.200 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:45:08.201 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-13 24:45:08.203 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

onnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-13 24:46:29.882 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:46:29.929 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:46:29.929 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:46:29.929 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 24:46:29.929 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44942/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28203ms
ok 65 stop command for single port in 30789ms
ok 66 status detects locally running solr in 14416ms
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2181ms
ok 69 copying files around in 6560ms
ok 70 upconfig in 2636ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m29.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5653 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5653/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45933/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 22:32:12.101; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:32:12.107; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 22:32:13.072; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 22:32:13.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22561ms
ok 61 start solr with client truststore and security manager in 25421ms
not ok 62 start solr with mTLS needed in 61040ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-04biZl/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45933.
#
# Started Solr server on port 45933 (pid=199487). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45934.
#
# Started Solr server on port 45934 (pid=199919). Happy searching!
#
# INFO  - 2023-10-12 22:33:36.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:33:36.340; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 22:33:36.716; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:33:36.719; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:33:36.719; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:36.751 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CD 9C 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:12.000 UTC",
#     "not  after"         : "2024-01-10 22:33:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 8F B4 B4 0F 0C 64 24   30 3B 81 B0 3C 12 AD 6E  J.....d$0;..<..n
#         0010: 52 B9 15 C8                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:36.755 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 F0 28 22",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:04.000 UTC",
#     "not  after"         : "2024-01-10 22:33:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:36.770 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:37.006 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.006 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:37.008 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:37.008 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.013 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.025 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:37.028 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DC 91 0B 64 72 13 8A A0 1B 84 9E 8D E0 0D F9 C0 DB E5 C0 05 2B 13 AB E7 B6 85 D7 80 4B 12 DA D8",
#   "session id"          : "5C 19 94 0A 59 7B 77 EF 9E E8 08 1E 1A 34 71 70 64 B7 41 39 98 91 34 62 19 40 EC 4D 5C 86 A6 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2E D7 EB 56 43 F5 9B 30   05 E0 D0 39 6E 26 82 B5  ...VC..0...9n&..
#             0010: C6 3D 38 C2 82 72 94 27   67 A9 7B A3 0F 67 40 38  .=8..r.'g....g@8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.142 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "94 9F 3D 64 8A 98 53 15 4E 67 3D 2C C6 B6 09 DC 81 02 A9 75 0C 5C 08 FF AE 31 48 B7 D6 34 16 AB",
#   "session id"          : "5C 19 94 0A 59 7B 77 EF 9E E8 08 1E 1A 34 71 70 64 B7 41 39 98 91 34 62 19 40 EC 4D 5C 86 A6 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5C 27 81 EA 53 9B C0 F1   C1 5B F1 D9 A1 CA E7 2C  \'..S....[.....,
#           0010: 50 96 BE F0 C9 A7 18 FE   C0 A0 C6 7B 72 C6 29 65  P...........r.)e
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.142 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.143 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.145 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.148 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.148 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.148 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.150 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.150 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.150 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.159 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.160 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.164 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.164 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.164 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.164 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.165 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.167 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.167 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.167 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.168 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.168 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.169 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.169 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.172 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 34 24 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:08.000 UTC",
#       "not  after"         : "2024-01-10 22:33:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A D4 62 C4 B6 CF DA 0A   80 70 04 BB C6 03 8C 4A  J.b......p.....J
#           0010: 45 20 EB B5                                        E ..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:37.215 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:37.217 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:37.217 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:37.217 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.259 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.264 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 C3 DA A1 82 35 A1 F9   6B F4 F8 2D E5 6E E1 2E  .....5..k..-.n..
#     0010: A3 27 5F 61 2C F0 82 2A   45 2D 24 AA 88 E3 BC F1  .'_a,..*E-$.....
#     0020: 1C CC D8 75 AF EF 9E F8   4C 9A C5 5F 29 3E C0 E2  ...u....L.._)>..
#     0030: 1B 8B 95 1F EA DA F8 1D   C8 07 BC 71 90 59 C4 30  ...........q.Y.0
#     0040: 69 A2 57 8E A1 D5 AF 7E   7C B5 8F EF 75 80 CD 5B  i.W.........u..[
#     0050: A5 8D 0E 42 8C A9 4A BB   D1 65 D0 AF AC 75 6E 56  ...B..J..e...unV
#     0060: A7 9C 78 30 24 9F AB 4F   A0 B7 19 57 F5 C9 43 98  ..x0$..O...W..C.
#     0070: D3 0E F6 3B 4A 29 59 AB   16 4D 30 BD 43 D1 F3 31  ...;J)Y..M0.C..1
#     0080: 98 21 C2 FE E6 4C 1F 72   D5 2D 0A BF 26 12 5F 67  .!...L.r.-..&._g
#     0090: 1E B7 44 C8 B5 F1 43 9C   59 C3 C1 79 8D 0C 9F 18  ..D...C.Y..y....
#     00A0: 50 D8 D8 94 FF FE 91 42   C3 BA AE CF 1A F6 E5 C0  P......B........
#     00B0: 13 13 48 A7 27 5A 4F 6E   57 63 56 E2 F9 B5 7E 83  ..H.'ZOnWcV.....
#     00C0: C5 88 5B 39 F5 FB 2E 53   B7 44 A8 20 69 C9 C9 90  ..[9...S.D. i...
#     00D0: 2D EC 91 89 01 F8 E4 7E   63 19 BF 76 45 47 43 FF  -.......c..vEGC.
#     00E0: 9A EE A5 C2 14 B2 56 75   B4 0D D3 CE AC EB 9D 9D  ......Vu........
#     00F0: B5 89 44 A1 A4 75 4A D1   49 66 E7 F7 9F 09 04 11  ..D..uJ.If......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.266 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 1E FE A4 CF A8 AE 36   9A A9 73 89 45 A0 3C 57  v......6..s.E.<W
#     0010: 7B 14 E7 4C 8A A4 9B 33   D3 66 86 F3 A5 99 8A 35  ...L...3.f.....5
#     0020: C2 25 10 55 8A F4 49 69   7C 8D 45 16 72 63 04 34  .%.U..Ii..E.rc.4
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.268 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:37.269 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.269 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:37.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.270 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:37.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:37.270 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.271 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.273 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 CD 9C 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:12.000 UTC",
#       "not  after"         : "2024-01-10 22:33:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 8F B4 B4 0F 0C 64 24   30 3B 81 B0 3C 12 AD 6E  J.....d$0;..<..n
#           0010: 52 B9 15 C8                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1F 47 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:06.000 UTC",
#       "not  after"         : "2024-01-10 22:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#           0010: 25 EF EF 9E                                        %...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.299 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 D3 A6 29 C3 F8 B9 83   38 0E C2 BE 8F 59 67 FC  h..)....8....Yg.
#     0010: D6 67 78 F6 47 B8 5D 75   EA 5F 67 9E E3 81 65 56  .gx.G.]u._g...eV
#     0020: AF B9 4B FA 3B DD F6 02   BE DC B5 32 87 86 2F C1  ..K.;......2../.
#     0030: 6F 7A 90 07 E3 FE B5 92   2C BC 77 10 D9 A5 35 99  oz......,.w...5.
#     0040: E1 70 6D 86 A8 F8 27 A1   CA E8 10 13 23 97 A7 DE  .pm...'.....#...
#     0050: 6E 47 11 F2 95 29 80 1F   AD C1 53 AD F9 0B 96 DD  nG...)....S.....
#     0060: F0 AF 23 12 8F 5B BD 8A   68 EB 9D 5E F0 79 8B 34  ..#..[..h..^.y.4
#     0070: 7F F3 24 96 F9 48 7C 9E   88 EC C4 34 FA FC E9 25  ..$..H.....4...%
#     0080: FA 13 A1 52 04 67 DF 53   D4 89 5A D4 60 9F DF AE  ...R.g.S..Z.`...
#     0090: 12 33 AA B5 91 69 4D 2A   F0 08 A3 DC 98 6F 05 EA  .3...iM*.....o..
#     00A0: 8D A1 96 82 DE 2D 2E A3   C9 36 56 CA AB 4A 8E 68  .....-...6V..J.h
#     00B0: 8D 4D EC C5 63 94 70 79   A4 53 D4 4A 2B 91 1F 39  .M..c.py.S.J+..9
#     00C0: EA 54 1A 22 82 AB 9B 63   BD A9 49 B6 43 F2 13 77  .T."...c..I.C..w
#     00D0: B6 82 19 11 A1 F9 45 19   42 B7 72 AE D8 55 CC 2D  ......E.B.r..U.-
#     00E0: B1 DF 50 06 08 5F C0 1D   90 29 E0 C1 D9 1E B9 D3  ..P.._...)......
#     00F0: 24 5C 00 3F C3 A9 E7 0E   AD 6B 62 21 51 BC B0 7A  $\.?.....kb!Q..z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.300 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A 5F 62 64 22 B4 0E 93   1B FC 3A 92 D3 2E D5 C0  ._bd".....:.....
#     0010: 56 42 85 08 98 3D 03 23   A7 42 4A 48 32 D3 04 2A  VB...=.#.BJH2..*
#     0020: FB 5B 4B 9F 83 38 C4 E4   09 65 23 E6 7D 3A F8 76  .[K..8...e#..:.v
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.301 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:37.361 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9F E4 A3 B5 D2 D0 FE DE F5 4F 67 D1 60 5A 06 E8 B4 F8 34 4F 29 B1 57 B3 2F F6 D4 6F C7 34 F5 C6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 22:33:37.677 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 22:33:37.678 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 22:33:38.623; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:33:38.629; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 22:33:39.015; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:33:39.018; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:33:39.019; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-04biZl/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:39.051 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CD 9C 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:12.000 UTC",
#     "not  after"         : "2024-01-10 22:33:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 8F B4 B4 0F 0C 64 24   30 3B 81 B0 3C 12 AD 6E  J.....d$0;..<..n
#         0010: 52 B9 15 C8                                        R...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:39.055 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 F0 28 22",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:04.000 UTC",
#     "not  after"         : "2024-01-10 22:33:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:39.070 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:39.159 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:39.162 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:39.163 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:33:39.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:39.302 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.303 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:39.304 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:39.305 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.310 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.322 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.322 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:39.324 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3A 8D 58 79 45 F6 70 4A 1D 12 E4 CF C3 1D 25 63 C5 70 76 23 28 E4 DF 98 77 87 5E 72 88 7E E8 15",
#   "session id"          : "43 ED 55 97 69 1E 1C A5 D5 D9 CA EB FC FF 0C 28 2F C9 24 46 8E E2 15 4E B1 93 D1 1F A6 FC 92 EB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 52 66 38 69 6D 8C DB 54   2D 23 A4 10 9C DD 42 1A  Rf8im..T-#....B.
#             0010: 0E FD 78 74 A6 D6 78 41   B7 72 09 66 62 0D 53 00  ..xt..xA.r.fb.S.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.426 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "70 EE 8E FD 70 1C 22 C0 FE 13 35 15 8F A4 D6 7D 24 31 D2 F1 3F E2 F5 2D 62 B3 D2 CA 74 10 6B 1C",
#   "session id"          : "43 ED 55 97 69 1E 1C A5 D5 D9 CA EB FC FF 0C 28 2F C9 24 46 8E E2 15 4E B1 93 D1 1F A6 FC 92 EB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 20 D1 B1 03 17 51 8F A5   AF C4 00 D6 C2 FC 43 23   ....Q........C#
#           0010: 07 5A 9B 4C 33 69 AA 3E   39 5D FF 69 DF C2 0F 30  .Z.L3i.>9].i...0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.427 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.427 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.428 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.428 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.428 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.429 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.429 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.432 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.432 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.433 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.434 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.434 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.441 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.443 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.444 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.447 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.448 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.450 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.450 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.451 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.451 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.452 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.452 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.453 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.455 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 34 24 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:08.000 UTC",
#       "not  after"         : "2024-01-10 22:33:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A D4 62 C4 B6 CF DA 0A   80 70 04 BB C6 03 8C 4A  J.b......p.....J
#           0010: 45 20 EB B5                                        E ..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.456 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.537 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1F 47 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:33:06.000 UTC",
#     "not  after"         : "2024-01-10 22:33:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#         0010: 25 EF EF 9E                                        %...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#         0010: 6D 6C E3 C7                                        ml..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.541 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 B6 0A 49 3A E4 31 D3   A3 7A 18 24 C5 2F 81 21  ...I:.1..z.$./.!
#     0010: EF 8B 0C 7B E7 86 51 43   8C BF 8F 38 6E 7C 9B E6  ......QC...8n...
#     0020: B6 A9 7C F5 0F 24 8A 11   FF DD 52 30 D3 E0 72 6C  .....$....R0..rl
#     0030: 81 0A 0A B8 B4 76 83 8A   32 CE 3E 38 7E D9 5C 59  .....v..2.>8..\Y
#     0040: EC 96 3B 47 19 A3 A2 F9   A8 F6 19 2B 60 D0 56 E9  ..;G.......+`.V.
#     0050: C7 5C D4 23 DC 65 7A F9   3C B0 07 BF 6B 24 F7 9B  .\.#.ez.<...k$..
#     0060: B3 76 B5 36 16 FC 41 FB   44 EA 2E F6 10 5C 88 BA  .v.6..A.D....\..
#     0070: 31 68 CB F7 B9 DB E0 2B   71 DF C6 B2 49 CB FB 8B  1h.....+q...I...
#     0080: BC 33 0E D9 73 E0 93 8A   D1 54 65 2E 1A FE 79 25  .3..s....Te...y%
#     0090: 19 6A 5B 6C 88 CE 82 13   EA 4C 33 08 B4 50 C5 33  .j[l.....L3..P.3
#     00A0: D2 2E 57 43 4D 80 C3 F5   9D 62 1F 8A 19 94 7E E8  ..WCM....b......
#     00B0: D5 BD E9 FA 1E 91 25 8E   BC 13 EE 69 5B B9 E5 9B  ......%....i[...
#     00C0: EF B9 DC B4 33 2E 1B B0   5C FF EB 01 86 1A 75 14  ....3...\.....u.
#     00D0: AB 82 B6 53 35 AC 56 B1   00 26 8C A7 67 A8 C1 C2  ...S5.V..&..g...
#     00E0: B7 2D 7D 26 5F 18 70 6E   0E 65 F6 77 DE AC 0E DD  .-.&_.pn.e.w....
#     00F0: 2A 33 34 E7 64 2E 6C 04   A7 5B BD 58 29 AE 68 1D  *34.d.l..[.X).h.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.543 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 63 06 95 F6 41 42 4A   BC 61 CC BC 0A CC 2F 06  .c...ABJ.a..../.
#     0010: BB 49 1C 72 68 BB FD 45   4F 18 32 DA 3C 22 BF C0  .I.rh..EO.2.<"..
#     0020: 21 6F CB 7C A9 98 F5 D2   FE 36 7B 1C D9 28 6F 4E  !o.......6...(oN
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.546 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:39.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:39.547 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.547 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 22:33:39.548 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:39.548 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.548 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.551 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 CD 9C 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:12.000 UTC",
#       "not  after"         : "2024-01-10 22:33:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 8F B4 B4 0F 0C 64 24   30 3B 81 B0 3C 12 AD 6E  J.....d$0;..<..n
#           0010: 52 B9 15 C8                                        R...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1F 47 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:06.000 UTC",
#       "not  after"         : "2024-01-10 22:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#           0010: 25 EF EF 9E                                        %...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.575 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 BE 43 BA 8F F2 A9 25   51 59 B1 B1 9F 10 8D F8  ..C....%QY......
#     0010: 1A 36 CE E9 A7 84 F4 40   65 19 50 6B F3 97 FD C4  .6.....@e.Pk....
#     0020: 0D 25 96 55 73 5F 2D 95   6F 14 A0 C1 2B 61 50 BC  .%.Us_-.o...+aP.
#     0030: 6C D8 28 F5 2A 6A A5 A4   32 DC 32 2F AE C0 10 36  l.(.*j..2.2/...6
#     0040: 80 74 CC 14 E2 27 1F 29   69 FA AB B4 07 98 41 16  .t...'.)i.....A.
#     0050: F3 A5 9D 8B AA E3 24 62   7D 13 4F 1E 8D 64 18 76  ......$b..O..d.v
#     0060: 32 D9 82 27 61 51 31 58   27 19 B2 41 A0 5A FF 69  2..'aQ1X'..A.Z.i
#     0070: 24 90 89 97 B1 9A 2F 38   BF 11 70 1F EE 59 0E 5E  $...../8..p..Y.^
#     0080: BF 16 EB 2C 1A 64 77 E5   A6 E4 A9 DB 5D 6A E5 3B  ...,.dw.....]j.;
#     0090: 98 BA B5 6A 18 AA 30 06   B6 15 81 A1 F1 D5 D8 36  ...j..0........6
#     00A0: 8F C3 83 BE 6D 22 F6 58   66 4E F0 54 5C 83 70 E9  ....m".XfN.T\.p.
#     00B0: B9 CB 1E 19 F2 71 53 0C   4F AE 1F 73 29 91 62 98  .....qS.O..s).b.
#     00C0: E6 62 26 73 59 C2 02 BF   9A E6 A2 2D 62 98 88 16  .b&sY......-b...
#     00D0: 32 33 8C 7E 07 8D 9E 95   88 6A 01 78 C2 E2 EB BB  23.......j.x....
#     00E0: A9 01 02 51 14 1D B5 DE   4D C0 F1 12 C3 6B 5F F8  ...Q....M....k_.
#     00F0: 58 88 14 87 E6 49 9E 6A   36 11 DC C9 53 6D DD 7B  X....I.j6...Sm..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.576 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 A5 BE DA 18 CC 0C EA   A8 91 D5 28 6E B3 DE 1F  ...........(n...
#     0010: E2 C5 EF 39 6E 98 D1 AD   AF 89 AB BE 27 82 F8 0B  ...9n.......'...
#     0020: E2 AD D0 4D 9A FE 5F 31   97 2C C7 CF 18 8E 26 E2  ...M.._1.,....&.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.577 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:39.635 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7B E0 F3 71 E1 EA FC C2 30 35 F8 9B 68 C3 5F 1C 03 3D EC 1D E0 50 1D EB C1 F9 7A FE CB ED 93 64",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 22:33:39.921 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 22:33:39.922 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 22:33:51.307; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:51.631 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 F0 28 22",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:04.000 UTC",
#       "not  after"         : "2024-01-10 22:33:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#           0010: 25 EF EF 9E                                        %...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1F 47 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:33:06.000 UTC",
#       "not  after"         : "2024-01-10 22:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 39 B4 CA A1 24 B4 59   76 8E 0C 94 0C DA 5E 88  .9...$.Yv.....^.
#           0010: 25 EF EF 9E                                        %...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 80 DD F6 AD D0 AC E7   7D 46 57 E6 A9 0B 2D B9  .........FW...-.
#           0010: 6D 6C E3 C7                                        ml..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 22:33:51.646 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:51.874 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:51.875 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 22:33:51.876 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.881 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.893 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 22:33:51.895 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6C 37 BA 09 F7 06 36 F1 7E 84 4B 47 54 E3 4B 87 FE FD F9 87 76 2D 63 0E F5 13 5F 1C D7 7C AF 11",
#     "session id"          : "57 9B B7 0B 46 5D A8 E1 C2 BD 5D CA 1C CF 42 11 D2 21 FA A8 5E CF 7D 4B 30 5B A7 42 D9 FB 23 3B",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5C 38 7A AC 0A EE C9 AE   03 01 F3 70 CF 80 2A 51  \8z........p..*Q
#               0010: B7 5E F5 44 9F 33 42 DC   76 27 EA E8 AE 4F 45 12  .^.D.3B.v'...OE.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.918 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "23 BC 58 28 B6 A1 3A 2A B0 77 45 36 2B 5C 24 BB 6A 36 24 F4 AA A1 5F 6F 43 A3 44 F4 64 5A 1F 3C",
#     "session id"          : "57 9B B7 0B 46 5D A8 E1 C2 BD 5D CA 1C CF 42 11 D2 21 FA A8 5E CF 7D 4B 30 5B A7 42 D9 FB 23 3B",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A4 3C 41 4B D4 27 5D 27   65 55 CB 7C 3C 97 91 09  .<AK.']'eU..<...
#             0010: 6F 4C FD 9C D9 E9 E3 73   2D 67 29 4F 89 3C F5 59  oL.....s-g)O.<.Y
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.919 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.919 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.921 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.923 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.923 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:51.925 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:51.925 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.931 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.933 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.934 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:51.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:33:51.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 22:33:51.940 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsa

[...truncated too long message...]

nnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 22:35:14.716 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:35:14.758 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:35:14.759 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:35:14.759 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:35:14.759 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45934/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28519ms
ok 65 stop command for single port in 31211ms
ok 66 status detects locally running solr in 14403ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2184ms
ok 69 copying files around in 6620ms
ok 70 upconfig in 2671ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1218ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.

BUILD FAILED in 24m 4s
673 actionable tasks: 673 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m32s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5652 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5652/

2 tests failed.
FAILED:  org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 6 object(s) that were not released!!! [MockDirectoryWrapper, InternalHttpClient, InternalHttpClient, MockDirectoryWrapper, MockDirectoryWrapper, SolrCore]
org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1277)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:734)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:465)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:703)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

 expected null, but was:<ObjectTracker found 6 object(s) that were not released!!! [MockDirectoryWrapper, InternalHttpClient, InternalHttpClient, MockDirectoryWrapper, MockDirectoryWrapper, SolrCore]
org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1277)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:734)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:465)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:703)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

>

Stack Trace:
java.lang.AssertionError: ObjectTracker found 6 object(s) that were not released!!! [MockDirectoryWrapper, InternalHttpClient, InternalHttpClient, MockDirectoryWrapper, MockDirectoryWrapper, SolrCore]
org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1277)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:734)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:465)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:703)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.update.SolrIndexWriter.create(SolrIndexWriter.java:108)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:904)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.solr.core.SolrCore:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.core.SolrCore
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1237)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

 expected null, but was:<ObjectTracker found 6 object(s) that were not released!!! [MockDirectoryWrapper, InternalHttpClient, InternalHttpClient, MockDirectoryWrapper, MockDirectoryWrapper, SolrCore]
org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.getNewIndexDir(SolrCore.java:420)
	at org.apache.solr.core.SolrCore.initIndex(SolrCore.java:865)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1133)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.submitAsyncTask(CoreAdminHandler.java:490)
	at org.apache.solr.handler.admin.CoreAdminHandler.handleRequestBody(CoreAdminHandler.java:242)
	at org.apache.solr.handler.RequestHandlerBase.handleRequest(RequestHandlerBase.java:226)
	at org.apache.solr.servlet.HttpSolrCall.handleAdmin(HttpSolrCall.java:932)
	at org.apache.solr.servlet.HttpSolrCall.handleAdminRequest(HttpSolrCall.java:880)
	at org.apache.solr.servlet.HttpSolrCall.call(HttpSolrCall.java:541)
	at org.apache.solr.servlet.SolrDispatchFilter.dispatch(SolrDispatchFilter.java:262)
	at org.apache.solr.servlet.SolrDispatchFilter.lambda$doFilter$0(SolrDispatchFilter.java:219)
	at org.apache.solr.servlet.ServletUtils.traceHttpRequestExecution2(ServletUtils.java:246)
	at org.apache.solr.servlet.ServletUtils.rateLimitRequest(ServletUtils.java:215)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:213)
	at org.apache.solr.servlet.SolrDispatchFilter.doFilter(SolrDispatchFilter.java:195)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.apache.solr.embedded.JettySolrRunner$DebugFilter.doFilter(JettySolrRunner.java:187)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:202)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1635)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:527)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1570)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:221)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1384)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:176)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:484)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1543)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:174)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1306)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:129)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.rewrite.handler.RewriteHandler.handle(RewriteHandler.java:301)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:790)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:122)
	at org.eclipse.jetty.server.Server.handle(Server.java:563)
	at org.eclipse.jetty.server.HttpChannel$RequestDispatchable.dispatch(HttpChannel.java:1598)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:753)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:501)
	at org.eclipse.jetty.server.HttpChannel.run(HttpChannel.java:461)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:969)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.doRunJob(QueuedThreadPool.java:1194)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1149)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.inform(ReplicationHandler.java:1277)
	at org.apache.solr.cloud.ReplicateFromLeader.startReplication(ReplicateFromLeader.java:142)
	at org.apache.solr.cloud.ZkController.startReplicationFromLeader(ZkController.java:1445)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:734)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:378)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:387)
	at org.apache.solr.handler.IndexFetcher.createHttpClient(IndexFetcher.java:269)
	at org.apache.solr.handler.IndexFetcher.<init>(IndexFetcher.java:318)
	at org.apache.solr.handler.ReplicationHandler.doFetch(ReplicationHandler.java:465)
	at org.apache.solr.cloud.RecoveryStrategy.replicate(RecoveryStrategy.java:247)
	at org.apache.solr.cloud.RecoveryStrategy.doSyncOrReplicateRecovery(RecoveryStrategy.java:703)
	at org.apache.solr.cloud.RecoveryStrategy.doRecovery(RecoveryStrategy.java:335)
	at org.apache.solr.cloud.RecoveryStrategy.run(RecoveryStrategy.java:311)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:118)
	at com.codahale.metrics.InstrumentedExecutorService.submit(InstrumentedExecutorService.java:104)
	at org.apache.solr.update.DefaultSolrCoreState$2.run(DefaultSolrCoreState.java:349)
	... 7 more

org.apache.lucene.tests.store.MockDirectoryWrapper:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.lucene.tests.store.MockDirectoryWrapper
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.core.CachingDirectoryFactory.get(CachingDirectoryFactory.java:369)
	at org.apache.solr.core.SolrCore.initSnapshotMetaDataManager(SolrCore.java:615)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1129)
	at org.apache.solr.core.SolrCore.<init>(SolrCore.java:1056)
	at org.apache.solr.core.CoreContainer.createFromDescriptor(CoreContainer.java:1706)
	at org.apache.solr.core.CoreContainer.create(CoreContainer.java:1572)
	at org.apache.solr.handler.admin.CoreAdminOperation.lambda$static$0(CoreAdminOperation.java:118)
	at org.apache.solr.handler.admin.CoreAdminOperation.execute(CoreAdminOperation.java:418)
	at org.apache.solr.handler.admin.CoreAdminHandler$CallInfo.call(CoreAdminHandler.java:374)
	at org.apache.solr.handler.admin.CoreAdminHandler.lambda$handleRequestBody$0(CoreAdminHandler.java:235)
	at org.apache.solr.handler.admin.CoreAdminHandler$CoreAdminAsyncTracker.lambda$submitAsyncTask$0(CoreAdminHandler.java:473)
	at com.codahale.metrics.InstrumentedExecutorService$InstrumentedRunnable.run(InstrumentedExecutorService.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:261)
	at com.codahale.metrics.InstrumentedExecutorService.execute(InstrumentedExecutorService.java:95)
	at org.apache.solr.handler

[...truncated too long message...]

ction (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 17:45:42.782 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 17:45:42.782 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38720/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28709ms
ok 65 stop command for single port in 31008ms
ok 66 status detects locally running solr in 14354ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6505ms
ok 70 upconfig in 2612ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1226ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=E9770CC73A356CE7 -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.api.collections.TestLocalFSCloudBackupRestore.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=E9770CC73A356CE7 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
> Get more help at https://help.gradle.org.
==============================================================================

BUILD FAILED in 24m 43s
654 actionable tasks: 654 executed
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 25m10.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5651 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5651/

All tests passed

Build Log:
[...truncated 1329 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34009/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 14:45:43.258; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 14:45:43.264; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 14:45:44.561; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 14:45:44.605; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23211ms
ok 61 start solr with client truststore and security manager in 24879ms
not ok 62 start solr with mTLS needed in 57404ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PdU9xI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34009.
#
# Started Solr server on port 34009 (pid=199453). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34010.
#
# Started Solr server on port 34010 (pid=199908). Happy searching!
#
# INFO  - 2023-10-12 14:47:08.080; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 14:47:08.086; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 14:47:08.473; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 14:47:08.476; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 14:47:08.477; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:08.510 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 AD 93 E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:44.000 UTC",
#     "not  after"         : "2024-01-10 14:46:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 EC C3 2A 83 2C 4B B8   CA 97 E9 C4 79 E8 8D FF  ...*.,K.....y...
#         0010: 1A 47 02 1E                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:08.515 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 F5 F3 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:35.000 UTC",
#     "not  after"         : "2024-01-10 14:46:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:08.530 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:08.621 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:08.622 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:08.623 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:08.623 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:08.778 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.778 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:08.780 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:08.780 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.787 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.799 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.800 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:08.802 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0A E7 44 74 55 A8 59 11 84 DB 69 DA 07 71 0C 97 05 13 6E 66 BC 5B 27 D7 BC 6E 6C A6 2E 76 6F 69",
#   "session id"          : "6D 16 9A F9 99 AF EA E9 BA B9 83 0B B2 6E 10 80 51 10 B7 E5 EC 5D 08 BC 9A 35 4B 04 C3 04 B0 CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 CD 67 71 60 1E 2E 94   07 39 D5 11 7C 12 D4 62  ..gq`....9.....b
#             0010: 93 72 D4 B9 97 E8 8F 1B   E8 C2 EC D2 C3 46 A2 28  .r...........F.(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.918 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "50 86 E6 98 9C 71 DD AF BC 31 26 0C 4B 94 85 97 07 60 70 5C 28 99 60 1B C7 53 6E 6E 96 C9 D9 D6",
#   "session id"          : "6D 16 9A F9 99 AF EA E9 BA B9 83 0B B2 6E 10 80 51 10 B7 E5 EC 5D 08 BC 9A 35 4B 04 C3 04 B0 CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 78 36 F9 51 E8 5B 5B 53   2B C7 22 2F B6 04 40 37  x6.Q.[[S+."/..@7
#           0010: 1B 83 6D 93 57 09 C4 BB   28 0C AE 7D 21 80 62 75  ..m.W...(...!.bu
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.919 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.919 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.921 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.924 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.926 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.934 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.936 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.937 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.941 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.941 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.941 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.943 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.944 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.945 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.946 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:08.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.949 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 62 1A AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:40.000 UTC",
#       "not  after"         : "2024-01-10 14:46:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 DE A3 B3 02 CC 9B E3   6C 17 D2 A7 0E E6 77 50  ........l.....wP
#           0010: B2 97 24 6E                                        ..$n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:08.949 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.034 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.038 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3D 29 32 07 14 D0 1C 21   5B 65 42 A2 78 11 1A BE  =)2....![eB.x...
#     0010: B6 36 D0 A6 C3 B4 34 B8   EB 3C 8A 31 20 37 6E 89  .6....4..<.1 7n.
#     0020: 67 90 FB 43 B0 E0 0B 15   14 3A 2B B6 51 68 34 4A  g..C.....:+.Qh4J
#     0030: 1D 38 1D 9D F0 CA 88 2E   6E B9 B3 F2 4D C0 6E 1D  .8......n...M.n.
#     0040: 9B 4C 60 16 7C 80 A6 FF   CF 83 C2 35 2B 3F 1F F9  .L`........5+?..
#     0050: F9 59 08 1B 7E 67 EF 6A   E4 69 6C 23 FB 1E 16 69  .Y...g.j.il#...i
#     0060: DC 75 29 46 E4 75 0B 6B   8D 06 13 86 B5 EE 21 60  .u)F.u.k......!`
#     0070: 11 8D 0F 87 71 D5 FC C8   55 67 34 54 FC 2C 38 6D  ....q...Ug4T.,8m
#     0080: 35 31 D4 EA 65 14 68 0E   D5 9F 78 32 40 56 DA F0  51..e.h...x2@V..
#     0090: C2 B9 39 B0 B0 E5 64 D7   41 7E 3A BD 8A 1D 38 0E  ..9...d.A.:...8.
#     00A0: 25 CB 81 7F 99 0E 49 4F   C3 28 DE B7 49 DA A2 F6  %.....IO.(..I...
#     00B0: 30 46 1C F1 38 4E FA 51   C2 16 66 34 3E F9 0F 08  0F..8N.Q..f4>...
#     00C0: 20 5D 75 D4 AA C4 D4 09   1A 5F 83 44 6A 29 CB B4   ]u......_.Dj)..
#     00D0: 54 8E 40 63 DA 1D 8A F9   AC EB 46 CF 0A A5 EC BD  T.@c......F.....
#     00E0: DA 09 9B EC 14 71 0A A4   87 8E 31 48 78 76 3C 03  .....q....1Hxv<.
#     00F0: F5 95 CF C5 DD D1 2E 45   EB F8 58 E6 88 56 FD 67  .......E..X..V.g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.040 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F9 23 D7 14 EA 04 E9 B9   1B AE 25 CE 4D FF C5 5E  .#........%.M..^
#     0010: 4E 91 22 B9 A1 04 23 5D   19 F8 22 AA B0 4F 24 09  N."...#].."..O$.
#     0020: 16 1A D1 7F 59 6C AF 15   2A F0 E5 C5 14 26 9E 41  ....Yl..*....&.A
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.042 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:09.043 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:09.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:09.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:09.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:09.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:09.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.045 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.048 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 AD 93 E6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:44.000 UTC",
#       "not  after"         : "2024-01-10 14:46:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 EC C3 2A 83 2C 4B B8   CA 97 E9 C4 79 E8 8D FF  ...*.,K.....y...
#           0010: 1A 47 02 1E                                        .G..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 28 21 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:37.000 UTC",
#       "not  after"         : "2024-01-10 14:46:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#           0010: B4 C9 7F B5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.074 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 9E BB 20 56 A5 AA 98   96 BF 25 69 7F 32 4F 0E  ... V.....%i.2O.
#     0010: 61 DC 60 36 B3 A8 EF F8   F1 39 6E C0 16 EA 91 86  a.`6.....9n.....
#     0020: 8B 85 26 CD CB 82 EF 40   8C 45 AA C4 A5 83 A9 76  ..&....@.E.....v
#     0030: 64 D5 39 3C B6 B7 51 D1   59 AE 68 37 05 08 4D 01  d.9<..Q.Y.h7..M.
#     0040: 13 22 94 A0 B0 38 02 5F   76 4A 8B 47 0C 69 60 04  ."...8._vJ.G.i`.
#     0050: F2 1A 78 CC B4 C3 FF EE   51 68 30 30 C0 B4 8D 7A  ..x.....Qh00...z
#     0060: E8 81 0E 23 7C 8F BE 7E   79 A9 67 93 A4 2D D5 D7  ...#....y.g..-..
#     0070: 9E 84 15 8E 0A 69 5E 17   88 B7 47 80 F5 4E 28 32  .....i^...G..N(2
#     0080: 31 AE 73 A2 D9 82 B1 F3   ED 09 13 96 E6 E2 9B 12  1.s.............
#     0090: D7 28 06 49 28 DF 6B DE   C4 1D 12 10 78 3C 9B 44  .(.I(.k.....x<.D
#     00A0: 9D 11 BB 9A 14 09 8B 26   AF 80 76 D9 B3 A6 EE FC  .......&..v.....
#     00B0: 4F 90 0A 94 08 D8 9C 14   DF 01 6D E8 0A 04 2E AD  O.........m.....
#     00C0: C1 95 99 40 49 05 B1 CA   D1 7F 90 C2 85 92 55 A3  ...@I.........U.
#     00D0: 1E 5A C1 2F D8 49 50 89   B7 41 7B 39 3E 9B 1A DD  .Z./.IP..A.9>...
#     00E0: 53 3E 00 C9 90 02 A3 29   F7 25 E1 88 F4 87 0B 8F  S>.....).%......
#     00F0: CF 0B 14 99 5A 8C 15 02   33 E4 DF 30 B1 98 37 91  ....Z...3..0..7.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.075 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B CC 7F 08 50 17 8A 3C   FC 7C ED 2E EA 22 9D 0C  +...P..<....."..
#     0010: 11 39 D0 D2 F0 02 C3 8F   27 37 10 FD 0D 7F AD 41  .9......'7.....A
#     0020: 97 75 CC 94 85 E9 02 4C   0B 41 70 7F A4 33 0F 48  .u.....L.Ap..3.H
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.076 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:09.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 92 EB 06 64 99 B6 08 78 44 7E BE 4B C4 A1 44 E7 63 43 71 57 CB 1C 08 CA F5 B0 2C B8 D1 E8 82",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 14:47:09.424 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 14:47:09.425 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 14:47:10.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 14:47:10.388; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 14:47:10.782; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 14:47:10.785; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 14:47:10.786; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PdU9xI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:10.818 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 AD 93 E6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:44.000 UTC",
#     "not  after"         : "2024-01-10 14:46:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 EC C3 2A 83 2C 4B B8   CA 97 E9 C4 79 E8 8D FF  ...*.,K.....y...
#         0010: 1A 47 02 1E                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:10.823 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 F5 F3 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:35.000 UTC",
#     "not  after"         : "2024-01-10 14:46:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:10.838 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:11.243 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:11.244 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:11.244 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:11.245 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:11.398 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:11.401 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:11.401 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.408 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.420 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.420 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.420 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:11.423 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "36 B2 49 49 C4 B3 55 E3 48 E3 A8 E8 1B 8D 8E 3F A7 83 C8 C5 6F 8D A9 FC 91 52 D3 A5 C8 D2 1D 22",
#   "session id"          : "C7 A7 CC 0C B6 2C 2A 69 5E 2E 89 06 BF 0C 6B 5C BB 92 DB 3E 93 6B AB 61 01 B4 2A 88 B2 E3 91 A3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C8 36 46 9D 39 5A 3C 56   15 8F 01 FB 44 E8 B2 6D  .6F.9Z<V....D..m
#             0010: 57 44 74 EE 25 4E E7 A5   BC 38 9D E5 D8 CC A8 25  WDt.%N...8.....%
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.538 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4A 62 B6 28 BC 8B 98 69 D2 E4 68 E6 9E 0E 16 63 1C 19 4D 00 7A 71 AB C8 A6 A4 63 3E F6 7A 17 E1",
#   "session id"          : "C7 A7 CC 0C B6 2C 2A 69 5E 2E 89 06 BF 0C 6B 5C BB 92 DB 3E 93 6B AB 61 01 B4 2A 88 B2 E3 91 A3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9C 1C 0D 6E C3 89 0E 03   22 3C 9E E6 5B 9D 9D 61  ...n...."<..[..a
#           0010: 67 DE 1B 6E A8 BF A1 5B   2D 9A 6D 3E 3C 04 47 5B  g..n...[-.m><.G[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.539 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.539 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.540 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.542 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.544 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.545 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.554 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.555 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.556 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.560 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.560 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.560 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.560 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.561 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.563 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.563 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.563 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.564 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.564 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.565 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.568 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 62 1A AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:40.000 UTC",
#       "not  after"         : "2024-01-10 14:46:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 DE A3 B3 02 CC 9B E3   6C 17 D2 A7 0E E6 77 50  ........l.....wP
#           0010: B2 97 24 6E                                        ..$n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.569 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.667 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 28 21 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 14:46:37.000 UTC",
#     "not  after"         : "2024-01-10 14:46:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#         0010: B4 C9 7F B5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#         0010: E4 33 20 9F                                        .3 .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.671 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A8 B7 AF AA BB 91 59 91   F9 1D 0D BF 4F 75 C4 EA  ......Y.....Ou..
#     0010: 7D EC 1A 3F 3D 58 03 D8   8C 8C B0 7E 07 18 39 B3  ...?=X........9.
#     0020: 1D E0 27 6A A5 01 9B CE   23 C1 0D BF 2D 40 C3 0D  ..'j....#...-@..
#     0030: 86 97 74 F0 30 96 6D E5   BD DA ED 32 79 12 D7 B8  ..t.0.m....2y...
#     0040: 95 1B 48 7C 32 CA DE BD   35 4A 4B F4 01 27 AB C0  ..H.2...5JK..'..
#     0050: 4B 48 96 0B 47 03 9A 43   70 80 BF 02 2D 00 A1 9A  KH..G..Cp...-...
#     0060: D3 15 9A A5 32 22 FD FF   B1 8A D6 70 8C C4 2A F7  ....2".....p..*.
#     0070: 3E 2C 6B 59 74 28 B0 75   29 F9 19 65 05 15 0D 01  >,kYt(.u)..e....
#     0080: E4 43 25 36 DD 5D 13 88   5E 29 1D 3C 6B 0C 03 C7  .C%6.]..^).<k...
#     0090: F4 68 2F 45 71 38 98 45   13 4D A2 22 CC FF 11 76  .h/Eq8.E.M."...v
#     00A0: 5D 30 6B BC E5 AC 80 24   F2 80 35 FF B1 9C 43 76  ]0k....$..5...Cv
#     00B0: 17 1C 06 0D 6B 61 4E 2B   CD 89 00 7D 11 63 8A 4D  ....kaN+.....c.M
#     00C0: 5B 52 8C BF FA D5 6C 94   58 3B 30 1E A3 99 23 66  [R....l.X;0...#f
#     00D0: 25 D9 AA E9 6D 09 43 24   6B 85 18 1E 62 F3 B6 5E  %...m.C$k...b..^
#     00E0: 19 C5 A1 05 CF C9 48 4A   3F 2C CD 18 40 C0 61 21  ......HJ?,..@.a!
#     00F0: F5 AB 13 DF AB C1 03 B0   1A 74 9C EF B7 0B 0C 26  .........t.....&
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.673 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 69 D8 0E B7 16 C9 20 F8   DB 72 E8 C2 38 26 CD BC  i..... ..r..8&..
#     0010: 43 71 50 90 9C 0F 6F 9A   DD 1B 30 9A 42 84 77 67  CqP...o...0.B.wg
#     0020: 04 A7 64 C3 4B 3E 1C E8   FD B1 BE B1 E4 6F D5 2B  ..d.K>.......o.+
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.676 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:11.677 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.677 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:11.677 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.677 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 14:47:11.678 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:11.678 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.679 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.681 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 AD 93 E6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:44.000 UTC",
#       "not  after"         : "2024-01-10 14:46:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 EC C3 2A 83 2C 4B B8   CA 97 E9 C4 79 E8 8D FF  ...*.,K.....y...
#           0010: 1A 47 02 1E                                        .G..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 28 21 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:37.000 UTC",
#       "not  after"         : "2024-01-10 14:46:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#           0010: B4 C9 7F B5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.707 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 BA 93 C9 C2 95 22 02   BF 85 B0 E8 36 2E BA 9B  ......".....6...
#     0010: 89 90 2A 18 92 68 CE D0   86 76 A0 1A 87 C5 09 45  ..*..h...v.....E
#     0020: ED 6F F4 F2 6E 11 6F 6E   FF B6 80 B5 7A EA 13 3F  .o..n.on....z..?
#     0030: F9 2D 8E 96 0E 74 BA 10   32 8E 26 13 02 B4 EC E1  .-...t..2.&.....
#     0040: 0A 60 EC BC C2 AA C2 69   52 4C 14 19 D2 D4 24 2A  .`.....iRL....$*
#     0050: 3F 34 25 37 94 E2 4B 8A   C8 94 09 27 48 D2 50 55  ?4%7..K....'H.PU
#     0060: 2A 1B 73 79 FC 51 85 22   6E C7 A3 86 DC A1 31 AE  *.sy.Q."n.....1.
#     0070: 06 40 EF D3 5A 35 A7 5B   3B 85 0A B4 FA CD 35 3C  .@..Z5.[;.....5<
#     0080: AE 6A 37 9A 24 D7 40 1C   2E 20 3A 2C 13 2A 11 DF  .j7.$.@.. :,.*..
#     0090: 25 B9 49 F5 06 E6 FF 70   F6 02 DC 78 7A C4 CB 9B  %.I....p...xz...
#     00A0: D7 CB 26 C8 68 06 97 F4   C7 D1 6D D5 37 6D 2C 14  ..&.h.....m.7m,.
#     00B0: BD FC F6 6E 67 01 00 26   26 94 7D D9 C1 75 85 2B  ...ng..&&....u.+
#     00C0: 86 05 3E 17 36 FB 67 BE   F0 D4 44 75 A8 18 08 FD  ..>.6.g...Du....
#     00D0: 23 8E D0 8A E2 7C 21 C5   62 9B 74 2C F0 21 12 13  #.....!.b.t,.!..
#     00E0: 19 3B 0E 8E 22 1C 05 F2   C7 CF 80 C6 E9 BC 24 40  .;..".........$@
#     00F0: 24 DF E3 57 22 7D 83 87   C5 D4 6D A7 CC 09 C6 5E  $..W".....m....^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.708 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 28 58 52 2A FA 39 98   77 E9 B9 EB 44 81 EA B0  .(XR*.9.w...D...
#     0010: 61 64 CB 30 BB DD 97 20   EC 01 59 13 21 50 B0 0E  ad.0... ..Y.!P..
#     0020: 73 A9 A7 EC B8 C4 39 AF   B0 4D 3C FD 02 B0 F0 C6  s.....9..M<.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.709 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:11.772 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A9 85 70 0C C8 87 EB 16 61 A1 00 54 0C BB 82 76 3E 5F ED 75 25 C6 37 8A DE AD 4C 48 4D 8F 10 BC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 14:47:12.088 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 14:47:12.089 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 14:47:23.234; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:23.560 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 F5 F3 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:35.000 UTC",
#       "not  after"         : "2024-01-10 14:46:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#           0010: B4 C9 7F B5                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 28 21 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 14:46:37.000 UTC",
#       "not  after"         : "2024-01-10 14:46:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 23 5D 10 2A 45 66 86   C7 26 5B 3E 41 86 46 7E  e#].*Ef..&[>A.F.
#           0010: B4 C9 7F B5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 FD 19 F1 AD C5 FD 84   FF 06 63 5A EB 07 08 98  ..........cZ....
#           0010: E4 33 20 9F                                        .3 .
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 14:47:23.576 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:23.730 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:23.730 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:23.731 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:47:23.731 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:23.822 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:23.824 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 14:47:23.824 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.830 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.842 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.842 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.842 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 14:47:23.844 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "17 2D B0 14 46 F8 37 AC 1A 1D 7A 36 B4 66 17 E5 6D 8C 98 87 0C 7A 82 83 87 FB 2A 6C F8 51 84 DD",
#     "session id"          : "92 25 42 8E F5 F3 1C 09 AB 35 9A D1 4C AD 17 5E A3 5F DC 8C 51 25 06 FA F9 3F E1 EC 7E D2 AB E8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 02 1F 3A 3D 69 4B 8C 70   14 F5 F3 9E 22 29 56 08  ..:=iK.p....")V.
#               0010: 56 3F 45 09 D3 4A 19 51   C0 8C 94 C8 1C D6 68 56  V?E..J.Q......hV
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.863 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E8 6D D5 92 0B 1B 77 63 53 59 04 3A 70 A1 0A F6 3F 21 36 25 5A 26 F7 42 C1 88 96 CA DD E2 91 02",
#     "session id"          : "92 25 42 8E F5 F3 1C 09 AB 35 9A D1 4C AD 17 5E A3 5F DC 8C 51 25 06 FA F9 3F E1 EC 7E D2 AB E8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: AF C7 4E 1C 46 2E 20 66   AE 39 52 65 32 4E 16 E4  ..N.F. f.9Re2N..
#             0010: 45 21 00 0E 12 2F 07 E1   88 37 ED 8A F1 3E AF 26  E!.../...7...>.&
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.864 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.864 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.865 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.866 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.866 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.868 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.868 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:23.869 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:23.870 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.877 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.878 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.880 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.883 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.883 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:47:23.884 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 14:47:23.886 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 14:48:43.239 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:48:43.290 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:48:43.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:48:43.291 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 14:48:43.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34010/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28326ms
ok 65 stop command for single port in 31481ms
ok 66 status detects locally running solr in 14469ms
ok 67 status does not expose cli parameters to end user in 220ms
ok 68 listing out files in 2223ms
ok 69 copying files around in 6747ms
ok 70 upconfig in 2714ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1223ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1222ms
ok 73 Cleanup in 1229ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 26s
673 actionable tasks: 657 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m53s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5650 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5650/

2 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([6D086A86715EB061:58FC81DD9A82863F]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset

Error Message:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/index
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0

Stack Trace:
java.lang.AssertionError: Configset shouldn't be part of the backup but found:
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/index
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/shard_backup_metadata
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs
hdfs://localhost:41893/backup/mytestbackuptestbackuprestoretooriginal/hdfsbackuprestore_testbackuprestoretooriginal/zk_backup_0/configs/conf1
hdfs://localhost:41893/backup/mytestbackuptestskipconfigset/hdfsbackuprestore_testskipconfigset/zk_backup_0
	at __randomizedtesting.SeedInfo.seed([6D086A86715EB061:66F1F58FE91CE676]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertFalse(Assert.java:65)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testSkipConfigset(AbstractIncrementalBackupTest.java:375)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5441 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6D086A86715EB061 -Ptests.file.encoding=UTF-8

  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testSkipConfigset" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6D086A86715EB061 -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 6m 46s
651 actionable tasks: 635 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m14.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5649 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5649/

2 tests failed.
FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.

Stack Trace:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.
	at __randomizedtesting.SeedInfo.seed([375694375F869E1D]:0)
	at org.apache.solr.cloud.MiniSolrCloudCluster.deleteAllCollections(MiniSolrCloudCluster.java:681)
	at org.apache.solr.handler.designer.TestSchemaDesignerAPI.tearDownCluster(TestSchemaDesignerAPI.java:81)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:909)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=624, name=coreCloseExecutor-576-thread-1, state=RUNNABLE, group=TGRP-TestSchemaDesignerAPI]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=624, name=coreCloseExecutor-576-thread-1, state=RUNNABLE, group=TGRP-TestSchemaDesignerAPI]
Caused by: java.lang.AssertionError: Too many closes on SolrCore
	at __randomizedtesting.SeedInfo.seed([375694375F869E1D]:0)
	at org.apache.solr.core.SolrCore.close(SolrCore.java:1753)
	at org.apache.solr.core.SolrCores.lambda$close$0(SolrCores.java:128)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6883 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43143/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 10:39:25.683; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 10:39:25.688; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 10:39:26.615; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 10:39:26.656; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22685ms
ok 61 start solr with client truststore and security manager in 25070ms
not ok 62 start solr with mTLS needed in 56723ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wZ4Foy/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43143.
#
# Started Solr server on port 43143 (pid=198798). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43144.
#
# Started Solr server on port 43144 (pid=199231). Happy searching!
#
# INFO  - 2023-10-12 10:40:49.584; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 10:40:49.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 10:40:49.950; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 10:40:49.953; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 10:40:49.954; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:49.986 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 0F 7F C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:25.000 UTC",
#     "not  after"         : "2024-01-10 10:40:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 2A D6 8F 99 32 6A 9F   6C 3C 05 91 6A EF 9A B5  .*...2j.l<..j...
#         0010: 1F D4 57 7D                                        ..W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:49.990 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 96 D1 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:17.000 UTC",
#     "not  after"         : "2024-01-10 10:40:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:50.005 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:50.095 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:50.095 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:50.096 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:50.096 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:50.238 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:50.241 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:50.241 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.246 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.257 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.258 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:50.260 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 51 2A 09 CA 84 3E BB C7 37 32 FE 91 59 D1 FA 26 5B E2 FA 3F CF F1 2A 2C 44 CE BD 0F 8B 25 CE",
#   "session id"          : "9B 31 A4 18 85 93 F4 B1 C6 C3 A9 76 9D 88 A2 98 48 34 BB BB 96 41 DA 9E 78 8B 07 8A 2B D1 7A D8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 79 A2 46 C6 F5 B6 3E 67   A9 27 0A CA 6A 7F 1A 85  y.F...>g.'..j...
#             0010: 48 63 65 2F 3D D0 1F C1   48 8E 3B F8 95 10 4B 78  Hce/=...H.;...Kx
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.370 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "22 22 88 67 DA 76 17 D7 0C 59 E9 8B 34 E9 2A 5A 2B 44 58 33 FE 41 61 47 37 15 28 D5 E2 39 32 3E",
#   "session id"          : "9B 31 A4 18 85 93 F4 B1 C6 C3 A9 76 9D 88 A2 98 48 34 BB BB 96 41 DA 9E 78 8B 07 8A 2B D1 7A D8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 54 EC 0D B5 35 63 A5 92   A5 72 CE 2B 37 88 54 00  T...5c...r.+7.T.
#           0010: 4C 57 79 FC 8E AD 42 6B   B9 74 5F 91 18 61 79 0A  LWy...Bk.t_..ay.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.371 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.371 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.372 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.373 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.373 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.376 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.376 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.385 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.386 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.387 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.391 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.391 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.391 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.392 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.394 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.394 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.394 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.395 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.396 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.396 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.396 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.399 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 26 88 B9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:21.000 UTC",
#       "not  after"         : "2024-01-10 10:40:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 36 5B FB 46 50 35 34   92 81 BE A6 C1 01 EB D6  .6[.FP54........
#           0010: 9A B1 56 FE                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.399 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.478 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.482 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 1D FA 46 0C BD 9D 68   32 B8 AF 1C FF 25 96 D3  9..F...h2....%..
#     0010: 7A E0 03 C1 70 22 9E 2E   C6 66 76 73 6B 10 DE 09  z...p"...fvsk...
#     0020: 6E B5 F7 AF 53 71 28 9B   1E C2 7A F0 F1 67 D4 89  n...Sq(...z..g..
#     0030: A6 CF 15 85 C4 66 12 74   93 D7 30 C0 50 A4 1E 80  .....f.t..0.P...
#     0040: 21 B9 93 4B 9C 25 8B C8   D5 1E CE 37 29 2E A7 AA  !..K.%.....7)...
#     0050: 58 55 33 54 AE CB 52 03   2B 7B 85 B7 3F 82 01 92  XU3T..R.+...?...
#     0060: 05 7D 90 D2 1C 94 81 EE   0E 25 CD 48 69 EE 6E 53  .........%.Hi.nS
#     0070: 93 D4 65 4B D9 4D CF 7A   23 08 C8 06 F6 A4 31 3C  ..eK.M.z#.....1<
#     0080: 80 50 31 3B BD FD 09 C2   0B F8 9A FD 38 DE 5C A3  .P1;........8.\.
#     0090: A0 06 65 6F 2D 48 33 28   93 21 8E 85 46 8D 01 AA  ..eo-H3(.!..F...
#     00A0: 4B 8E 2D 24 CE 0B 3F 11   1D 5A 7C FE 68 4F 9A 89  K.-$..?..Z..hO..
#     00B0: A3 0E 75 52 0F 1E 15 D0   AA F8 47 17 18 79 A9 55  ..uR......G..y.U
#     00C0: 09 F3 11 4C 49 47 5F B6   7B A3 3F EA 5D 0C 78 43  ...LIG_...?.].xC
#     00D0: 5C 28 9D 78 87 D5 BF 08   C0 F9 B9 19 B3 BD B7 9B  \(.x............
#     00E0: CF CE 7A 8E DA 2C AA 13   AE 32 FE 0D D1 4E 5A E5  ..z..,...2...NZ.
#     00F0: 06 FB 25 BB 06 AA 3C BA   8D 44 60 88 16 03 61 07  ..%...<..D`...a.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.484 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 64 D8 DD 89 E2 B7 B5 B6   E8 D7 B9 59 BB C4 F2 84  d..........Y....
#     0010: DF C8 19 DA 16 D9 99 68   0E 6E A6 E0 09 3A 82 8B  .......h.n...:..
#     0020: 29 FD 6B FF 9B 1E D3 AA   0D D4 5A 13 59 DE 44 9C  ).k.......Z.Y.D.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.486 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:50.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.487 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:50.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.488 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:50.488 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:50.488 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.489 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.491 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 0F 7F C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:25.000 UTC",
#       "not  after"         : "2024-01-10 10:40:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 2A D6 8F 99 32 6A 9F   6C 3C 05 91 6A EF 9A B5  .*...2j.l<..j...
#           0010: 1F D4 57 7D                                        ..W.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F F3 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:19.000 UTC",
#       "not  after"         : "2024-01-10 10:40:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#           0010: 98 F1 91 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.517 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7F 41 6E C7 63 38 89 2E   BB B9 FE 68 A1 41 E5 7F  .An.c8.....h.A..
#     0010: E2 C5 D1 13 45 46 08 EE   0F 84 90 A8 40 DA 7F 75  ....EF......@..u
#     0020: 42 6D 8C 21 33 41 70 E6   E1 91 BC 6D F5 E9 DF CF  Bm.!3Ap....m....
#     0030: 7F D0 C1 99 8F 50 E1 93   58 30 EE 33 D3 0C 6E 4A  .....P..X0.3..nJ
#     0040: BB 17 DE FA 98 45 2E 6E   33 97 C5 38 F1 E4 14 98  .....E.n3..8....
#     0050: 89 11 62 9D 0B 59 2A 1C   4C 0D 90 25 30 F1 D4 D3  ..b..Y*.L..%0...
#     0060: 3F 83 D1 95 08 CC 34 E0   F3 E2 A6 A8 79 78 83 D4  ?.....4.....yx..
#     0070: E1 3C E4 2F B5 9F 67 D6   BA DA 98 27 F3 C3 75 69  .<./..g....'..ui
#     0080: DE BF 28 B4 E3 53 7C F8   0B CB BF 4D C4 EC 6A FE  ..(..S.....M..j.
#     0090: E5 2C 7E 32 B2 CD CB 5D   7E AF F6 68 DC F0 D7 28  .,.2...]...h...(
#     00A0: 2E 9E 77 4C 5C 73 0B 10   AA C7 A3 E1 B4 42 14 CE  ..wL\s.......B..
#     00B0: 28 E4 70 5B 55 28 8A 2E   EA 47 50 16 1D 11 B4 A8  (.p[U(...GP.....
#     00C0: C5 42 77 01 C4 68 E5 0E   2D 17 1D DB FE 5C 7C 8B  .Bw..h..-....\..
#     00D0: C9 07 85 93 5A 31 9B D5   85 6D CC 74 3B 32 10 64  ....Z1...m.t;2.d
#     00E0: 77 36 B9 12 4D 52 9A 4B   2F AF A7 A6 5C 13 24 F2  w6..MR.K/...\.$.
#     00F0: ED 2C C3 EF 92 60 E4 65   62 33 23 B2 A9 FF 66 7E  .,...`.eb3#...f.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.518 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 86 E4 55 1A 20 18 74   0D 97 7F 80 98 3E 96 D0  ...U. .t.....>..
#     0010: 28 EE 8E F7 E5 73 C9 2A   D7 2C 8B 7F 84 0A C0 CB  (....s.*.,......
#     0020: 75 47 0F 45 1E 16 3C E0   1D 28 DC 4F E9 E9 0D 35  uG.E..<..(.O...5
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.519 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:50.575 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E2 B5 1B DF 58 E6 96 25 7F 69 A0 6B 43 6A E6 B2 39 05 2E F1 86 C8 A9 92 5C 31 11 D3 E6 3B 56 3F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 10:40:50.852 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 10:40:50.853 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 10:40:51.781; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 10:40:51.787; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 10:40:52.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 10:40:52.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 10:40:52.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wZ4Foy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:52.211 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 0F 7F C7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:25.000 UTC",
#     "not  after"         : "2024-01-10 10:40:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 2A D6 8F 99 32 6A 9F   6C 3C 05 91 6A EF 9A B5  .*...2j.l<..j...
#         0010: 1F D4 57 7D                                        ..W.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:52.216 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 96 D1 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:17.000 UTC",
#     "not  after"         : "2024-01-10 10:40:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 10:40:52.230 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:52.455 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.455 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:52.457 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:40:52.457 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.463 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.474 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.475 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:40:52.477 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "38 B5 8A 60 ED 5C 7B 6A BF 06 A1 F5 E6 D3 37 D6 55 76 B9 30 C6 9E BD 1C 91 E4 58 78 40 2F F7 ED",
#   "session id"          : "79 69 95 E6 67 01 9C 0B 67 71 B5 28 56 48 C5 F4 E1 66 1B 07 76 33 1C E3 F9 53 C4 17 DC 89 9D CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 E9 61 2E 52 C4 48 72   86 97 FA 7F F8 0E F9 5A  ..a.R.Hr.......Z
#             0010: FE 28 4C E7 B7 96 1E FA   21 E1 08 ED AC 69 FF 62  .(L.....!....i.b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.577 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A4 70 B3 9A F9 9C 71 20 9A 8A 68 EA EA B3 BA E0 A7 DC F4 52 E7 29 31 DA 97 96 CD 9B B9 EC CC A3",
#   "session id"          : "79 69 95 E6 67 01 9C 0B 67 71 B5 28 56 48 C5 F4 E1 66 1B 07 76 33 1C E3 F9 53 C4 17 DC 89 9D CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B5 A0 69 6B EC AD FB F9   FA 59 30 46 CF 49 3D 0E  ..ik.....Y0F.I=.
#           0010: 0D 5D 7F BE 95 21 28 8E   D1 2F 0D 57 BA 5F 27 60  .]...!(../.W._'`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.578 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.580 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.580 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.582 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.591 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.593 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.594 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.600 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.601 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.601 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.601 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.603 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.605 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 26 88 B9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:21.000 UTC",
#       "not  after"         : "2024-01-10 10:40:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 36 5B FB 46 50 35 34   92 81 BE A6 C1 01 EB D6  .6[.FP54........
#           0010: 9A B1 56 FE                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.606 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:52.671 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:52.672 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:52.672 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:40:52.672 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.697 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F F3 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 10:40:19.000 UTC",
#     "not  after"         : "2024-01-10 10:40:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#         0010: 98 F1 91 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#         0010: B4 05 9D DD                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.701 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 C0 D0 A4 C5 6C 89 9B   A3 F1 AF ED 63 BB 1E 44  `....l......c..D
#     0010: BA 0B 72 D9 6E FF A5 8A   EB 68 D5 92 9C C0 05 5F  ..r.n....h....._
#     0020: 9B 9F 30 34 2A EA FD F4   8F 0F 39 D2 D6 20 5B 57  ..04*.....9.. [W
#     0030: 56 0D C6 1D 79 87 05 30   58 08 73 32 CC B9 CE B6  V...y..0X.s2....
#     0040: 94 F1 A9 23 0D 16 4A 47   3E CD C1 F0 BE D4 27 D2  ...#..JG>.....'.
#     0050: E8 38 01 1F 17 92 E9 68   58 F2 97 41 76 C9 33 BA  .8.....hX..Av.3.
#     0060: 67 0E 4B B8 55 EB 9C 33   97 D6 32 9E 24 FB 13 16  g.K.U..3..2.$...
#     0070: 1C 77 11 1F 42 A4 E3 F8   2C DA AB 3F 5C 41 BF D3  .w..B...,..?\A..
#     0080: 71 C4 F5 16 67 44 8F 97   D9 8C 3E C0 56 D7 15 0A  q...gD....>.V...
#     0090: 87 EC 0B 17 49 C3 E8 0C   C2 D2 98 1F BB 2B 2E 28  ....I........+.(
#     00A0: E2 8F D2 9F A4 8D 3D 10   D1 DE 77 00 FB 91 45 8D  ......=...w...E.
#     00B0: B4 FB 5F 04 74 A3 49 5B   65 73 A2 A3 A3 8B 72 13  .._.t.I[es....r.
#     00C0: 27 2C 6C 82 2C 23 EB 17   A6 2F 1D 3D F5 69 C7 F6  ',l.,#.../.=.i..
#     00D0: 19 B5 58 EC 70 D6 22 49   D3 A3 5F 5F F1 A5 90 04  ..X.p."I..__....
#     00E0: 66 DA E4 B7 D7 F4 4A 42   A7 9B F1 38 97 DC A6 7C  f.....JB...8....
#     00F0: 92 EB 64 BE 04 0A 8E DD   7C 49 63 2B D3 51 C7 1D  ..d......Ic+.Q..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.703 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B3 66 75 71 0E 58 AD 9C   3F 00 3B B4 A6 64 F2 86  .fuq.X..?.;..d..
#     0010: DA C9 80 DC F3 9C 0F 77   D5 B2 4F 85 45 46 1D 55  .......w..O.EF.U
#     0020: 3F 1E A6 C3 39 02 85 DA   2A 05 56 4E DC 25 FC 14  ?...9...*.VN.%..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.705 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:52.706 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.706 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:52.707 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.707 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 10:40:52.707 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 10:40:52.707 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.708 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.710 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 0F 7F C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:25.000 UTC",
#       "not  after"         : "2024-01-10 10:40:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 2A D6 8F 99 32 6A 9F   6C 3C 05 91 6A EF 9A B5  .*...2j.l<..j...
#           0010: 1F D4 57 7D                                        ..W.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F F3 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:19.000 UTC",
#       "not  after"         : "2024-01-10 10:40:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#           0010: 98 F1 91 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.736 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8E 78 E0 BA CF 67 F2 63   45 1C 4D 40 05 21 23 F9  .x...g.cE.M@.!#.
#     0010: 61 03 38 B3 9D 58 E3 64   9E A4 C0 E9 BB C3 6E F8  a.8..X.d......n.
#     0020: 8E E3 2A E4 51 2A 02 88   F0 C7 4B 7C AA AB 5B F4  ..*.Q*....K...[.
#     0030: A9 15 05 0E AF DC 79 DA   8B 8B 8B 8D B3 3E CC 17  ......y......>..
#     0040: 40 BE E3 7A 26 4F C5 54   C9 73 9F 0E C3 CA CF 41  @..z&O.T.s.....A
#     0050: 03 63 21 89 86 2A 3F 0A   AA B1 98 F8 32 34 EE D2  .c!..*?.....24..
#     0060: FD C4 04 2B 75 D4 91 29   23 33 42 61 B2 D1 D1 2A  ...+u..)#3Ba...*
#     0070: 2A 89 BF 22 81 36 FA 92   57 A5 CD 35 BD B1 AA 27  *..".6..W..5...'
#     0080: 9C 90 2F 4E 3C EE 97 17   55 0E 7A 28 B6 6E 21 65  ../N<...U.z(.n!e
#     0090: F2 FC D2 42 76 AB E9 9D   13 2D 41 77 6C D9 4C 89  ...Bv....-Awl.L.
#     00A0: 10 7C C3 90 13 32 AE D9   1A 65 4A EE 0D BF 61 68  .....2...eJ...ah
#     00B0: 9C E4 E6 8A 2D F0 AF 3B   21 CB 3C 1F A9 27 17 3C  ....-..;!.<..'.<
#     00C0: A7 E8 6A 53 6E 2B DA 61   0D 04 F7 F7 06 95 40 8C  ..jSn+.a......@.
#     00D0: 99 6E EA 6E 4C ED 49 54   70 57 F9 B9 E1 C1 5B CD  .n.nL.ITpW....[.
#     00E0: EF 91 93 6D 0B FF 3C EC   1C 2C 0D BD 5A 40 6B 45  ...m..<..,..Z@kE
#     00F0: 22 3F 8E 02 92 53 64 3E   F0 99 09 8F 32 BD DB 31  "?...Sd>....2..1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.737 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF CA AB DF AE E9 BA 62   64 15 C1 79 33 F4 9D 26  .......bd..y3..&
#     0010: BA B3 89 88 CC 2D 73 E5   65 87 4E 8A 69 B3 D9 14  .....-s.e.N.i...
#     0020: D3 67 19 2E F9 69 FD EF   E0 18 99 3C 2F 50 8D 4F  .g...i.....</P.O
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.738 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:40:52.803 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6D 63 93 3A B1 52 29 8F 99 71 03 26 3B C0 D0 56 F2 77 1D 4E 40 A8 A3 A1 2F C9 43 A8 30 8F D8 9C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 10:40:53.088 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 10:40:53.089 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 10:41:04.410; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 10:41:04.759 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F F3 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:19.000 UTC",
#       "not  after"         : "2024-01-10 10:40:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#           0010: 98 F1 91 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6F 0A A3 DB F4 6A F1 B3   F9 74 76 BC D3 39 5A 18  o....j...tv..9Z.
#           0010: B4 05 9D DD                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 96 D1 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 10:40:17.000 UTC",
#       "not  after"         : "2024-01-10 10:40:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED F3 40 11 89 B2 69 F8   56 AA 89 B9 2A ED D3 47  ..@...i.V...*..G
#           0010: 98 F1 91 77                                        ...w
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 10:41:04.775 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:41:04.921 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:41:04.921 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:41:04.921 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:41:04.921 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:41:05.003 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.003 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:41:05.005 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 10:41:05.005 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.011 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 10:41:05.025 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2C BA B4 18 4B BB 13 A2 E2 68 32 77 62 ED 54 28 A3 0D 0B F4 47 AA 68 D0 0B 2D 42 4E 15 20 9A 31",
#     "session id"          : "85 8E B9 50 59 E5 DA 20 EE 89 E2 5D F0 B2 F8 5B 28 39 CC BB 4D F2 D5 31 5B 74 9D 6E E9 90 DA 7E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 92 29 4E 67 3D C7 12 86   AC 5C 89 B6 45 5E 0C EA  .)Ng=....\..E^..
#               0010: 5E 8D 62 8B CC 7A 4F 5C   A7 0D 07 63 C4 4A 70 00  ^.b..zO\...c.Jp.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.043 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "FC 80 0D EB 24 23 7F 90 DE 1A 2A 20 AA FA 67 85 EF 1D 20 9E A9 46 CD CB 57 53 5B 88 C8 2C 2C F6",
#     "session id"          : "85 8E B9 50 59 E5 DA 20 EE 89 E2 5D F0 B2 F8 5B 28 39 CC BB 4D F2 D5 31 5B 74 9D 6E E9 90 DA 7E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 50 62 47 BC BB 5C 59   1A 97 BB C2 D2 0C 95 AD  .PbG..\Y........
#             0010: 09 DF 29 7F EE 2C F0 BC   A3 0E A0 85 E3 94 9B 53  ..)..,.........S
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.044 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.044 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.046 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.046 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 10:41:05.046 UTC|

[...truncated too long message...]

er|2023-10-12 10:42:23.492 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 10:42:23.492 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43144/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28120ms
ok 65 stop command for single port in 30872ms
ok 66 status detects locally running solr in 14400ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6613ms
ok 70 upconfig in 2647ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1218ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=375694375F869E1D -Ptests.file.encoding=US-ASCII

  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=375694375F869E1D -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 17s
654 actionable tasks: 638 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m58s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5648 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5648/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46559/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 08:34:14.761; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 08:34:14.767; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 08:34:15.664; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 08:34:15.708; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23260ms
ok 61 start solr with client truststore and security manager in 25430ms
not ok 62 start solr with mTLS needed in 58064ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lzbJDO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46559.
#
# Started Solr server on port 46559 (pid=199633). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46560.
#
# Started Solr server on port 46560 (pid=200088). Happy searching!
#
# INFO  - 2023-10-12 08:35:39.460; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 08:35:39.465; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 08:35:39.826; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 08:35:39.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 08:35:39.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:39.861 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 13 15 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:15.000 UTC",
#     "not  after"         : "2024-01-10 08:35:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F9 EF 8C E5 82 6C 0A 0D   0E 5D 67 63 95 AA 60 C5  .....l...]gc..`.
#         0010: 94 BA A8 37                                        ...7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:39.865 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 C4 0C FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:07.000 UTC",
#     "not  after"         : "2024-01-10 08:35:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:39.880 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:39.980 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:39.980 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:39.980 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:39.980 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:40.116 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.116 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:40.118 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:40.118 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.135 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:40.137 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "84 35 B6 15 14 E3 A3 53 AF 03 02 BE 7D 6B E6 C2 E4 65 B5 07 5F 27 68 15 1A 68 D8 70 F2 8E E0 12",
#   "session id"          : "D3 06 C6 13 0D 7E 6E 57 1B 6F B6 F0 FD 2E 4E 5D F7 0F 12 57 4D BB 20 7B 09 95 18 B0 64 35 BA F1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 F3 25 F1 FD 23 5A F9   0C 31 36 04 EC E3 B9 05  ..%..#Z..16.....
#             0010: 72 BF 4B 56 46 F9 74 7E   7D BA A0 0F FF 79 01 31  r.KVF.t......y.1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.255 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7F FC 94 F8 C0 EB 5E BD 01 D5 7B 39 80 20 35 7C 19 B5 FE D8 5C 85 6A 26 47 AB 1E EE 3C EA B2 F8",
#   "session id"          : "D3 06 C6 13 0D 7E 6E 57 1B 6F B6 F0 FD 2E 4E 5D F7 0F 12 57 4D BB 20 7B 09 95 18 B0 64 35 BA F1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BF B4 72 DD 3B EE 5E A4   CB A0 A1 06 4C 74 55 E0  ..r.;.^.....LtU.
#           0010: 6E 3F CA FD FF 23 49 FC   71 D4 FA 49 07 A3 E9 26  n?...#I.q..I...&
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.256 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.256 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.257 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.257 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.257 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.257 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.258 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.258 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.258 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.258 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.260 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.260 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.261 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.269 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.271 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.272 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.275 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.276 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.277 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.278 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.278 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.279 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.279 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.280 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.280 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.280 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.283 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 0A 8F 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:11.000 UTC",
#       "not  after"         : "2024-01-10 08:35:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 89 0B E1 7D 82 82 31   90 C5 DC 47 12 BA 9E FD  ,......1...G....
#           0010: 97 18 E6 DE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.283 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.360 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.363 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 14 51 42 4B 89 66 2C   F7 1D 49 1C 21 43 D8 FF  ..QBK.f,..I.!C..
#     0010: 83 41 8B 8B 16 E2 00 F9   9D AB A8 EE 23 F7 5E 51  .A..........#.^Q
#     0020: 10 31 6E F9 2D 43 4C 84   92 78 13 6C 26 5D AB 1E  .1n.-CL..x.l&]..
#     0030: E1 55 DD 51 08 46 0B 38   8C 3B A3 6A 37 55 E6 89  .U.Q.F.8.;.j7U..
#     0040: 61 57 6C AA 6B 31 6F BA   2A B3 92 72 D6 7A 11 6A  aWl.k1o.*..r.z.j
#     0050: 4C D6 A0 53 1E C6 AC 5C   9C E2 01 67 5A 79 FA 5D  L..S...\...gZy.]
#     0060: C7 41 C6 62 C9 1C AD 32   DD F2 8F 0F AA 57 E5 CC  .A.b...2.....W..
#     0070: 1D 1C 0A F5 8B C1 8F F6   76 22 A9 84 9A 4B C9 18  ........v"...K..
#     0080: D4 3B C7 51 32 61 71 A6   4A 02 1D EF FD 81 DA 1B  .;.Q2aq.J.......
#     0090: 0F B6 ED 8C D3 FF 5F 3E   20 0F C6 1E 98 37 A4 EF  ......_> ....7..
#     00A0: 44 7B 75 05 62 5E 54 A0   89 0F 90 1E DC DA 20 B4  D.u.b^T....... .
#     00B0: 80 FF 86 87 29 06 AB D5   7B 0E 92 88 F6 98 26 1E  ....).........&.
#     00C0: 5E 51 08 26 97 C2 30 50   D7 68 DF 08 0D 04 85 A4  ^Q.&..0P.h......
#     00D0: C7 55 75 10 E9 6C 2D B2   EB 95 3F 47 9F A8 10 F1  .Uu..l-...?G....
#     00E0: 4D D5 48 52 60 67 EA E9   19 E7 03 34 5E 30 36 DF  M.HR`g.....4^06.
#     00F0: ED D9 D2 96 F5 40 97 D9   DF 16 E3 5A B7 24 FC 30  .....@.....Z.$.0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.365 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE ED 75 6C 96 49 49 46   98 5A B5 83 68 10 4D 50  ..ul.IIF.Z..h.MP
#     0010: 8E 90 57 A9 58 1E 99 B7   74 16 D8 D2 04 77 EB F3  ..W.X...t....w..
#     0020: 22 6D 2B 56 01 64 3F 8B   9D F8 02 2D 27 70 80 BC  "m+V.d?....-'p..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.367 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:40.368 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.369 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:40.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.369 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:40.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:40.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.370 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.373 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 13 15 C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:15.000 UTC",
#       "not  after"         : "2024-01-10 08:35:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F9 EF 8C E5 82 6C 0A 0D   0E 5D 67 63 95 AA 60 C5  .....l...]gc..`.
#           0010: 94 BA A8 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 CC 1B 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:09.000 UTC",
#       "not  after"         : "2024-01-10 08:35:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#           0010: 7B 6F 61 EB                                        .oa.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.399 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 87 11 70 DF 9C 21 E3 5B   90 B8 09 89 38 1B 1D F2  ..p..!.[....8...
#     0010: 80 41 C4 3F C8 11 35 12   AF 1C C3 64 F0 E9 B6 50  .A.?..5....d...P
#     0020: AD 97 81 87 37 80 CE 80   73 C7 FA EC B2 C0 97 D0  ....7...s.......
#     0030: 59 C9 D0 17 21 7A EC EB   7A 8E 29 AE A6 12 30 23  Y...!z..z.)...0#
#     0040: 39 86 26 50 00 65 B2 E5   08 44 08 06 FB 24 F2 62  9.&P.e...D...$.b
#     0050: FB DB E0 C5 33 35 B5 1C   40 75 26 6D 2C 72 BE 80  ....35..@u&m,r..
#     0060: 60 5F 7B 03 D4 B7 82 DE   7F 58 F2 21 C7 90 A1 68  `_.......X.!...h
#     0070: B8 D1 FF 10 F3 16 A9 8A   A5 D3 CB E9 EA DC BE 9D  ................
#     0080: D5 CD A2 EA 16 71 D4 CB   4D 4B E8 C8 A8 2B AD 87  .....q..MK...+..
#     0090: 40 43 87 AC 9E D9 C1 21   E9 B3 A2 D5 BE 3E CA 54  @C.....!.....>.T
#     00A0: 12 2B 7B B8 94 2C 5C 2B   14 2D B7 3B A9 D9 A0 ED  .+...,\+.-.;....
#     00B0: 4C 5C 3D E9 C1 AD C8 6E   01 4C DC 1D D3 45 20 24  L\=....n.L...E $
#     00C0: 77 06 8E 4B EF 69 85 1A   8D E3 6F 33 06 E1 C9 91  w..K.i....o3....
#     00D0: CF 35 40 D5 51 A6 93 5D   FE 02 34 F9 39 44 35 19  .5@.Q..]..4.9D5.
#     00E0: 48 B9 D9 3B D4 0B 10 01   80 4F 63 5D C5 6C D9 A0  H..;.....Oc].l..
#     00F0: 41 4B A6 9A A8 AC F6 24   F8 99 92 A7 A0 4F 2B 88  AK.....$.....O+.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.400 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DD 24 C6 FF 16 3D D9 89   BA 51 40 AB FB 46 3C 7C  .$...=...Q@..F<.
#     0010: 7D 4F B7 22 6E D5 CB 71   D3 AB FB 90 ED 66 58 E9  .O."n..q.....fX.
#     0020: 92 AE EE FD 37 35 33 D6   56 0D 0E 95 E7 8D 58 D4  ....753.V.....X.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.401 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:40.455 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A2 37 39 F0 C7 89 1A E6 8E E5 0E D7 6D ED B1 2D D1 69 C5 A1 44 C8 3C 44 CB AD B7 38 18 21 33 2A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 08:35:40.742 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 08:35:40.743 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 08:35:41.659; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 08:35:41.665; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 08:35:42.030; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 08:35:42.033; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 08:35:42.034; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lzbJDO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:42.066 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 13 15 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:15.000 UTC",
#     "not  after"         : "2024-01-10 08:35:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F9 EF 8C E5 82 6C 0A 0D   0E 5D 67 63 95 AA 60 C5  .....l...]gc..`.
#         0010: 94 BA A8 37                                        ...7
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:42.071 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 C4 0C FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:07.000 UTC",
#     "not  after"         : "2024-01-10 08:35:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:42.085 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:42.319 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:42.321 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:42.322 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.327 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.338 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.338 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.338 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:42.340 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "43 51 CE A3 4C A3 2C 24 E6 B6 AA 60 A3 72 E5 20 86 3E 2B E7 A0 6B 5F 1A 3B B9 1C 51 BD E5 41 3B",
#   "session id"          : "37 4D 54 80 82 20 5B A4 4C 1D A5 B5 B3 DD CD F1 34 DE 5E 9F 8F 1C BB EF 0E 9C 90 83 BE D0 39 A1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 09 36 C2 23 01 97 26 7B   D3 DC C3 8A 00 41 E9 D8  .6.#..&......A..
#             0010: 33 18 4E 04 4A 8C 00 AB   D3 A4 F4 EC 81 B6 CB 5A  3.N.J..........Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.432 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F3 7C 11 0A 07 75 3C 4D 0B 37 59 A9 2B 75 91 64 80 DF AA BD 7E 49 6D 2D 1B FC 2E 2F BC 29 1E 07",
#   "session id"          : "37 4D 54 80 82 20 5B A4 4C 1D A5 B5 B3 DD CD F1 34 DE 5E 9F 8F 1C BB EF 0E 9C 90 83 BE D0 39 A1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 07 B9 6F 58 8E C4 CE 88   32 B6 0C E6 59 AF A2 B1  ..oX....2...Y...
#           0010: 0D E6 3D 4E CE 53 7A 12   5C E1 45 DF 03 83 16 3C  ..=N.Sz.\.E....<
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.433 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.433 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.435 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.437 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.438 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.440 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.447 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.448 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.449 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.453 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.455 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.456 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.456 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.456 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.457 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.458 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.460 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 0A 8F 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:11.000 UTC",
#       "not  after"         : "2024-01-10 08:35:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 89 0B E1 7D 82 82 31   90 C5 DC 47 12 BA 9E FD  ,......1...G....
#           0010: 97 18 E6 DE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.461 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:42.516 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:42.517 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:42.517 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:35:42.517 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.545 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 CC 1B 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 08:35:09.000 UTC",
#     "not  after"         : "2024-01-10 08:35:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#         0010: 7B 6F 61 EB                                        .oa.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#         0010: 56 3D 7E 08                                        V=..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.549 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 71 77 B5 B2 E9 CD 33   01 21 89 8D 64 1D 93 B4  pqw....3.!..d...
#     0010: 74 20 82 B1 76 0A 6A 7A   68 70 26 C8 CB C5 37 D4  t ..v.jzhp&...7.
#     0020: 79 6E 92 BB 14 67 7A 67   A0 5C 70 30 2A E9 BA AC  yn...gzg.\p0*...
#     0030: F2 CA 9D 8B 11 59 84 45   42 3D AE 3D D2 8F 9C 7B  .....Y.EB=.=....
#     0040: A8 DF 9E A1 08 92 E2 1D   0C 4C D6 40 B7 C8 31 9D  .........L.@..1.
#     0050: 28 56 8D 66 FD 86 66 C8   CA 87 C4 63 B7 F1 60 33  (V.f..f....c..`3
#     0060: AC 75 AE C9 7B 78 77 06   E9 07 98 68 CA F6 DA 77  .u...xw....h...w
#     0070: 62 F0 49 A3 B9 17 2F 34   BD 8C BC 64 5E 12 A0 E8  b.I.../4...d^...
#     0080: EC AA 34 05 00 34 7C 06   7F 26 E8 A0 5F 67 90 8C  ..4..4...&.._g..
#     0090: 0E B8 0F 29 20 E7 DB C2   C3 97 8D 6B 2C EA AE A7  ...) ......k,...
#     00A0: C0 6E DA C6 A5 6C FC 4E   EE D0 EA 48 7C 71 44 27  .n...l.N...H.qD'
#     00B0: ED 48 82 DA 01 ED 59 00   3C 65 2A 8D 7E F1 C6 D7  .H....Y.<e*.....
#     00C0: C1 3F 85 C4 B7 80 D9 22   75 81 05 E7 BA FE 35 37  .?....."u.....57
#     00D0: 79 EC B9 C2 A9 54 3E C8   9C 36 61 0B 29 18 8F AF  y....T>..6a.)...
#     00E0: E1 B5 4E DF D0 80 03 4F   4D 0F 08 29 98 6C 9A F8  ..N....OM..).l..
#     00F0: D6 DD D9 C3 1E ED 0E DC   27 B5 87 29 60 82 76 1F  ........'..)`.v.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.551 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 3E 37 22 42 1A 04 8B   2E 03 4B 46 F1 5B B7 FB  .>7"B.....KF.[..
#     0010: C3 49 6E 4B 46 F1 C5 CD   B7 D2 EB 22 F5 6E D9 A4  .InKF......".n..
#     0020: 99 03 F1 09 70 12 17 90   40 CD CE 9C A7 30 4F 9F  ....p...@....0O.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.553 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:42.555 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.555 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:42.555 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.555 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 08:35:42.555 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:42.556 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.556 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.559 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 13 15 C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:15.000 UTC",
#       "not  after"         : "2024-01-10 08:35:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F9 EF 8C E5 82 6C 0A 0D   0E 5D 67 63 95 AA 60 C5  .....l...]gc..`.
#           0010: 94 BA A8 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 CC 1B 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:09.000 UTC",
#       "not  after"         : "2024-01-10 08:35:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#           0010: 7B 6F 61 EB                                        .oa.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.584 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C0 96 28 A4 18 EF C8 BE   14 0C E4 78 81 A3 F1 6E  ..(........x...n
#     0010: A7 EF 25 3C 43 A7 9C D9   DF D0 20 AB 4C 06 D8 18  ..%<C..... .L...
#     0020: 6C 3D 24 FF 1C EA 19 56   55 65 0E B0 8F 63 8C 7D  l=$....VUe...c..
#     0030: D4 07 48 0A E5 A7 AB D0   CE 49 E6 5B C4 0C 28 05  ..H......I.[..(.
#     0040: AB 14 47 25 96 D1 F0 36   31 95 E5 E0 97 CC 95 40  ..G%...61......@
#     0050: AE 99 EF 3A 9C C6 CC 19   D3 BF B3 51 50 E9 86 55  ...:.......QP..U
#     0060: 35 0A 5B 27 78 5B B1 CF   97 BB 48 10 F0 9B 5C FE  5.['x[....H...\.
#     0070: 46 89 5C 42 AB 08 B4 A8   D4 E6 3D A6 32 C5 D7 3D  F.\B......=.2..=
#     0080: E1 91 2D F2 4F 13 22 02   69 8A DA 5F BB 6A 27 53  ..-.O.".i.._.j'S
#     0090: A7 67 AE D1 6B 12 F5 1A   97 D0 1E 60 8E F6 E7 51  .g..k......`...Q
#     00A0: EB 06 A0 A8 73 0C 8B 80   2A 7E 68 19 D7 65 67 BF  ....s...*.h..eg.
#     00B0: DE 30 A7 80 3D 19 E5 DD   48 A2 BD 8E 1A C7 F4 DC  .0..=...H.......
#     00C0: 9C B5 F1 78 8C C1 76 0C   30 42 EA 3D CA A5 03 7A  ...x..v.0B.=...z
#     00D0: B9 2F 41 36 04 92 A9 45   31 CE 11 E2 4E 15 93 22  ./A6...E1...N.."
#     00E0: CA 32 24 E0 9F 11 19 42   DB 1D B3 AD 95 96 3E 74  .2$....B......>t
#     00F0: 52 2C 11 D6 46 FE 39 66   3C 63 DF D9 35 25 FF D7  R,..F.9f<c..5%..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.585 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 11 AA EC FF 1F 22 81 74   41 A4 02 C2 43 05 54 2C  .....".tA...C.T,
#     0010: 8E ED E0 CD B2 99 F3 BC   38 E5 E9 D8 5E 05 C8 F3  ........8...^...
#     0020: 73 78 47 60 A6 69 AF 47   33 F3 06 4E 33 30 5B DA  sxG`.i.G3..N30[.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.586 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:42.642 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2B 50 86 16 76 3D 5D D8 6B 40 8C 67 F5 13 D8 96 51 8F B5 ED 7A FC 5A 69 92 F7 C3 25 53 38 37 E8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 08:35:42.913 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 08:35:42.914 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 08:35:53.671; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:54.001 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 C4 0C FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:07.000 UTC",
#       "not  after"         : "2024-01-10 08:35:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#           0010: 7B 6F 61 EB                                        .oa.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 CC 1B 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 08:35:09.000 UTC",
#       "not  after"         : "2024-01-10 08:35:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 47 18 98 AF 95 CE F9 FB   2D 3F 7B DF 17 72 BA 7B  G.......-?...r..
#           0010: 7B 6F 61 EB                                        .oa.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 D8 1A 24 2E D8 32 9B   A8 AB 52 44 8C 21 8E CA  E..$..2...RD.!..
#           0010: 56 3D 7E 08                                        V=..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 08:35:54.016 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:54.250 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.250 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:54.252 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 08:35:54.252 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.257 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.269 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.269 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.269 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 08:35:54.271 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "36 93 7F 98 F9 AC 02 F4 4D A0 A4 07 32 43 BB 79 14 BE 35 55 3F 99 AF E1 AA AC E0 93 F4 DC D0 E7",
#     "session id"          : "30 39 06 E7 9E FE 75 A1 14 A7 5A 96 7A 53 23 0C F7 D7 A2 EF C5 FF 7D 14 F9 AC BD DF 86 54 1D 77",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3F 3F 55 BF AD 90 11 75   D4 E4 3C 3E 89 B7 09 7D  ??U....u..<>....
#               0010: D9 5B 2C 1F BA BA F7 45   5A B9 77 D7 A5 DB 67 7A  .[,....EZ.w...gz
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.293 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D2 4C E1 4B 6C AC B3 37 03 54 02 95 05 A3 4C EE 2D 84 CC 38 5C 9F 90 EE B3 D3 FA 47 85 BA B0 8B",
#     "session id"          : "30 39 06 E7 9E FE 75 A1 14 A7 5A 96 7A 53 23 0C F7 D7 A2 EF C5 FF 7D 14 F9 AC BD DF 86 54 1D 77",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 80 84 D0 F1 41 E8 29 05   DF 55 C3 C1 8F 73 89 F5  ....A.)..U...s..
#             0010: 8B 8A 30 EC F9 E1 51 92   D1 0D 74 63 88 47 D3 23  ..0...Q...tc.G.#
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.293 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.293 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.296 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.298 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.298 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.298 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:54.299 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:54.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.307 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.308 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.310 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.313 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.313 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:35:54.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 08:35:54.316 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 08:37:15.284 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:37:15.324 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:37:15.325 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:37:15.325 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 08:37:15.325 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46560/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28052ms
ok 65 stop command for single port in 30849ms
ok 66 status detects locally running solr in 14398ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2183ms
ok 69 copying files around in 6597ms
ok 70 upconfig in 2630ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 21s
673 actionable tasks: 657 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m50.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5647 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5647/

1 tests failed.
FAILED:  org.apache.solr.cloud.ReindexCollectionTest.testAbort

Error Message:
java.lang.AssertionError: {responseHeader={status=0, QTime=9}, status={state=running, msg=found [87185c29-0923-4e0b-903e-43c38ebfb028] in running tasks}}

Stack Trace:
java.lang.AssertionError: {responseHeader={status=0, QTime=9}, status={state=running, msg=found [87185c29-0923-4e0b-903e-43c38ebfb028] in running tasks}}
	at __randomizedtesting.SeedInfo.seed([F04F33C6559B0FA1:962C845121419DD8]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.junit.Assert.assertNotNull(Assert.java:713)
	at org.apache.solr.cloud.ReindexCollectionTest.testAbort(ReindexCollectionTest.java:425)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6306 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34419/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 06:50:52.983; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 06:50:52.988; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 06:50:54.219; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 06:50:54.262; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22417ms
ok 61 start solr with client truststore and security manager in 24645ms
not ok 62 start solr with mTLS needed in 56912ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-a7dPko/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34419.
#
# Started Solr server on port 34419 (pid=201051). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34420.
#
# Started Solr server on port 34420 (pid=201483). Happy searching!
#
# INFO  - 2023-10-12 06:52:16.392; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 06:52:16.398; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 06:52:16.779; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 06:52:16.782; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 06:52:16.782; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:16.814 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E8 B5 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:52.000 UTC",
#     "not  after"         : "2024-01-10 06:51:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 6B 64 70 79 62 F8 A7   CC 15 AB 54 A1 A0 6E 97  .kdpyb.....T..n.
#         0010: F0 10 0D 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:16.819 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 08 AB 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:44.000 UTC",
#     "not  after"         : "2024-01-10 06:51:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:16.833 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:16.921 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:16.922 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:16.922 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:16.923 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:17.058 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:17.060 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:17.061 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.066 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.078 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.078 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.078 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:17.080 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 BE 0C 28 32 06 D2 91 4C 2B 04 36 C9 9D 65 A1 65 9F 85 11 B9 D2 24 53 D9 0E 09 B8 6C 41 42 53",
#   "session id"          : "A9 E5 9F 63 B3 15 92 48 3D 39 89 D9 DC 7F 06 31 EF D9 FE 56 65 0E B8 CE 5B 86 B5 AE 92 43 19 94",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EF 4A AA 6F AC DC 0A 00   F6 2C 1A 3B F5 AB 8D 25  .J.o.....,.;...%
#             0010: B9 BA 9E 3D 69 CB C6 95   94 66 3A 58 13 67 63 53  ...=i....f:X.gcS
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.176 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 EE 2C 9E A2 56 5A 84 B3 20 26 09 38 4A EE 59 F9 A2 A2 FD EE F7 2D F0 58 1C C8 45 D2 24 06 F6",
#   "session id"          : "A9 E5 9F 63 B3 15 92 48 3D 39 89 D9 DC 7F 06 31 EF D9 FE 56 65 0E B8 CE 5B 86 B5 AE 92 43 19 94",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9F EC AF 45 CF 47 AD E4   C8 4D C8 A5 6E 5E DF 2B  ...E.G...M..n^.+
#           0010: 18 BC AA 19 1C 40 E4 54   87 17 40 92 D2 0F 77 07  .....@.T..@...w.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.176 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.176 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.179 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.181 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.182 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.184 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.192 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.195 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.196 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.202 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.203 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.203 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.203 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.203 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.207 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.207 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.208 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.208 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.209 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.210 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.213 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 50 D2 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:48.000 UTC",
#       "not  after"         : "2024-01-10 06:51:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 61 84 64 F9 2C DC 61   A6 55 F9 9E F4 0A 9A 27  5a.d.,.a.U.....'
#           0010: 63 D0 67 AB                                        c.g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.213 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.302 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.307 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 42 3D 6B 32 F4 0E 88 44   CC B9 5E BD 8D A5 CE CA  B=k2...D..^.....
#     0010: 59 6E A8 F9 48 78 E3 D4   B1 8B F1 89 F4 80 98 E7  Yn..Hx..........
#     0020: 31 03 07 52 AA AB 6E 9F   75 E4 F2 C8 B9 A8 3C EA  1..R..n.u.....<.
#     0030: 45 2C C7 3A 01 D1 0C B1   8D EE 44 FA D0 98 43 9A  E,.:......D...C.
#     0040: A1 88 DA 56 E9 22 02 BE   EC A2 6A 69 BE 84 73 29  ...V."....ji..s)
#     0050: 2B 12 A2 1C 77 F2 A5 E3   25 AD 5F E7 9A C5 F9 8D  +...w...%._.....
#     0060: 2E 7F 20 96 E5 E6 4D A7   16 20 7B 63 91 EC CF 7A  .. ...M.. .c...z
#     0070: C5 35 23 96 D3 54 EC 7F   99 AA 66 BF 09 D6 83 70  .5#..T....f....p
#     0080: 9A AA DD ED 48 13 78 30   BD 7B 88 D3 10 53 55 1C  ....H.x0.....SU.
#     0090: 2F 7C 7D 16 68 D1 21 BF   B1 66 A1 75 7B 1E BD 56  /...h.!..f.u...V
#     00A0: 3F 3F F6 A0 EA 6D 40 EF   1B 45 D3 DA 40 43 A5 EE  ??...m@..E..@C..
#     00B0: 0F 01 16 B2 98 F7 C7 DE   8A 71 2E 59 3B 62 2C F1  .........q.Y;b,.
#     00C0: 6F D7 C2 46 D4 CB 09 C0   A5 DC 00 8C 4C 58 F8 8A  o..F........LX..
#     00D0: F8 61 CC 1F 8A B3 57 1C   C1 09 82 82 93 3C 61 D5  .a....W......<a.
#     00E0: 9D 67 F2 85 3A D2 70 54   BB 45 AF A5 C9 DA 88 88  .g..:.pT.E......
#     00F0: D7 90 BA 28 E8 F4 4E EE   EA 3C CE C8 D9 FE A8 9A  ...(..N..<......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.309 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 00 0B 91 18 36 71 B9   0B 76 3C CC B2 6E 0A 04  .....6q..v<..n..
#     0010: C9 0F 78 05 CA 42 EA B4   8F A1 EB 98 15 76 18 7E  ..x..B.......v..
#     0020: 34 09 8E E2 26 F1 33 AE   F7 DE 7D F0 46 F2 88 8E  4...&.3.....F...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.312 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:17.313 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.314 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:17.314 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.314 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:17.315 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:17.315 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.316 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.318 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B E8 B5 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:52.000 UTC",
#       "not  after"         : "2024-01-10 06:51:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 6B 64 70 79 62 F8 A7   CC 15 AB 54 A1 A0 6E 97  .kdpyb.....T..n.
#           0010: F0 10 0D 22                                        ..."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 BE 0D CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:46.000 UTC",
#       "not  after"         : "2024-01-10 06:51:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#           0010: 5F A5 33 93                                        _.3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.360 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C 95 49 AD 56 74 BB 2E   00 92 76 C8 29 76 0F 37  L.I.Vt....v.)v.7
#     0010: 3A 98 4B 6B 49 C4 F1 73   51 E7 4D 1C 69 E5 85 19  :.KkI..sQ.M.i...
#     0020: E1 54 C8 17 C6 8B F1 6D   62 8D DA 12 A8 69 CD F9  .T.....mb....i..
#     0030: 2A 81 8F 06 09 31 35 AA   41 07 D3 E1 01 BB 1A 50  *....15.A......P
#     0040: 78 14 8C CC F9 73 20 C9   56 BC 3D 9B 59 7D 3C 76  x....s .V.=.Y.<v
#     0050: 98 7D C4 AB 8C DD C3 DB   22 C4 58 E9 79 93 06 90  ........".X.y...
#     0060: 29 80 99 0D 06 BC F5 D9   E0 AF F1 D9 3D 91 DC 3F  )...........=..?
#     0070: 16 E2 EF 64 C5 6E A9 93   F5 DD A0 19 69 0A 5B 25  ...d.n......i.[%
#     0080: 05 69 3E 9C 3D 09 36 5C   FA 3F 58 C9 E1 BE 1C A7  .i>.=.6\.?X.....
#     0090: 0D 09 29 90 FC 46 D1 E3   3B AF EE 8C 3E 2D 63 97  ..)..F..;...>-c.
#     00A0: C6 F6 A5 D9 4E 4C 8F C2   D2 FB BA 16 3D BD 1A D9  ....NL......=...
#     00B0: 67 95 D6 E5 5A FA 25 E8   9F 0D 8A 36 FD 88 24 41  g...Z.%....6..$A
#     00C0: BC 0E F9 95 8D 2B A3 1B   E8 58 26 F0 AE EA 76 06  .....+...X&...v.
#     00D0: 7C D3 55 BA 94 7E B3 FF   49 32 77 2E 2A C2 EE CB  ..U.....I2w.*...
#     00E0: 54 7C 8E 3A BE 0E 81 34   DE E8 C9 B5 2A 50 A7 59  T..:...4....*P.Y
#     00F0: 69 37 1B D7 20 EF 73 60   61 E9 92 E9 8A FC 1F 18  i7.. .s`a.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.362 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE 58 BB 88 84 F4 B5 CF   50 3F 83 F4 46 DF E9 6B  .X......P?..F..k
#     0010: DC 93 00 13 B7 D5 BB 55   BC 92 98 58 98 87 C1 C2  .......U...X....
#     0020: 27 2C E9 6C 53 0A 97 7E   A0 4B D7 A9 82 E8 0B 64  ',.lS....K.....d
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.363 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:17.428 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7C 04 03 4F 57 73 E4 1E 1B 2D 2C 69 C3 A1 40 EA 2B 7F DF 3D 9D EB C6 9F 53 7C 55 0B 8E 77 76 E8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 06:52:17.690 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 06:52:17.691 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 06:52:18.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 06:52:18.638; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 06:52:19.030; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 06:52:19.033; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 06:52:19.033; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-a7dPko/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:19.066 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E8 B5 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:52.000 UTC",
#     "not  after"         : "2024-01-10 06:51:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 6B 64 70 79 62 F8 A7   CC 15 AB 54 A1 A0 6E 97  .kdpyb.....T..n.
#         0010: F0 10 0D 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:19.070 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 08 AB 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:44.000 UTC",
#     "not  after"         : "2024-01-10 06:51:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:19.085 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:19.443 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:19.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:19.444 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:52:19.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:19.594 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.594 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:19.596 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:19.596 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.603 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.615 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.615 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.615 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:19.618 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9E 5B 1D 20 1F 2C 24 F0 A1 49 5A 42 83 3A 1C C9 AA D1 52 96 4E 23 DC 25 49 0E 09 65 FE D4 D4 BE",
#   "session id"          : "91 42 49 1D F0 FB 8E D3 DD B6 99 69 10 EB 79 9E 71 23 F9 67 22 59 51 E6 95 EF D2 4A 8D CD 25 45",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D4 49 19 0A 0C A2 E3 A2   97 B2 D1 53 4E 98 CB D5  .I.........SN...
#             0010: E7 8B B8 8C 26 DC 0B 4F   97 0A AC 9F D5 39 19 41  ....&..O.....9.A
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.731 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "68 CB 24 D1 4E 73 3A 92 24 E8 06 48 25 A1 2E DF 64 39 48 BD EB C9 38 F7 28 60 96 08 95 94 0E 35",
#   "session id"          : "91 42 49 1D F0 FB 8E D3 DD B6 99 69 10 EB 79 9E 71 23 F9 67 22 59 51 E6 95 EF D2 4A 8D CD 25 45",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5B 9B B6 99 D5 EB 44 BD   6E DA 42 25 E3 B0 36 14  [.....D.n.B%..6.
#           0010: D8 00 0F 84 0E 3C 46 79   1A F1 81 50 96 F6 4B 5C  .....<Fy...P..K\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.731 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.731 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.732 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.732 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.732 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.733 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.733 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.733 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.733 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.733 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.736 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.736 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.736 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.736 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.736 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.737 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.745 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.746 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.747 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.751 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.751 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.751 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.751 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.752 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.752 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.752 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.754 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.754 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.754 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.754 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.755 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.756 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.756 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.759 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 50 D2 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:48.000 UTC",
#       "not  after"         : "2024-01-10 06:51:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 61 84 64 F9 2C DC 61   A6 55 F9 9E F4 0A 9A 27  5a.d.,.a.U.....'
#           0010: 63 D0 67 AB                                        c.g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.850 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE 0D CF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 06:51:46.000 UTC",
#     "not  after"         : "2024-01-10 06:51:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#         0010: 5F A5 33 93                                        _.3.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#         0010: 84 D0 91 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.854 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C C2 55 D8 18 7F 45 6A   8E C5 F2 CA F3 85 B8 11  ..U...Ej........
#     0010: D6 97 C2 47 1B AE E8 E6   48 81 B8 15 48 78 CA B2  ...G....H...Hx..
#     0020: E6 C4 5F 98 25 3B 9E 2A   8C 8D 57 86 24 A0 92 02  .._.%;.*..W.$...
#     0030: D7 A7 6F 66 69 98 3E 07   21 87 DB D3 D5 58 E2 18  ..ofi.>.!....X..
#     0040: D0 19 76 D7 F6 92 6C A7   07 BA 9D C8 51 5D 83 B7  ..v...l.....Q]..
#     0050: 57 F6 B0 B4 FA 3D 15 A9   F9 43 FD 6E D0 01 16 D8  W....=...C.n....
#     0060: 69 80 22 BB 89 90 96 B9   A9 A8 7C BC 28 2F FA 73  i.".........(/.s
#     0070: 81 EE 98 1A 45 74 2C 72   52 18 ED 12 92 A3 75 70  ....Et,rR.....up
#     0080: D8 55 45 2A A1 51 DB 49   E8 8B 70 EF 6A F5 C8 68  .UE*.Q.I..p.j..h
#     0090: 9A 1A 7A 13 B3 11 97 C0   70 5B 12 0A 45 B7 1D 0A  ..z.....p[..E...
#     00A0: 4A 58 20 85 F4 62 36 22   5F 36 F3 16 99 BE 72 16  JX ..b6"_6....r.
#     00B0: A4 83 82 46 76 56 33 F1   0F 09 5F 17 EB F1 BA 31  ...FvV3..._....1
#     00C0: 7D DB 75 CB 0F 1A F3 9E   AF 67 66 4E 0D 57 51 F8  ..u......gfN.WQ.
#     00D0: 7E 11 1C 49 AD 17 7F 6C   AD BD B7 40 6A 2E 7B 31  ...I...l...@j..1
#     00E0: 74 E9 39 38 4E 02 30 E4   72 F9 8E F1 AA A9 CE 4C  t.98N.0.r......L
#     00F0: 09 F4 ED 19 A8 D0 A0 F4   59 E3 B6 04 FF 58 3A F0  ........Y....X:.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.857 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EC 03 77 FB 9F AB 0C A5   08 88 40 2F 71 15 5F BD  ..w.......@/q._.
#     0010: 29 FE DA 87 0E 88 D8 6F   83 6B 0F 55 2B 60 47 5F  )......o.k.U+`G_
#     0020: BE 9C AE C5 14 33 58 E0   E3 6C 41 0F 02 F2 97 AD  .....3X..lA.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.859 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:19.860 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.860 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:19.861 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.861 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 06:52:19.861 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:52:19.862 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.862 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.865 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B E8 B5 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:52.000 UTC",
#       "not  after"         : "2024-01-10 06:51:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 6B 64 70 79 62 F8 A7   CC 15 AB 54 A1 A0 6E 97  .kdpyb.....T..n.
#           0010: F0 10 0D 22                                        ..."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 BE 0D CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:46.000 UTC",
#       "not  after"         : "2024-01-10 06:51:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#           0010: 5F A5 33 93                                        _.3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.890 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5C BF CA 97 CE 33 C0 4E   10 A7 83 D6 BD 37 66 D0  \....3.N.....7f.
#     0010: 08 B8 24 81 38 79 AE 5E   4D 15 F6 D2 62 F0 39 65  ..$.8y.^M...b.9e
#     0020: C8 A1 B7 50 5D 1A 8D B1   AC 93 85 A2 F4 BB 25 AB  ...P].........%.
#     0030: BF B0 38 72 07 85 3C D8   33 57 B8 9B 90 74 11 DF  ..8r..<.3W...t..
#     0040: B9 F9 83 D8 CE 0A 7B 8E   51 AC 41 92 CE 41 A1 37  ........Q.A..A.7
#     0050: 93 65 C5 F3 70 28 69 98   04 BF 6F 36 BE AE 46 A6  .e..p(i...o6..F.
#     0060: 56 42 D7 64 05 51 46 6A   F3 5E BF F8 5B C7 0E 5D  VB.d.QFj.^..[..]
#     0070: CD 97 38 66 AB 6F 6E 84   73 E8 3D 57 6C C7 0E AF  ..8f.on.s.=Wl...
#     0080: 2C 01 A1 BA 98 6C 18 01   C9 14 F1 A8 AC BF 50 11  ,....l........P.
#     0090: 1F D7 60 DF 52 48 03 00   77 EC C9 8F 4C CE 44 6C  ..`.RH..w...L.Dl
#     00A0: 95 04 34 5F AF C3 E4 B8   04 68 7A 4E 44 37 F3 29  ..4_.....hzND7.)
#     00B0: 08 54 65 02 91 FB FE AB   DB 27 76 83 14 D5 3D AA  .Te......'v...=.
#     00C0: 6E 96 58 50 EB 0E 68 45   11 07 CA 8F 82 55 22 98  n.XP..hE.....U".
#     00D0: 89 12 DA AA 09 75 EE B6   D7 F6 11 09 A2 24 BF D0  .....u.......$..
#     00E0: 0E 6E 3D 55 44 C5 A3 B6   49 D8 9E 4F ED 56 44 8C  .n=UD...I..O.VD.
#     00F0: B8 39 6C 05 2A 5B 7B 6B   13 E6 9A DF 1F C3 7F EC  .9l.*[.k........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.891 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AA 22 44 6D B7 02 A8 2E   2C AA CD 58 10 E4 D4 20  ."Dm....,..X...
#     0010: 19 42 8C EC 44 A0 6F 40   FE 01 E6 29 94 02 12 E9  .B..D.o@...)....
#     0020: 8C E7 A7 05 D0 01 99 C8   20 37 0C 1C 12 BF 3B E6  ........ 7....;.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.891 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:19.951 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "62 63 7C 03 93 7B 8F 4C CF E2 55 E5 30 96 12 6F B6 7C B1 22 25 B5 3D 9F B8 86 60 0F 95 1A FF F2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 06:52:20.243 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 06:52:20.244 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 06:52:31.176; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:31.503 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 08 AB 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:44.000 UTC",
#       "not  after"         : "2024-01-10 06:51:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#           0010: 5F A5 33 93                                        _.3.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 BE 0D CF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 06:51:46.000 UTC",
#       "not  after"         : "2024-01-10 06:51:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 67 18 C3 C7 7D BD 56   BB 9A 7B 87 9E 67 B4 B8  .g.....V.....g..
#           0010: 5F A5 33 93                                        _.3.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 2C EA B1 77 EE 3D 09   C0 06 A5 FE 28 87 D8 F8  .,..w.=.....(...
#           0010: 84 D0 91 7B                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 06:52:31.518 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:31.748 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.748 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:31.750 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 06:52:31.750 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.756 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.767 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 06:52:31.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "48 05 D9 AA AA ED C3 D2 9A A1 59 6E A1 54 79 3C 7B D0 57 A3 C5 9F 07 BD AD 57 86 2C C3 07 D5 6A",
#     "session id"          : "AD 40 FF 64 EB 3A 17 EA 15 E0 B0 D0 40 36 C7 04 70 08 89 51 2B A7 44 7F 91 B4 20 54 60 0F A6 D1",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3F CB 66 AC 43 00 C6 86   47 2D 23 D5 F6 41 2C 95  ?.f.C...G-#..A,.
#               0010: 3E CE F2 A6 1F 7A 70 60   1F 51 6B 15 11 8D DE 77  >....zp`.Qk....w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.787 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D6 0E AB 13 9F 66 12 22 4A 78 F3 87 A9 AE BD C4 23 30 E5 E9 C6 6D 4E 20 A6 EB 9E 3A B2 BC C4 D8",
#     "session id"          : "AD 40 FF 64 EB 3A 17 EA 15 E0 B0 D0 40 36 C7 04 70 08 89 51 2B A7 44 7F 91 B4 20 54 60 0F A6 D1",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 70 6A B2 80 9C 81 5E   09 25 8A 02 79 6F A5 7B  .pj....^.%..yo..
#             0010: D0 9E 9B 69 C8 04 3F 03   18 BD 51 C8 41 53 A8 37  ...i..?...Q.AS.7
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.787 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.787 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 06:52:31.789 UTC|SSLExtensions.java:163

[...truncated too long message...]

uilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 06:53:50.388 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:53:50.434 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:53:50.434 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:53:50.434 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 06:53:50.434 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34420/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28232ms
ok 65 stop command for single port in 30756ms
ok 66 status detects locally running solr in 14346ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2172ms
ok 69 copying files around in 6496ms
ok 70 upconfig in 2602ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.ReindexCollectionTest.testAbort (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.ReindexCollectionTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.ReindexCollectionTest.testAbort" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F04F33C6559B0FA1 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 20s
654 actionable tasks: 638 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 20m49s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5646 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5646/

All tests passed

Build Log:
[...truncated 1329 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33317/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 03:03:39.943; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 03:03:39.949; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 03:03:40.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 03:03:40.891; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22366ms
ok 61 start solr with client truststore and security manager in 25051ms
not ok 62 start solr with mTLS needed in 57256ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-p1tifH/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33317.
#
# Started Solr server on port 33317 (pid=200641). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33318.
#
# Started Solr server on port 33318 (pid=201075). Happy searching!
#
# INFO  - 2023-10-12 03:05:03.324; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 03:05:03.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 03:05:03.697; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 03:05:03.700; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 03:05:03.701; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:03.732 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 0B EB DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:39.000 UTC",
#     "not  after"         : "2024-01-10 03:04:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 02 6A C3 02 E8 CE 70   5A 86 F4 DF A9 51 66 53  C.j....pZ....QfS
#         0010: 90 B1 AF D7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:03.736 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 D1 85 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:31.000 UTC",
#     "not  after"         : "2024-01-10 03:04:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:03.750 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:03.840 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:03.840 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:03.841 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:03.841 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:03.980 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:03.980 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:03.982 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:03.982 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:03.987 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:03.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:03.999 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:03.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:04.001 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "33 46 53 AF 39 DB 9F 68 F9 2F 13 67 9B 25 4E 94 BC A5 4C E3 E9 F5 B4 C3 43 C9 83 7D AA 3B A0 E0",
#   "session id"          : "34 E8 57 18 4B BC 88 B7 DC 89 9A F0 50 CD 18 02 3C B9 18 7F 22 5D AF 29 29 D6 8A 05 EB 03 1E 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8E 32 A4 3D E5 3B E6 B8   C1 2D 8E D0 74 99 F8 51  .2.=.;...-..t..Q
#             0010: 57 8F B0 4D E0 37 CA EB   57 0F F1 4F 58 A9 66 32  W..M.7..W..OX.f2
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.102 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "46 87 91 A3 07 8B 0A 24 BF 85 EC 05 95 C2 0F FE 1B 87 CA 94 C0 5D E7 32 60 F8 29 B7 25 03 45 85",
#   "session id"          : "34 E8 57 18 4B BC 88 B7 DC 89 9A F0 50 CD 18 02 3C B9 18 7F 22 5D AF 29 29 D6 8A 05 EB 03 1E 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0F 21 0A D3 27 04 13 4E   3B 96 83 6F 92 A0 99 D1  .!..'..N;..o....
#           0010: E3 58 2D C9 3A 2F E6 B4   F8 CD 94 D4 8A CE C2 57  .X-.:/.........W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.103 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.103 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.107 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.107 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.116 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.117 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.119 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.122 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.125 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.125 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.126 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.126 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.130 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 9E 51 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:35.000 UTC",
#       "not  after"         : "2024-01-10 03:04:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 D0 C6 EF 0F AE 89 55   A8 01 0E 05 F5 BB C0 B3  .......U........
#           0010: 0C 30 CD 47                                        .0.G
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.130 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.211 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.214 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3A CE 20 3C 04 E6 05 08   51 82 E1 90 8E E6 C2 75  :. <....Q......u
#     0010: CB C8 BD 34 42 EF A5 CF   78 F7 53 B4 7A A4 60 46  ...4B...x.S.z.`F
#     0020: C6 F1 9D CF 3A 0C 39 82   FF 3D 52 36 56 68 CD A5  ....:.9..=R6Vh..
#     0030: BE 84 55 53 9A 96 08 8F   30 05 81 7A 77 7F 2D 35  ..US....0..zw.-5
#     0040: 5D 68 44 A4 DD F5 CE 3D   BE 6F 85 3F F2 26 D0 4B  ]hD....=.o.?.&.K
#     0050: 57 22 4C 30 6F D5 DF 1B   D5 5F 58 48 01 E8 5C 55  W"L0o...._XH..\U
#     0060: 7A 3D FA 72 05 08 71 C2   F0 F8 0D 62 01 4D FE 8E  z=.r..q....b.M..
#     0070: 41 B2 04 FA 10 A7 EF EB   30 64 37 72 23 A5 04 7E  A.......0d7r#...
#     0080: 94 4F CE 54 9A 2E A1 77   E3 03 02 66 5E 9D 67 4C  .O.T...w...f^.gL
#     0090: 48 39 27 2C D0 C4 C7 2B   F0 C2 56 CA 3E 7E C3 00  H9',...+..V.>...
#     00A0: 3C 47 3C 32 C4 9D 14 A3   6E 4F 66 82 C6 D7 98 D5  <G<2....nOf.....
#     00B0: ED 20 78 C1 22 F2 AC 99   70 9C 91 BB 70 5E 0D 90  . x."...p...p^..
#     00C0: 76 8F 78 53 8C 41 A0 E3   24 C8 62 9C E1 87 A9 8E  v.xS.A..$.b.....
#     00D0: 70 00 46 1E D2 DE A1 05   6F 66 C7 CD 12 28 5C F5  p.F.....of...(\.
#     00E0: E5 9B 87 60 DC A4 C6 79   86 BF E5 C8 1F 26 3B BA  ...`...y.....&;.
#     00F0: 27 EC 25 44 09 8D 18 01   F7 3C 20 7A DF AA 7B D2  '.%D.....< z....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.216 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 72 D7 D3 7B 99 2C 8A 3D   46 5C F9 04 07 F0 79 F1  r....,.=F\....y.
#     0010: F1 40 66 0C 74 0F 5D 7F   3E 84 D3 55 72 DE 8A 9B  .@f.t.].>..Ur...
#     0020: EC 15 E9 E6 EC EC A8 96   99 1D C8 CE 78 51 1E 6A  ............xQ.j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.218 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:04.219 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.219 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:04.220 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.220 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:04.220 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:04.220 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.221 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.223 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 0B EB DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:39.000 UTC",
#       "not  after"         : "2024-01-10 03:04:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 02 6A C3 02 E8 CE 70   5A 86 F4 DF A9 51 66 53  C.j....pZ....QfS
#           0010: 90 B1 AF D7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 36 D9 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:33.000 UTC",
#       "not  after"         : "2024-01-10 03:04:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#           0010: DD 40 A1 F5                                        .@..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.250 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 BD 40 66 9C 8A C1 82   B8 BA BF 50 73 23 D4 85  b.@f.......Ps#..
#     0010: 00 FA EE 84 E5 84 46 19   E2 AE 8E 99 AF 26 EB EC  ......F......&..
#     0020: 36 E7 43 14 84 86 6E FD   BE 51 BA F7 52 A3 95 85  6.C...n..Q..R...
#     0030: EF 67 98 92 A5 66 D8 C1   73 43 80 7C AF DD 73 61  .g...f..sC....sa
#     0040: B2 93 CB 87 BC 2B CD 12   9A 22 5A 81 92 0B 42 3C  .....+..."Z...B<
#     0050: 0B 69 9B 24 C8 2D C4 B8   9C 75 21 87 3E 5C D4 E1  .i.$.-...u!.>\..
#     0060: F9 E6 23 99 F3 59 CA 7A   0C 77 99 2F B2 70 16 C9  ..#..Y.z.w./.p..
#     0070: 65 75 D1 2A A8 82 4A D3   62 C0 43 27 25 7A 61 95  eu.*..J.b.C'%za.
#     0080: C5 0A 3B 1B 63 02 17 47   B9 FC B1 65 7F 2E B7 2E  ..;.c..G...e....
#     0090: 00 05 D0 48 FD 79 57 E8   A0 B8 7E 86 00 2F DE 69  ...H.yW....../.i
#     00A0: 31 2C 7C 3A D6 DA B7 E1   6E FA B5 32 C9 BB 12 39  1,.:....n..2...9
#     00B0: 6F E9 9D A4 39 77 AA 6F   F1 51 69 5E B9 8C D4 55  o...9w.o.Qi^...U
#     00C0: 46 D5 9B 00 8F 3A CF D3   D5 48 3E FE 72 89 82 AA  F....:...H>.r...
#     00D0: 55 E8 22 50 DB 52 94 A0   65 74 30 ED 35 38 F6 DA  U."P.R..et0.58..
#     00E0: 19 26 0B 11 46 92 3F 44   FA B0 2F 4F F1 22 B7 AA  .&..F.?D../O."..
#     00F0: FA 1F F0 C4 81 F2 EF B7   4F EF F1 A6 2C 54 88 AB  ........O...,T..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.251 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 73 BC 89 15 3D BD 3E 18   EB 50 06 C7 29 D3 34 CC  s...=.>..P..).4.
#     0010: E9 3C 0D 2C D6 45 02 88   E0 FE 0D 25 2E 20 62 55  .<.,.E.....%. bU
#     0020: 31 42 86 01 DD 58 CC C1   22 D7 3C B1 2E B0 80 FF  1B...X..".<.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.252 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:04.308 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CD 5B DC C6 8A 26 CD 0B FC 1A 14 50 32 5E F6 B1 A0 EB 0A 37 5D 63 00 67 B2 D8 CB 23 36 50 CC A9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 03:05:04.625 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 03:05:04.626 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 03:05:05.569; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 03:05:05.575; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 03:05:05.984; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 03:05:05.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 03:05:05.988; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-p1tifH/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:06.021 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 0B EB DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:39.000 UTC",
#     "not  after"         : "2024-01-10 03:04:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 43 02 6A C3 02 E8 CE 70   5A 86 F4 DF A9 51 66 53  C.j....pZ....QfS
#         0010: 90 B1 AF D7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:06.025 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 D1 85 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:31.000 UTC",
#     "not  after"         : "2024-01-10 03:04:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:06.041 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:06.373 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:06.376 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:06.376 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:05:06.377 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:06.536 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.536 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:06.538 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:06.539 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.556 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.557 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:06.560 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "83 69 06 E3 80 19 27 82 F1 BA 2D 73 A8 D1 96 0D 62 E9 40 D4 5E 7C 5A 2E CF 0A 07 60 02 BC A2 57",
#   "session id"          : "9F F0 EB 8B 69 D7 05 5D B7 5A 30 14 97 AE DE 47 09 A5 75 0C 07 59 CA B7 46 98 C7 13 19 AB BC FE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 94 C4 76 B5 F7 1E 45 FE   EE 54 51 7E A4 97 70 7B  ..v...E..TQ...p.
#             0010: 8C DE 59 7D 2C 49 1B 9C   0A 29 54 5B 3B 1C 2E 7B  ..Y.,I...)T[;...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.657 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BC A6 40 E1 D8 B7 B2 5D 40 3D 9B 44 74 06 3C C8 DF 1F 59 11 1F BF 22 A2 66 F6 C3 61 D3 F8 25 3A",
#   "session id"          : "9F F0 EB 8B 69 D7 05 5D B7 5A 30 14 97 AE DE 47 09 A5 75 0C 07 59 CA B7 46 98 C7 13 19 AB BC FE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6F 0E A0 20 C3 4D FE 8B   39 78 B3 42 F8 1F E3 70  o.. .M..9x.B...p
#           0010: 11 F7 AB 60 31 53 DA 30   1F 43 4E 5E 87 E4 8E 55  ...`1S.0.CN^...U
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.658 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.658 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.660 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.663 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.663 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.664 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.665 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.672 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.674 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.675 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.678 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.679 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.679 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.679 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.679 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.679 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.680 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.680 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.681 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.682 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.682 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.682 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.683 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.684 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.687 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 9E 51 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:35.000 UTC",
#       "not  after"         : "2024-01-10 03:04:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 D0 C6 EF 0F AE 89 55   A8 01 0E 05 F5 BB C0 B3  .......U........
#           0010: 0C 30 CD 47                                        .0.G
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.687 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.772 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3F 36 D9 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 03:04:33.000 UTC",
#     "not  after"         : "2024-01-10 03:04:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#         0010: DD 40 A1 F5                                        .@..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#         0010: 32 17 50 DC                                        2.P.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.776 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D C2 D4 93 46 CC D4 57   EB A4 36 8E 25 8B 8F 79  ]...F..W..6.%..y
#     0010: 02 6F 90 CC 1C 28 62 A3   E2 A1 92 57 8A 5C 45 17  .o...(b....W.\E.
#     0020: 4E 47 0B 0D D3 9B 1D DD   B6 82 69 5D 52 E6 06 C0  NG........i]R...
#     0030: 8F 42 12 4E 76 18 A2 E5   17 3E 06 D0 6F 01 FD 71  .B.Nv....>..o..q
#     0040: 7F 8E BC 83 F9 6A 38 85   37 24 E5 6E 40 DA 7A 51  .....j8.7$.n@.zQ
#     0050: 6C E8 BC 74 CF D1 4C 4B   5F 8B FF 9F 5E 30 3B 3F  l..t..LK_...^0;?
#     0060: 62 62 FE F0 52 79 25 51   8A 86 6A 1E 7B 00 97 DD  bb..Ry%Q..j.....
#     0070: D4 F0 05 BA 9E 7D E8 9F   CA FF EC 6C 01 6A 2E 54  ...........l.j.T
#     0080: C4 BC CF 03 0B 4D 5C 22   E3 F3 B2 6D 22 17 78 C7  .....M\"...m".x.
#     0090: 2D 6B 12 3E F0 F4 B2 32   63 C5 74 62 AA 1F 8F 4B  -k.>...2c.tb...K
#     00A0: C4 93 6B 8D A9 58 60 C7   D5 7C E4 8F 2F 98 6C 67  ..k..X`...../.lg
#     00B0: A5 DE 7A AD EC D2 59 9C   1D 16 BF 79 F1 B7 FE 25  ..z...Y....y...%
#     00C0: CC 33 0C D8 E1 B9 AA 47   4C CB D7 2A EE B1 90 C5  .3.....GL..*....
#     00D0: 35 15 77 81 B1 64 BD 60   EB 38 AA F6 AC 87 2C 25  5.w..d.`.8....,%
#     00E0: 71 C9 2B 2B 14 A6 16 87   2E 13 20 E4 F2 E5 05 EF  q.++...... .....
#     00F0: 16 33 5F A1 E5 56 E5 B7   88 E7 F4 11 BC F7 8E EA  .3_..V..........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.778 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 89 0D C7 C9 63 4A 2D 2F   2D 32 7D 2C D9 A0 D4 B1  ....cJ-/-2.,....
#     0010: 88 1D F0 4F 23 59 CB A4   71 C2 DE 88 D7 B2 43 A3  ...O#Y..q.....C.
#     0020: D4 1D 27 15 C2 F7 5D A5   85 2D 5F 9F 7D 54 65 CE  ..'...]..-_..Te.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.781 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:06.782 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.782 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:06.782 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.783 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 03:05:06.783 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:06.783 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.783 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.786 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 0B EB DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:39.000 UTC",
#       "not  after"         : "2024-01-10 03:04:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 43 02 6A C3 02 E8 CE 70   5A 86 F4 DF A9 51 66 53  C.j....pZ....QfS
#           0010: 90 B1 AF D7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 36 D9 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:33.000 UTC",
#       "not  after"         : "2024-01-10 03:04:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#           0010: DD 40 A1 F5                                        .@..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.810 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 FF A2 3E 37 21 66 37   8B 4C 85 7C 69 38 CD 58  T..>7!f7.L..i8.X
#     0010: D9 08 D1 51 3F 2F D4 D5   A5 F7 A6 C0 5C 4C 0C B8  ...Q?/......\L..
#     0020: 82 B3 59 A8 54 B7 FC 84   93 46 16 62 25 C1 22 DC  ..Y.T....F.b%.".
#     0030: 80 B9 7A 60 2E 3E 1E 90   53 76 38 E7 FA 28 69 FD  ..z`.>..Sv8..(i.
#     0040: 4C 9A AF 72 1E 37 6C 39   27 A4 04 A7 1F 0F 7B CF  L..r.7l9'.......
#     0050: DE EC 6D 64 8A 4A C0 F2   FB BA C1 36 79 0B A9 46  ..md.J.....6y..F
#     0060: 60 25 5B B6 43 61 3B 5F   D3 8C A7 CA 20 CC 93 CF  `%[.Ca;_.... ...
#     0070: C1 65 AD 55 65 BC 8A 45   5A 0C D4 72 4A E6 C5 47  .e.Ue..EZ..rJ..G
#     0080: 19 76 1B 2C 9F 23 81 1D   20 2F 8F 29 7A D9 D8 DB  .v.,.#.. /.)z...
#     0090: 83 11 FA 2D 41 35 47 03   B4 3E B1 AD A6 59 C7 1E  ...-A5G..>...Y..
#     00A0: 9B 77 6D CD D5 C0 9C F4   58 0B 00 DD 85 D4 75 EB  .wm.....X.....u.
#     00B0: 5F 9E 93 3D 61 76 81 FA   2D D9 37 82 70 35 CE 3C  _..=av..-.7.p5.<
#     00C0: A0 BF 68 C7 41 CF A6 62   51 36 D0 15 8C 39 86 30  ..h.A..bQ6...9.0
#     00D0: 80 FD DA 58 75 B5 A5 E5   0D 50 D5 6B D9 76 D9 A3  ...Xu....P.k.v..
#     00E0: 99 20 E1 BD 6E 61 9E B8   AA 02 57 73 D3 3A DA 29  . ..na....Ws.:.)
#     00F0: E0 1F 19 40 8D 75 CA B5   29 54 70 26 64 69 3A B3  ...@.u..)Tp&di:.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.811 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D2 AD 56 62 71 13 21 FC   B8 1C 2C A4 02 9D 0B 7D  ..Vbq.!...,.....
#     0010: 7B 29 03 27 B5 F4 A1 BB   92 9C 7F 31 67 8C 56 56  .).'.......1g.VV
#     0020: 47 D6 12 44 5D 83 8C 45   92 57 12 12 9E 62 65 06  G..D]..E.W...be.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.812 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:06.903 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B9 39 04 BE 7B F0 A0 9E 19 4C C3 5A 51 2B C8 45 07 E0 14 EF 8F 12 61 EB 43 AB ED 44 CF B8 41 78",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 03:05:07.211 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 03:05:07.213 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 03:05:18.866; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:19.191 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3F 36 D9 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:33.000 UTC",
#       "not  after"         : "2024-01-10 03:04:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#           0010: DD 40 A1 F5                                        .@..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 9D 74 B9 AE BA 4E 99   C3 71 9D 61 F9 70 70 69  ..t...N..q.a.ppi
#           0010: 32 17 50 DC                                        2.P.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 D1 85 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 03:04:31.000 UTC",
#       "not  after"         : "2024-01-10 03:04:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F AC FE 34 07 45 38 02   36 8A 75 A6 3F 51 43 41  _..4.E8.6.u.?QCA
#           0010: DD 40 A1 F5                                        .@..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 03:05:19.207 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:19.446 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.447 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:19.448 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 03:05:19.449 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.454 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.466 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.466 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.466 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 03:05:19.469 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "1A 97 66 DD 69 44 65 88 89 27 FB C9 F9 C7 BE D3 DF 82 94 2E 2A 84 4A 26 74 25 C1 75 38 86 F4 2D",
#     "session id"          : "9F 2E B5 BB 01 A7 1D 14 4B C1 CA 1D 71 9E EC AC 46 F4 A4 F4 00 62 93 96 55 3E EC E1 D9 8D 35 8D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A9 31 D8 D6 D3 65 84 2A   25 3E 96 63 17 5A 8E F0  .1...e.*%>.c.Z..
#               0010: 2F 0E 72 B7 56 64 D8 9E   CA 35 5A 36 AE D8 08 03  /.r.Vd...5Z6....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.493 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E5 79 F4 05 A5 F6 9D 27 6F 7E 64 A2 CD 38 93 B4 94 26 83 DD 21 8A 68 8C 50 0F 57 5A 77 10 FC 81",
#     "session id"          : "9F 2E B5 BB 01 A7 1D 14 4B C1 CA 1D 71 9E EC AC 46 F4 A4 F4 00 62 93 96 55 3E EC E1 D9 8D 35 8D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D9 8B 4E 69 81 47 11 D5   55 27 FB 9F FA 04 C9 85  ..Ni.G..U'......
#             0010: 5E DB 48 32 7C EF 53 39   0A 6D 85 D5 B6 15 E8 73  ^.H2..S9.m.....s
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.493 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.493 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.495 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.498 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.498 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:19.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:19.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.507 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.509 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.510 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.514 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:19.515 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:05:19.515 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 03:05:19.516 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 03:06:37.851 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:06:37.906 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:06:37.909 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:06:37.909 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 03:06:37.910 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33318/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28077ms
ok 65 stop command for single port in 31169ms
ok 66 status detects locally running solr in 14640ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2189ms
ok 69 copying files around in 6500ms
ok 70 upconfig in 2616ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 35s
673 actionable tasks: 657 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m2.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5645 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5645/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34051/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-12 00:44:07.767; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 00:44:07.772; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-12 00:44:09.025; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-12 00:44:09.070; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22078ms
ok 61 start solr with client truststore and security manager in 25667ms
not ok 62 start solr with mTLS needed in 57645ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-iJGGq5/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34051.
#
# Started Solr server on port 34051 (pid=198763). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34052.
#
# Started Solr server on port 34052 (pid=199220). Happy searching!
#
# INFO  - 2023-10-12 00:45:31.892; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 00:45:31.897; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 00:45:32.265; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 00:45:32.269; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 00:45:32.269; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:32.304 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 D3 D1 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:08.000 UTC",
#     "not  after"         : "2024-01-10 24:45:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 3B FA F5 F4 61 AB 07   AF 41 92 8C A0 21 CD 62  .;...a...A...!.b
#         0010: E0 18 94 E0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:32.308 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 69 D1 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:00.000 UTC",
#     "not  after"         : "2024-01-10 24:45:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:32.323 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:32.691 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:32.693 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:32.693 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:32.694 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:32.838 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.838 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:32.840 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:32.840 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.846 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.858 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.858 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.858 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:32.861 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "45 0B 88 0F 9D 44 A5 D2 74 91 07 98 63 65 A9 E8 60 F8 06 CD 05 15 66 B2 53 26 EC 00 35 D4 CC B1",
#   "session id"          : "04 0D 18 94 E3 9D 63 44 12 FC D4 C3 44 A0 D3 24 C0 C3 3F B7 6F F8 DA 80 9A BE FE DE C7 3C 74 6F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AF DF 64 8C 41 A8 D9 D0   A8 DC CA 85 6C 43 39 84  ..d.A.......lC9.
#             0010: A4 02 8F 3B 6D F5 77 0D   5C D8 13 1B 9F 95 99 34  ...;m.w.\......4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.976 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1C A2 B7 DB 0A AF F6 78 ED AD 45 B9 15 C8 CC C2 4E 44 86 94 B7 EF B7 D8 7D 4F EE F7 67 6C 75 3A",
#   "session id"          : "04 0D 18 94 E3 9D 63 44 12 FC D4 C3 44 A0 D3 24 C0 C3 3F B7 6F F8 DA 80 9A BE FE DE C7 3C 74 6F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 56 DF C1 5F D3 BD 61   82 E4 81 3F 4A 26 2D 98  .V.._..a...?J&-.
#           0010: 24 E7 E8 3A A0 A1 65 AD   5B 33 69 23 B8 E5 33 5E  $..:..e.[3i#..3^
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.977 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.977 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.979 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.979 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.979 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.979 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.982 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.982 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.982 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:32.984 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:32.984 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.984 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.984 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.991 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.993 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.994 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.998 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.998 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.999 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:32.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:32.999 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:32.999 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.001 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.001 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.001 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.002 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.003 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.004 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:33.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.009 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 D8 5A A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:04.000 UTC",
#       "not  after"         : "2024-01-10 24:45:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 06 0D FC EF 77 B0 D3   2B 82 1C D9 E7 13 17 F6  ^....w..+.......
#           0010: B6 4E 26 41                                        .N&A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.009 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.095 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.099 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 82 27 8C B4 F2 C3 65   CB 6F E8 5A 26 74 F9 22  ..'....e.o.Z&t."
#     0010: 85 7C 02 77 0F 27 08 28   10 A7 0D E9 D5 A7 08 1F  ...w.'.(........
#     0020: 1D 91 E9 C1 25 E3 3D AF   AC D1 79 DA 43 64 AE 56  ....%.=...y.Cd.V
#     0030: 5A 75 F6 6F 46 EF FC FD   FA BC B8 73 0F 06 56 37  Zu.oF......s..V7
#     0040: 1D D1 42 81 DF 58 E4 DF   51 C4 CE A6 BC DB 02 74  ..B..X..Q......t
#     0050: 2B E1 D5 29 35 3C 33 1E   A7 A7 CC 77 D6 EC 50 1B  +..)5<3....w..P.
#     0060: BE D2 5C EC 63 2D B8 B2   36 CB F3 62 95 0A 22 65  ..\.c-..6..b.."e
#     0070: C5 F4 35 3C DF 92 1A 32   42 A6 A2 FD C6 3C 65 7E  ..5<...2B....<e.
#     0080: 07 01 DF 70 7A EC 65 E6   70 EB 4D 00 73 DD 5E 5A  ...pz.e.p.M.s.^Z
#     0090: C5 AC 74 FB FD C5 EE 35   53 BA 3C 0F 2E F0 EB 1C  ..t....5S.<.....
#     00A0: 2F 42 66 80 47 63 8E B7   3A A2 15 60 DC 03 53 70  /Bf.Gc..:..`..Sp
#     00B0: B5 9C 60 32 34 0D 65 6C   B8 E2 58 55 CC 32 96 86  ..`24.el..XU.2..
#     00C0: 44 72 F5 07 1C 50 1E AB   A6 7C EB 3C 6B 91 D8 90  Dr...P.....<k...
#     00D0: CE 64 00 4C 87 96 BA EC   44 05 4D 47 7A 52 84 89  .d.L....D.MGzR..
#     00E0: CC 39 00 1C AE F9 0E 97   F5 26 96 1D F1 BA E8 B7  .9.......&......
#     00F0: 0C 2D FE 24 22 C9 06 35   E3 24 81 F9 8B 56 4B 5F  .-.$"..5.$...VK_
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.102 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C D8 5C 31 E1 34 17 6D   52 12 06 67 10 6C C4 52  ..\1.4.mR..g.l.R
#     0010: 20 32 91 CB FA AA BE 90   5C A2 EB 5B 21 56 22 FA   2......\..[!V".
#     0020: 52 ED 6F 4E C6 37 03 88   A3 15 C0 86 4E 6F 5D 33  R.oN.7......No]3
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.104 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:33.105 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:33.105 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:33.105 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:33.105 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:33.106 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:33.106 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.107 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.110 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 D3 D1 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:08.000 UTC",
#       "not  after"         : "2024-01-10 24:45:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 3B FA F5 F4 61 AB 07   AF 41 92 8C A0 21 CD 62  .;...a...A...!.b
#           0010: E0 18 94 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F E1 A9 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:01.000 UTC",
#       "not  after"         : "2024-01-10 24:45:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#           0010: F7 24 6C 2A                                        .$l*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.137 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 1B FB 04 D4 CF E8 CD   38 B1 8B D6 8B BC DC 93  ........8.......
#     0010: 76 AD AA 9E D4 15 74 4F   DB 15 24 A9 C7 BE AF 84  v.....tO..$.....
#     0020: 3B 23 F5 F3 5D 72 54 BF   B2 B8 FF F7 2D 03 AB 50  ;#..]rT.....-..P
#     0030: 58 94 57 B8 19 BF 20 F6   5C 5B BF 62 F0 FC F4 2C  X.W... .\[.b...,
#     0040: 6A 76 CB 70 FA 49 35 54   4B E9 08 38 65 A6 1E E1  jv.p.I5TK..8e...
#     0050: A8 10 AB 5B 50 9E 02 31   5A D5 41 07 86 70 0E 2F  ...[P..1Z.A..p./
#     0060: DB CA 4F E7 5C 76 47 23   8A 1B 46 DE 93 AD 8D 44  ..O.\vG#..F....D
#     0070: 72 4C 23 1B F3 E6 FD E9   C0 D3 26 F1 60 24 CE C0  rL#.......&.`$..
#     0080: F1 6C 64 78 14 0A 66 46   5E 04 2D BB F8 03 31 70  .ldx..fF^.-...1p
#     0090: DC B6 C7 EC 7D 97 EC 6D   7D 3F 87 33 17 CF 45 85  .......m.?.3..E.
#     00A0: 8A EC A2 42 5B 43 80 55   8D 37 4D FF F3 8B 5B 30  ...B[C.U.7M...[0
#     00B0: 30 F5 23 DE C3 1B D6 B0   7B 11 19 F8 E6 B2 AD 85  0.#.............
#     00C0: 80 8A 50 19 9F 07 2C 11   09 A2 E2 4B 94 DA B9 AA  ..P...,....K....
#     00D0: EA 0F 6F AB CF B2 E9 B8   B6 6E AE 9C 29 19 7D C7  ..o......n..)...
#     00E0: 83 B5 84 ED 4F 6D AF 84   E3 03 03 E2 0B F4 4E B4  ....Om........N.
#     00F0: 0D B9 39 D0 5A 97 93 84   00 02 EB 4D 1D F1 AE B1  ..9.Z......M....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.139 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE 58 F3 1E 22 19 CB D9   DF 2A C9 44 51 FF FF F2  .X.."....*.DQ...
#     0010: D3 C1 C4 F4 D2 B8 A3 FA   9F 81 36 F0 FF 7C CB 81  ..........6.....
#     0020: 60 21 74 16 37 44 A2 A8   8B 56 FD 67 A5 C9 74 49  `!t.7D...V.g..tI
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.139 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:33.198 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "71 E7 3B 6A 89 E5 00 70 C6 36 B4 C7 C0 66 A0 D3 D3 08 FC 26 A8 09 EE 75 5F 8F C4 8F 73 47 AB B3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 24:45:33.513 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 24:45:33.514 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 00:45:34.447; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 00:45:34.452; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 00:45:34.800; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 00:45:34.802; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 00:45:34.803; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iJGGq5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:34.834 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 D3 D1 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:08.000 UTC",
#     "not  after"         : "2024-01-10 24:45:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1B 3B FA F5 F4 61 AB 07   AF 41 92 8C A0 21 CD 62  .;...a...A...!.b
#         0010: E0 18 94 E0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:34.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 69 D1 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:00.000 UTC",
#     "not  after"         : "2024-01-10 24:45:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:34.853 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:35.153 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:35.154 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:35.155 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:35.156 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:35.319 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:35.321 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:35.321 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.327 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.338 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.339 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.339 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:35.341 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "47 88 DD 48 27 C5 26 00 93 3D 21 BB 01 2B C5 FF 5C 74 E3 5B 62 48 93 DD 72 58 B2 3B 61 25 79 08",
#   "session id"          : "14 29 D8 11 CB D9 81 BF 50 E9 74 AB 35 35 9F BA B2 F3 FD A8 18 9A 09 D7 C2 48 43 CC 31 BD C0 78",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A5 DB 3C 7C D8 6D 6E 4F   6D 42 FF C1 7A DE 10 B6  ..<..mnOmB..z...
#             0010: 74 BC E9 09 BE 0B 73 40   4F B8 1B A1 15 B9 C0 72  t.....s@O......r
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.443 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A6 48 2C 9C CB 3D F1 62 BD 63 3F 53 FA 5A 97 DF FA 2F 19 34 B0 CA A9 AE 90 D2 0C 8B A9 CE 99 07",
#   "session id"          : "14 29 D8 11 CB D9 81 BF 50 E9 74 AB 35 35 9F BA B2 F3 FD A8 18 9A 09 D7 C2 48 43 CC 31 BD C0 78",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 21 BA 6C EF 0A 82 56 DA   B7 6E 61 4E CC D1 9F 7A  !.l...V..naN...z
#           0010: 73 86 9E 15 F2 9F 83 94   DE 19 67 96 A2 57 32 4B  s.........g..W2K
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.444 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.444 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.446 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.448 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.450 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.457 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.459 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.460 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.463 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.465 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.465 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.466 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.466 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.467 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.467 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.468 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.468 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.469 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.471 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 D8 5A A7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:04.000 UTC",
#       "not  after"         : "2024-01-10 24:45:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 06 0D FC EF 77 B0 D3   2B 82 1C D9 E7 13 17 F6  ^....w..+.......
#           0010: B6 4E 26 41                                        .N&A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.472 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.581 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F E1 A9 15",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 24:45:01.000 UTC",
#     "not  after"         : "2024-01-10 24:45:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#         0010: F7 24 6C 2A                                        .$l*
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#         0010: F1 62 43 F1                                        .bC.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.585 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F B8 76 1B BB E9 01 C1   7E 9E D1 55 C2 7B C7 6A  o.v........U...j
#     0010: DB 82 58 AE 00 4E 0C D6   98 51 39 32 B4 84 C4 5B  ..X..N...Q92...[
#     0020: C6 F6 A8 95 B9 0E B5 0D   17 AB DF 0F D4 3F 06 9F  .............?..
#     0030: 53 3A 97 DC 46 56 C6 BB   47 0F E3 61 AC 8C CE 87  S:..FV..G..a....
#     0040: 6E C2 90 BC F6 FB CE 42   86 43 47 DE 72 E1 82 D2  n......B.CG.r...
#     0050: EA 74 2C 45 16 8F EC 5C   02 77 C8 E3 56 98 16 70  .t,E...\.w..V..p
#     0060: 78 8A 1A FD 3B 8F 81 09   FE 61 7E A0 7D 90 A1 EA  x...;....a......
#     0070: D1 82 27 E0 22 FB 7E 80   C8 6D 84 EB C2 7C A5 B6  ..'."....m......
#     0080: 03 0C 84 65 E6 93 BD 67   5A 4A F1 88 6D D7 22 6D  ...e...gZJ..m."m
#     0090: 2C 90 B1 66 F3 B4 08 64   0C F0 C4 5C BD E8 C9 AB  ,..f...d...\....
#     00A0: DB 1D D0 EC 99 24 C7 98   59 DA 6F FE 26 28 10 A1  .....$..Y.o.&(..
#     00B0: 9B A0 CE 68 9C C6 E1 E4   DA 3F 74 5F 52 C7 38 9C  ...h.....?t_R.8.
#     00C0: 17 EC 39 26 D7 B0 CD B9   E3 73 D3 67 B0 2D DB 81  ..9&.....s.g.-..
#     00D0: 84 C8 6E 3B 28 FF 72 75   18 C4 60 D6 B3 2D 7B 7E  ..n;(.ru..`..-..
#     00E0: 3B 4A 6A 1A 45 70 FA CC   3F 24 B8 25 5E 2D B6 4E  ;Jj.Ep..?$.%^-.N
#     00F0: 59 E1 F2 FF DF A8 75 8C   6A EB E6 96 22 B1 08 D1  Y.....u.j..."...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.587 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 E3 FA DD F2 26 B1 D1   A4 9F D4 C7 3F 81 E6 F3  .....&......?...
#     0010: 12 1E D6 43 BF 91 12 DD   97 71 BA 88 52 3C D6 9A  ...C.....q..R<..
#     0020: F2 5B 94 25 72 38 38 72   55 B2 15 73 FB 95 42 AC  .[.%r88rU..s..B.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.589 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:35.590 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.590 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:35.591 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.591 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-12 24:45:35.591 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:35.591 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.592 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.595 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 D3 D1 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:08.000 UTC",
#       "not  after"         : "2024-01-10 24:45:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1B 3B FA F5 F4 61 AB 07   AF 41 92 8C A0 21 CD 62  .;...a...A...!.b
#           0010: E0 18 94 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F E1 A9 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:01.000 UTC",
#       "not  after"         : "2024-01-10 24:45:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#           0010: F7 24 6C 2A                                        .$l*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.621 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 95 AA EF 50 9D 93 B0 2D   DC D8 65 F6 DB B0 A9 80  ...P...-..e.....
#     0010: D7 CF 03 6F 46 61 D9 7C   1D 2B 7F 0E D1 2C A7 7D  ...oFa...+...,..
#     0020: AF 11 44 BC 5A AA DA 8E   30 C5 A5 19 CD EE A9 E6  ..D.Z...0.......
#     0030: D1 27 12 DD 95 DA DA 9C   30 40 85 08 73 A8 D7 0C  .'......0@..s...
#     0040: BA A2 01 55 7C 36 77 21   E3 0A BC E3 0B CE 54 81  ...U.6w!......T.
#     0050: 28 0B 3F 06 BA F4 91 C8   22 6D 2F 09 5D 29 26 07  (.?....."m/.])&.
#     0060: 5D EF 73 95 28 64 E2 E7   1A 9A 1C 53 AA 3B 75 D7  ].s.(d.....S.;u.
#     0070: 12 C9 99 7C 7B 73 21 47   36 EC F6 5B 17 3F 76 54  .....s!G6..[.?vT
#     0080: 71 35 02 73 31 FD 0C 34   23 07 5D 03 06 28 89 59  q5.s1..4#.]..(.Y
#     0090: BD 14 F3 59 20 EB 85 D0   E7 58 96 7F FE 1E 9E 50  ...Y ....X.....P
#     00A0: 55 16 80 20 20 46 A6 1A   6F B6 C3 9F CA 5C C7 B0  U..  F..o....\..
#     00B0: DD 37 37 F5 FA FB 17 F8   CD B2 E4 A5 68 C7 DB 18  .77.........h...
#     00C0: DB C4 A6 55 A8 45 BD 43   C4 45 F1 A5 EC 4D 5C 98  ...U.E.C.E...M\.
#     00D0: E0 14 C1 6B 82 1B 6B A7   FC E8 14 B1 1B 1C 62 1A  ...k..k.......b.
#     00E0: AF 1C AB 30 FD D0 5B 31   FF C9 BD 02 3A 02 2F 06  ...0..[1....:./.
#     00F0: DB 27 C6 02 53 AD FC 6E   EE 39 0C F2 90 56 61 03  .'..S..n.9...Va.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.622 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F E2 69 CD 67 71 1F D0   30 DD CC 52 8C FD 3A 94  ..i.gq..0..R..:.
#     0010: 6F 7F B5 B9 27 A4 44 07   AE AD A6 24 8B BE 73 09  o...'.D....$..s.
#     0020: 2C 26 0E AC 72 0C 7B 96   C0 2A 5B B4 50 32 A1 2A  ,&..r....*[.P2.*
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.622 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:35.685 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "11 F2 BD 6A F2 A5 3F 5A C0 BF EC 0E 30 38 A1 A3 B5 67 E7 A6 12 E4 34 FD 9F 60 2D 68 6E 65 F7 A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 24:45:35.959 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 24:45:35.960 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-12 00:45:47.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:47.454 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 69 D1 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:00.000 UTC",
#       "not  after"         : "2024-01-10 24:45:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#           0010: F7 24 6C 2A                                        .$l*
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F E1 A9 15",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 24:45:01.000 UTC",
#       "not  after"         : "2024-01-10 24:45:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 8F 47 BE 78 EC 40 3C   49 B5 F8 BC C2 DA 3F 12  H.G.x.@<I.....?.
#           0010: F7 24 6C 2A                                        .$l*
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 AD 6F FC A4 71 4A 33   D8 5C EB 7C BC 07 C8 5F  ..o..qJ3.\....._
#           0010: F1 62 43 F1                                        .bC.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 24:45:47.471 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:47.853 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:47.853 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:47.853 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:45:47.853 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:47.945 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.945 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:47.947 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-12 24:45:47.948 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.954 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.966 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-12 24:45:47.969 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0E CD 57 A0 AA DF C8 F0 E9 B4 4E 3E 9A AE 7E 0B E2 AA 3A BF BA 0F D9 6D B9 16 CF FB 32 A7 C8 DB",
#     "session id"          : "25 46 AD 9B 15 8E 3F 28 3F B9 8B 90 62 FB A2 4B 73 AD 04 56 D9 F9 EF 8E 73 2E 3B 44 8A C3 82 44",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 92 99 50 25 E1 B6 9E 51   03 EC 27 F5 C1 63 C6 D5  ..P%...Q..'..c..
#               0010: B1 19 CD 35 60 2A D1 C4   0B FE EC 73 0E 08 6B 10  ...5`*.....s..k.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.990 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D9 10 77 BD 97 BC 33 C5 CE 95 53 DC A4 BD 5F C0 CD DC E8 8C 0D BF 38 06 20 9D 71 BD D4 6E 91 42",
#     "session id"          : "25 46 AD 9B 15 8E 3F 28 3F B9 8B 90 62 FB A2 4B 73 AD 04 56 D9 F9 EF 8E 73 2E 3B 44 8A C3 82 44",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D4 19 94 92 92 9D 7C B9   98 9B 32 59 50 08 68 0E  ..........2YP.h.
#             0010: FE 3A 45 C5 B6 AF 37 60   62 06 BC 13 BA 3C 4E 38  .:E...7`b....<N8
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.991 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.991 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.992 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.992 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.993 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.996 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.996 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:47.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:47.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.005 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.007 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.008 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.012 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.012 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.012 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:45:48.013 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-12 24:45:48.015 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-12 24:47:06.191 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:47:06.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:47:06.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:47:06.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 24:47:06.238 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34052/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28447ms
ok 65 stop command for single port in 30621ms
ok 66 status detects locally running solr in 14322ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2168ms
ok 69 copying files around in 6455ms
ok 70 upconfig in 2582ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 13s
673 actionable tasks: 657 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m41.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5644 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5644/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39573/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 19:59:34.417; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 19:59:34.422; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 19:59:35.350; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 19:59:35.390; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22162ms
ok 61 start solr with client truststore and security manager in 24826ms
not ok 62 start solr with mTLS needed in 61339ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-zgxnrt/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39573.
#
# Started Solr server on port 39573 (pid=200625). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39574.
#
# Started Solr server on port 39574 (pid=201056). Happy searching!
#
# INFO  - 2023-10-11 20:00:57.328; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 20:00:57.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 20:00:57.722; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 20:00:57.725; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 20:00:57.726; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:00:57.759 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 B0 52 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:33.000 UTC",
#     "not  after"         : "2024-01-09 20:00:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A0 DF F5 CE 25 92 F0   30 40 D5 D8 85 10 27 B6  .....%..0@....'.
#         0010: B0 97 ED 53                                        ...S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:00:57.763 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 05 24 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:25.000 UTC",
#     "not  after"         : "2024-01-09 20:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:00:57.778 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:00:58.009 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.009 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:00:58.011 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:00:58.011 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.028 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.028 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.028 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:00:58.031 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1C A2 4A 1C 95 CB D0 75 1A 96 38 8B 8A DD 71 38 23 38 28 FE 84 9A 61 45 8A BC D4 72 D2 B0 22 18",
#   "session id"          : "BE 89 F8 B5 1E 2E 41 09 0D F2 6A 63 37 87 D4 57 43 49 B0 3B 33 BD C5 B9 31 A0 61 AF EF 9C 70 FE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 60 8C 0E 38 EB 68 0D 41   5F 94 8B E8 99 A4 3C D5  `..8.h.A_.....<.
#             0010: F2 B8 6F F2 B5 BD 88 91   55 AB 61 A3 DE D9 F9 4F  ..o.....U.a....O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.137 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 EA 77 C9 14 E2 B1 2A C6 CD F3 12 05 E2 A9 03 7C E1 0F 47 57 5E C1 58 BF 30 85 A5 C0 76 35 6D",
#   "session id"          : "BE 89 F8 B5 1E 2E 41 09 0D F2 6A 63 37 87 D4 57 43 49 B0 3B 33 BD C5 B9 31 A0 61 AF EF 9C 70 FE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 97 E0 D6 A3 1E CD 96 FE   75 7A AC 16 06 FD 34 F1  ........uz....4.
#           0010: 68 91 78 04 69 3F AA 38   5C 1A 65 90 B5 4D 67 58  h.x.i?.8\.e..MgX
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.137 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.137 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.139 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.142 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.142 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.143 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.144 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.151 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.154 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.157 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.157 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.160 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.160 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.161 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.161 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.162 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.162 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.163 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.166 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E F8 14 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:29.000 UTC",
#       "not  after"         : "2024-01-09 20:00:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 C4 87 99 30 43 30 90   93 D5 6A E3 E8 E5 61 2E  ....0C0...j...a.
#           0010: 92 75 C5 0E                                        .u..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.166 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:00:58.223 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:00:58.223 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:00:58.223 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:00:58.223 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.245 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.249 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 77 D6 CD 19 DB 45 DF   00 05 FF 24 77 C9 FC D6  Tw....E....$w...
#     0010: 07 40 0D 47 EB B9 52 D5   CE B4 53 79 6B 86 2D E1  .@.G..R...Syk.-.
#     0020: C0 2E 2B C4 30 E2 E8 55   B2 5E A3 9E 82 61 5B A3  ..+.0..U.^...a[.
#     0030: F3 60 3F 98 64 53 49 3A   8B D9 13 98 30 89 24 5B  .`?.dSI:....0.$[
#     0040: 59 D3 D8 BD 8D A5 65 43   A4 6B B0 2F E7 79 DD 00  Y.....eC.k./.y..
#     0050: 4A 4D 4D 7E B0 39 9B 9F   6B 37 5F 9C A7 0F 80 50  JMM..9..k7_....P
#     0060: 45 95 BD FF 13 94 15 AA   57 AA ED 22 01 80 92 31  E.......W.."...1
#     0070: 48 0B 14 9A 26 9A 6A E8   68 C8 B2 8E B5 FB DF 4D  H...&.j.h......M
#     0080: 33 7F D9 2C 88 19 64 A9   4E A2 CB 7A E5 D3 51 F3  3..,..d.N..z..Q.
#     0090: DE 42 9C 76 D4 B2 EE 30   26 E6 E5 94 A0 C1 89 13  .B.v...0&.......
#     00A0: C7 71 18 78 D3 43 DC 5C   9F BF B7 11 98 1F 21 55  .q.x.C.\......!U
#     00B0: D9 D8 84 B8 EE F4 DF F9   DA F1 5F F0 CC 07 92 FD  .........._.....
#     00C0: 61 6A B5 3C C6 D3 FD 7B   C3 B5 CD C9 CC F1 F8 D7  aj.<............
#     00D0: CE 1C 1A EB F8 C3 F1 E7   98 05 AC 19 0B D2 43 3E  ..............C>
#     00E0: D1 01 28 46 D2 95 93 47   6A 54 D7 5E 6C 28 46 44  ..(F...GjT.^l(FD
#     00F0: B5 A5 DC 4A 6C CA E5 4C   3D 12 79 0D 41 8E F8 F0  ...Jl..L=.y.A...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.251 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E2 6B 7B 0C A3 05 65 32   60 6E 82 A4 26 BD 78 F3  .k....e2`n..&.x.
#     0010: 2A 73 7F 56 AF 56 AF 53   7F 13 A5 E4 C8 5E 2A A1  *s.V.V.S.....^*.
#     0020: FE B1 A8 25 00 B8 25 B3   80 24 18 00 19 A7 54 75  ...%..%..$....Tu
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.253 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:00:58.254 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:00:58.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:00:58.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:00:58.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.256 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 B0 52 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:33.000 UTC",
#       "not  after"         : "2024-01-09 20:00:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A0 DF F5 CE 25 92 F0   30 40 D5 D8 85 10 27 B6  .....%..0@....'.
#           0010: B0 97 ED 53                                        ...S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 CF 58 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:27.000 UTC",
#       "not  after"         : "2024-01-09 20:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#           0010: 04 70 D3 FE                                        .p..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.285 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E FE E3 FD 3C 77 FB 9E   1E A4 DC 66 71 14 93 B7  n...<w.....fq...
#     0010: EE F7 E7 21 91 76 EC 9F   E3 C6 2B 1B 9E 0F 46 F0  ...!.v....+...F.
#     0020: 69 C2 6F 66 1D DE 75 BA   B9 54 42 35 AE 48 B3 10  i.of..u..TB5.H..
#     0030: 4D E9 77 9C 3C 24 03 C0   CB C1 1A 6F 97 A1 89 21  M.w.<$.....o...!
#     0040: 4D C2 CF 05 4B 42 13 CA   35 EB A8 BC BE AE 88 AF  M...KB..5.......
#     0050: B5 A4 F1 FB 1E A0 BC 08   3D FA DF E6 18 24 21 10  ........=....$!.
#     0060: 2A 9C 6E 72 7F 1F 5B 68   FB F6 9A A2 02 69 75 36  *.nr..[h.....iu6
#     0070: A9 AA 69 CC F0 33 9F DF   09 F2 D8 D6 B6 D9 4D 39  ..i..3........M9
#     0080: 13 25 6F 86 0E EF 8A BD   50 40 56 D8 A5 D9 3B AB  .%o.....P@V...;.
#     0090: 19 F1 F5 F7 C4 AE 97 94   61 5E FB A6 3B 35 76 26  ........a^..;5v&
#     00A0: EC B4 DD AF 78 68 97 0E   2E FE 0F 5F 21 DC B2 A9  ....xh....._!...
#     00B0: 4C 30 66 4A 88 83 BF AD   8E FB DE D4 1C 9B 7F 8C  L0fJ............
#     00C0: D0 0D EB C2 EF A6 39 F7   B7 8E B2 5E EE 2E A9 B7  ......9....^....
#     00D0: 8B C2 B7 61 C7 67 85 FC   E6 D0 92 F0 C8 41 91 FA  ...a.g.......A..
#     00E0: D3 36 7F A4 7B 2A 91 7C   EF 53 78 F8 11 1E 2A CB  .6...*...Sx...*.
#     00F0: D1 4F 4A 33 D9 A2 04 C9   CF E3 EE 9B 7E E5 82 6E  .OJ3...........n
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.286 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 7D A9 17 CC 42 C1 B0   40 94 D6 AA EB E6 39 36  .....B..@.....96
#     0010: DE C1 A8 FF 1B CF 5C E7   1A 29 5E FB 3E DD 29 6D  ......\..)^.>.)m
#     0020: BA 62 F9 4B AB CD 42 29   A2 48 6C BD B3 3E E6 1C  .b.K..B).Hl..>..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.287 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:00:58.343 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "76 C1 37 0B 7F 5C 3D EC 78 0D 03 65 D7 A5 10 9E 3B 2F 99 8E 78 6B 60 9D E8 50 B1 56 5C 49 CA A0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 20:00:58.627 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 20:00:58.628 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 20:00:59.571; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 20:00:59.577; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 20:00:59.960; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 20:00:59.963; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 20:00:59.964; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zgxnrt/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:00:59.996 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 B0 52 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:33.000 UTC",
#     "not  after"         : "2024-01-09 20:00:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A0 DF F5 CE 25 92 F0   30 40 D5 D8 85 10 27 B6  .....%..0@....'.
#         0010: B0 97 ED 53                                        ...S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:01:00.001 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 05 24 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:25.000 UTC",
#     "not  after"         : "2024-01-09 20:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 20:01:00.016 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:01:00.089 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:01:00.090 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:01:00.090 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:01:00.090 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:00.244 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.244 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:00.246 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:00.246 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.251 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.263 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.263 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:00.266 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9D A6 88 3B D9 51 05 55 26 F4 CB 78 25 F1 A5 88 65 DE 43 54 E8 35 D0 17 D0 14 71 F0 17 CA 54 E3",
#   "session id"          : "36 05 58 A2 0C B2 CC 80 CA 06 CC 0E 22 A3 E9 F7 85 7E 20 38 B4 D6 6E 4F BE 02 18 73 A2 02 AE A7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C8 9E EF 7B F9 1F 24 D4   DC 95 61 A1 AE 7D EC 1C  ......$...a.....
#             0010: CA B8 83 8C AF 33 59 9B   EC B6 FB 69 FE 7A 2E 1E  .....3Y....i.z..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.368 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "21 3F 37 C6 D1 AF 96 43 27 7F E4 E5 1F 80 14 41 E8 CB 9D FF 33 B1 F6 5E 5A C7 99 1C AC A4 F7 B2",
#   "session id"          : "36 05 58 A2 0C B2 CC 80 CA 06 CC 0E 22 A3 E9 F7 85 7E 20 38 B4 D6 6E 4F BE 02 18 73 A2 02 AE A7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 53 5A 82 88 64 16 A4   66 75 A6 1F 6F 3B 50 9B  hSZ..d..fu..o;P.
#           0010: DE 55 0D EF AD 02 64 2C   D6 46 85 8F 8D CD AA 79  .U....d,.F.....y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.368 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.369 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.370 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.370 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.370 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.370 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.371 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.371 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.371 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.371 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.374 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.374 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.375 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.376 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.376 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.383 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.385 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.386 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.390 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.390 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.390 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.390 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.391 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.391 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.391 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.393 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.393 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.393 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.394 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.394 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.395 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.395 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.398 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E F8 14 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:29.000 UTC",
#       "not  after"         : "2024-01-09 20:00:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 C4 87 99 30 43 30 90   93 D5 6A E3 E8 E5 61 2E  ....0C0...j...a.
#           0010: 92 75 C5 0E                                        .u..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.398 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.477 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 CF 58 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 20:00:27.000 UTC",
#     "not  after"         : "2024-01-09 20:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#         0010: 04 70 D3 FE                                        .p..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#         0010: 75 23 EA 4A                                        u#.J
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.481 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 98 80 15 BE A3 95 CA 50   6C CE D2 C7 4A 63 11 52  .......Pl...Jc.R
#     0010: 06 3C 34 3A EB 39 FD 7A   03 2A 34 8D 34 F4 31 5E  .<4:.9.z.*4.4.1^
#     0020: F4 C7 E4 36 6F 88 AF 9D   86 C5 8C 42 43 4C 94 E5  ...6o......BCL..
#     0030: 99 46 E2 CB 01 84 70 86   DC 24 34 90 16 E6 28 BC  .F....p..$4...(.
#     0040: F4 32 1B AC 79 D4 07 CA   11 EB 83 0A EE 78 F1 30  .2..y........x.0
#     0050: 45 75 A6 0A 88 52 C9 46   84 41 D2 AB 00 0E 0A 6E  Eu...R.F.A.....n
#     0060: 12 D6 D3 74 16 87 CE 9F   D5 D4 34 B4 6F 00 08 A4  ...t......4.o...
#     0070: A0 23 C0 EC F2 A0 12 00   98 0B EC FD 49 04 39 03  .#..........I.9.
#     0080: E6 52 52 37 9B 94 90 F9   E5 4F AB C0 EA 6F B8 E1  .RR7.....O...o..
#     0090: 91 31 2E 9E 15 81 04 31   C1 7F D1 32 72 28 EC AB  .1.....1...2r(..
#     00A0: 0D 75 84 CE 79 E8 5B C8   EC BA 9C BE 2A F3 AF F8  .u..y.[.....*...
#     00B0: 5F 3B 15 A2 1A BE 3E 4B   A8 11 22 D3 B7 ED CD B8  _;....>K..".....
#     00C0: 04 26 88 DF 39 B8 2E C2   9B 44 D0 72 6E 21 33 F1  .&..9....D.rn!3.
#     00D0: E7 CB 8A 40 70 31 86 70   91 99 31 5A AB 4F A2 60  ...@p1.p..1Z.O.`
#     00E0: 44 C3 DE 62 70 2D 1C C8   46 54 D2 2E 18 4A 26 61  D..bp-..FT...J&a
#     00F0: BF D0 7B FD AF 6D 59 29   9A B1 4D B8 AA 22 CD DA  .....mY)..M.."..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.483 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 CD 23 E9 8F 22 DE 47   AC 55 0A CB 66 6E 4D A5  @.#..".G.U..fnM.
#     0010: 2E ED 3B 71 93 E3 94 E4   1B E0 17 1B 38 74 52 57  ..;q........8tRW
#     0020: 54 ED E3 59 95 44 9C D5   EF 6D 63 19 CF 35 AE 0B  T..Y.D...mc..5..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.485 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:01:00.486 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.486 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:01:00.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.487 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 20:01:00.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:00.487 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.488 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.490 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 B0 52 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:33.000 UTC",
#       "not  after"         : "2024-01-09 20:00:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A0 DF F5 CE 25 92 F0   30 40 D5 D8 85 10 27 B6  .....%..0@....'.
#           0010: B0 97 ED 53                                        ...S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 CF 58 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:27.000 UTC",
#       "not  after"         : "2024-01-09 20:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#           0010: 04 70 D3 FE                                        .p..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.515 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 1A 91 DE 01 69 91 AD   38 9F 19 64 F4 37 9C E4  G....i..8..d.7..
#     0010: CC D3 BB 8A C5 24 6C 22   DF 17 5E 0F 60 86 B0 4B  .....$l"..^.`..K
#     0020: F1 56 CE 3D 50 FC 6E DE   E2 C6 A6 99 DE 64 87 79  .V.=P.n......d.y
#     0030: C8 A8 07 30 B0 37 5D 9A   43 12 BA 16 CA E5 1B F8  ...0.7].C.......
#     0040: 8A 62 29 09 43 04 C9 1F   8A 2E E4 CC 83 94 49 A2  .b).C.........I.
#     0050: 30 8A 4C 50 64 7A 0C B0   F2 28 3A E6 0D 3A 4F 5A  0.LPdz...(:..:OZ
#     0060: A1 CE E8 E6 99 87 B3 B5   19 27 03 AB 17 FB 90 38  .........'.....8
#     0070: AE F0 3A A7 6A 20 44 96   F6 3A 53 E9 A0 7C DC A2  ..:.j D..:S.....
#     0080: F0 6D EF 6B 75 2D 7E EB   35 F1 5A A7 01 62 CF 7D  .m.ku-..5.Z..b..
#     0090: 74 4F 05 C1 D4 31 1B 67   5C 8D 78 C8 79 3A CF A7  tO...1.g\.x.y:..
#     00A0: 85 45 C2 4B F3 08 DA 46   7C F9 16 CF E5 F4 B7 8C  .E.K...F........
#     00B0: 85 E2 74 6E 6E 46 3C 8F   3B 71 3E 68 EE 9B 2A 21  ..tnnF<.;q>h..*!
#     00C0: BC 06 86 61 58 D8 C6 79   A6 E0 64 A7 71 AE 6A 72  ...aX..y..d.q.jr
#     00D0: 92 7A F3 7F 0D 2B 7D A5   48 49 66 C6 4D 50 22 5D  .z...+..HIf.MP"]
#     00E0: 01 66 F2 D8 BC 19 15 D2   20 2A 0B 61 29 4D F9 9C  .f...... *.a)M..
#     00F0: A9 9C 2E 2D 54 13 DD 28   13 4F 9E 11 09 71 D4 72  ...-T..(.O...q.r
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.516 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 28 BF A6 EA E7 0E 57 0E   6B 90 C1 84 61 A1 9A 4D  (.....W.k...a..M
#     0010: 11 B0 BA 0D F6 DC B4 37   6D CF 9D D9 63 1C C3 12  .......7m...c...
#     0020: C8 CB 8F C2 69 A7 DA FD   6C F0 AF 97 70 30 F7 B8  ....i...l...p0..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.517 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:00.573 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9A 26 FB 88 FD 5F 03 32 80 3A A0 C8 A6 E9 15 6D 2A E5 2F 3B 8D 56 FF 29 43 CB 74 FF 08 54 92 A6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 20:01:00.861 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 20:01:00.862 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 20:01:12.504; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 20:01:12.837 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 05 24 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:25.000 UTC",
#       "not  after"         : "2024-01-09 20:00:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#           0010: 04 70 D3 FE                                        .p..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 CF 58 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 20:00:27.000 UTC",
#       "not  after"         : "2024-01-09 20:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 C0 81 09 4D 0E 88 D8   78 27 FC B4 20 A3 E4 03  ....M...x'.. ...
#           0010: 04 70 D3 FE                                        .p..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 8E 6A F1 84 D2 04 FA   8D 8C 98 91 FE 87 24 E3  ..j...........$.
#           0010: 75 23 EA 4A                                        u#.J
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 20:01:12.851 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:13.081 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.081 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:13.083 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 20:01:13.083 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.088 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.100 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.100 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.100 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 20:01:13.102 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "31 8B 4D 3B 14 87 F8 B5 4A 4D 59 7E 49 0D 17 5C A6 10 26 AD AC 5B 84 0C 83 8B 48 06 30 CE 73 00",
#     "session id"          : "7A 4E 7B E9 9B 97 1F BA C6 94 4B 88 83 34 85 00 0F 58 A1 09 C0 68 9A 93 A2 7D 0F EA BC 77 20 82",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: BA 16 08 06 35 36 79 03   F2 B3 EE 19 1D E9 A5 1E  ....56y.........
#               0010: 33 63 D0 DD C3 B1 10 DB   71 1E 4E 46 D3 50 4D 41  3c......q.NF.PMA
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.123 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "65 B2 84 2C F1 32 E5 D9 24 3B 55 FA 88 62 12 BD E7 60 51 2F FF ED FC F1 12 EF 53 34 DC 87 4F 76",
#     "session id"          : "7A 4E 7B E9 9B 97 1F BA C6 94 4B 88 83 34 85 00 0F 58 A1 09 C0 68 9A 93 A2 7D 0F EA BC 77 20 82",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 17 31 0F AE 92 27 D0 C4   18 09 15 47 68 8F 66 FF  .1...'.....Gh.f.
#             0010: B3 F8 B7 BA 73 67 54 26   04 67 C5 26 44 0A B2 08  ....sgT&.g.&D...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.124 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.124 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.126 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.128 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.128 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:13.130 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:13.130 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.138 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.140 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.142 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.148 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.148 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.149 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:13.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:01:13.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 20:01:13.151 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 20:02:36.386 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:02:36.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:02:36.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:02:36.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 20:02:36.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39574/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28458ms
ok 65 stop command for single port in 31127ms
ok 66 status detects locally running solr in 14503ms
ok 67 status does not expose cli parameters to end user in 220ms
ok 68 listing out files in 2241ms
ok 69 copying files around in 6678ms
ok 70 upconfig in 2720ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1221ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 1s
673 actionable tasks: 657 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m28s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5643 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5643/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43653/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 14:09:17.266; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 14:09:17.273; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 14:09:18.283; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 14:09:18.327; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23274ms
ok 61 start solr with client truststore and security manager in 26157ms
not ok 62 start solr with mTLS needed in 60688ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-OoAAP2/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43653.
#
# Started Solr server on port 43653 (pid=201170). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43654.
#
# Started Solr server on port 43654 (pid=201623). Happy searching!
#
# INFO  - 2023-10-11 14:10:44.252; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 14:10:44.257; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 14:10:44.662; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 14:10:44.665; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 14:10:44.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:44.701 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 17 61 F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:20.000 UTC",
#     "not  after"         : "2024-01-09 14:10:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 9B 18 DD 5B CC 21 21   9D 66 79 D8 E6 5E 85 1C  V...[.!!.fy..^..
#         0010: B8 81 2D CF                                        ..-.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:44.706 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 98 1A 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:10.000 UTC",
#     "not  after"         : "2024-01-09 14:10:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:44.721 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:44.814 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:44.815 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:44.816 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:44.816 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:44.966 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:44.968 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:44.969 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.974 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.989 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:44.992 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "99 80 81 2E E4 B6 CE 7C A4 43 10 31 BD 2C D8 5A CA F4 31 DA 7A E8 A3 59 8F 6E 47 79 39 FD 5B DD",
#   "session id"          : "82 E1 32 27 41 F4 D3 B9 2D 7D BF 26 6B 1E B9 F9 5D 17 BE AF B2 3F B5 AB 63 0E E9 56 FD 09 69 87",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 45 A8 98 32 64 4E 70   52 80 13 8B BE 9F 40 F9  .E..2dNpR.....@.
#             0010: F0 2E 79 6D 82 0E 94 C6   36 A7 D5 CC 80 DB 77 2A  ..ym....6.....w*
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.134 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "81 2A 3A D4 3A 90 84 5C 76 97 BF B9 DF AE 66 67 F5 FF 36 98 3C C3 90 F8 98 9D 47 78 94 BA 23 D6",
#   "session id"          : "82 E1 32 27 41 F4 D3 B9 2D 7D BF 26 6B 1E B9 F9 5D 17 BE AF B2 3F B5 AB 63 0E E9 56 FD 09 69 87",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 14 42 BB 67 1A 70 21 C1   90 81 50 06 AF 1F F1 D1  .B.g.p!...P.....
#           0010: 6C 24 67 FF 8C 20 9E CC   82 43 9A 85 D2 2F 21 0E  l$g.. ...C.../!.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.134 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.134 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.136 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.139 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.140 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.151 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.154 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.164 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.165 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.168 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.168 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.168 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.169 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.170 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.170 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.171 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.175 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 F9 6B FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:15.000 UTC",
#       "not  after"         : "2024-01-09 14:10:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 2B F5 97 28 65 1E 84   86 C8 6E 71 7A 51 04 7A  .+..(e....nqzQ.z
#           0010: 1C 1E C2 BC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.175 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.271 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.278 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 2D 6A C8 06 58 36 77   EB 6D 52 F3 CB 88 BE A0  Q-j..X6w.mR.....
#     0010: A1 30 08 86 6B 8D 96 A6   58 4B 30 1B 58 42 9A 2C  .0..k...XK0.XB.,
#     0020: 48 CA C8 0E 89 90 F4 6A   DA EF 4D 5E 54 63 5F 32  H......j..M^Tc_2
#     0030: 6F C3 75 C2 BA 6D 58 E4   A5 3B C4 B6 F1 A3 63 70  o.u..mX..;....cp
#     0040: 6F 16 A8 78 C7 51 13 10   27 62 ED 1A AD 79 26 36  o..x.Q..'b...y&6
#     0050: EA C7 2A 53 AD 43 B2 66   87 6C E9 68 59 28 1C 0B  ..*S.C.f.l.hY(..
#     0060: FE E8 2F 72 83 F2 D8 99   38 C4 9E 1A D1 EC 35 85  ../r....8.....5.
#     0070: 1C 4B E4 1D C3 DA 9C 13   2B 27 C5 D0 CF 28 CA 46  .K......+'...(.F
#     0080: B8 45 89 F1 1C 1A 2E 1A   59 B9 78 5A 68 11 49 37  .E......Y.xZh.I7
#     0090: 1A BA E5 DD 57 44 D3 AF   90 CB 0E 0E 07 97 22 5D  ....WD........"]
#     00A0: C1 3A 3E 32 FA B9 2A 0F   7A 07 D6 26 BB 36 CC 68  .:>2..*.z..&.6.h
#     00B0: 9E C9 8E E3 CE 1F F3 E0   32 0B D4 92 F1 AB 7A 0A  ........2.....z.
#     00C0: CF 89 80 2E E8 EB 99 76   3B C0 55 69 0C 76 78 69  .......v;.Ui.vxi
#     00D0: 77 29 47 36 BE B7 1C 3C   A8 2F B6 25 60 0A 48 03  w)G6...<./.%`.H.
#     00E0: E8 70 D8 08 A5 F3 EA F1   E1 74 F1 EA E6 4A 4E 34  .p.......t...JN4
#     00F0: A1 8F 5C 35 64 8D 17 85   DE BC 26 48 0F F9 DF 9D  ..\5d.....&H....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.280 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 C4 89 6A D6 D8 9B C6   E7 6A 5E F6 E9 86 51 2F  ...j.....j^...Q/
#     0010: 38 13 2A 7D FD 8A F3 C9   99 2C 6E 07 AB 23 5B FD  8.*......,n..#[.
#     0020: 76 0B A9 B6 69 F7 E0 C7   5B AB FF 5F FE 3B 0C A0  v...i...[.._.;..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.284 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:45.285 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.285 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:45.285 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.285 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:45.286 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:45.286 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.286 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.290 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 17 61 F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:20.000 UTC",
#       "not  after"         : "2024-01-09 14:10:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 9B 18 DD 5B CC 21 21   9D 66 79 D8 E6 5E 85 1C  V...[.!!.fy..^..
#           0010: B8 81 2D CF                                        ..-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 C9 48 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:13.000 UTC",
#       "not  after"         : "2024-01-09 14:10:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#           0010: CE 7B C5 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.333 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A 12 0D B1 B1 0F 88 6C   BC 7C 04 27 02 F3 42 40  J......l...'..B@
#     0010: A9 3A 28 22 43 3F 2A 6C   A9 46 F0 0E A2 7D 6E 9D  .:("C?*l.F....n.
#     0020: 5F CA 02 69 35 74 7C 89   DA BA C7 C1 B8 AA 37 DC  _..i5t........7.
#     0030: 13 70 0E 48 59 83 87 FB   2A 25 06 EC 95 D0 9B 4E  .p.HY...*%.....N
#     0040: 61 3E 3B 91 AA B3 C0 48   1C 44 CE 5D 59 1F 02 0E  a>;....H.D.]Y...
#     0050: B8 C9 19 F4 46 52 64 BC   81 AB 78 04 54 F7 E2 2A  ....FRd...x.T..*
#     0060: D4 FA 8E F0 77 E1 32 1F   78 62 F5 4E C1 3E 8F 2C  ....w.2.xb.N.>.,
#     0070: F6 70 4B E4 D1 2E 39 75   7E 63 BE BA E5 52 44 1D  .pK...9u.c...RD.
#     0080: DD 57 1D BF 23 E4 19 31   FC 8F F2 0C BF 23 BC C3  .W..#..1.....#..
#     0090: 88 F9 71 D3 59 CC C5 35   2A 88 CD BE 5E 6D 0D 1C  ..q.Y..5*...^m..
#     00A0: 93 58 57 AF 3E 1A FD BB   D5 4C 4C 01 4B B2 3C D2  .XW.>....LL.K.<.
#     00B0: F6 AC AB 16 52 0E 9A 9C   C6 10 35 19 21 67 CA 2D  ....R.....5.!g.-
#     00C0: A1 CB 67 88 55 BE BA FD   E9 FE 7B 65 30 0F 14 4C  ..g.U......e0..L
#     00D0: 6F 3E FA 30 1F BB E1 11   32 1F 12 80 B7 58 7C 38  o>.0....2....X.8
#     00E0: C8 35 87 23 EA 7E FA FF   A2 D7 CC DA 3B 23 0E 61  .5.#........;#.a
#     00F0: CB BD 4A E1 11 D2 EA 8E   11 B9 42 D5 C6 70 8B 61  ..J.......B..p.a
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.334 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A4 4F 80 EA CA B9 5C 02   7C 6E A7 67 9F 13 3F 9A  .O....\..n.g..?.
#     0010: EB FC 07 E5 4E F2 F1 9A   C4 30 4A 8A 88 4F 5F 4C  ....N....0J..O_L
#     0020: 9B 08 A3 80 27 01 53 1B   A2 EA FE 2E 7C D5 AA C0  ....'.S.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.335 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:45.394 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "39 EC ED BC 93 F9 21 4B EC B1 87 B8 15 7C 35 A3 A6 97 4A 3A 7E 73 EE 64 E7 D3 58 BB B5 99 BC 72",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 14:10:45.701 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 14:10:45.702 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 14:10:46.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 14:10:46.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 14:10:47.154; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 14:10:47.157; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 14:10:47.158; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-OoAAP2/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:47.194 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 17 61 F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:20.000 UTC",
#     "not  after"         : "2024-01-09 14:10:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 9B 18 DD 5B CC 21 21   9D 66 79 D8 E6 5E 85 1C  V...[.!!.fy..^..
#         0010: B8 81 2D CF                                        ..-.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:47.200 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 98 1A 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:10.000 UTC",
#     "not  after"         : "2024-01-09 14:10:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 14:10:47.217 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:47.551 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:47.552 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:47.552 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:10:47.552 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:47.699 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:47.702 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:10:47.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.724 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:10:47.728 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "58 1D 1A 52 27 AF 52 40 0D 9F 94 35 33 DD 9A 2C D5 DC 99 1E 2B F4 35 C5 19 A4 72 FE BE E2 57 DA",
#   "session id"          : "28 A3 8D 6F 90 92 F6 EA CA 6B 83 85 F4 D0 76 08 50 5F 2D E3 63 1A C2 0C B7 5C A0 80 B2 E3 1B DA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 00 E7 55 2A A3 52 01   B1 B0 61 92 76 DB 2E 0C  ...U*.R...a.v...
#             0010: CD 2B 83 72 53 82 61 3A   0F 04 6F 2E 86 B0 65 17  .+.rS.a:..o...e.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.844 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0D C6 51 97 C6 81 86 71 9A 5B 7E 45 BA 10 B4 1C DA F4 A7 B6 2B F2 3B E6 24 51 71 CC FC A2 5A B6",
#   "session id"          : "28 A3 8D 6F 90 92 F6 EA CA 6B 83 85 F4 D0 76 08 50 5F 2D E3 63 1A C2 0C B7 5C A0 80 B2 E3 1B DA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7D E4 E7 D0 44 41 2D 07   49 9C 00 FE 4F 98 2A A0  ....DA-.I...O.*.
#           0010: 6F A2 3B 32 E6 0B D6 65   32 4D 6D 2C 22 BF 5A 1A  o.;2...e2Mm,".Z.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.845 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.845 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.846 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.846 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.846 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.847 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.851 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.851 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:47.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:47.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.862 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.865 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.866 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.876 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.876 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.876 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.876 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.876 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.877 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:47.877 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:47.877 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.879 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.880 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.880 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.881 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.882 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:47.882 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.886 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 F9 6B FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:15.000 UTC",
#       "not  after"         : "2024-01-09 14:10:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 2B F5 97 28 65 1E 84   86 C8 6E 71 7A 51 04 7A  .+..(e....nqzQ.z
#           0010: 1C 1E C2 BC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.886 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.987 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 C9 48 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 14:10:13.000 UTC",
#     "not  after"         : "2024-01-09 14:10:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#         0010: CE 7B C5 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#         0010: 21 24 D0 45                                        !$.E
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.994 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 32 10 D7 41 1E 7E B3   76 3C 6B 11 35 02 25 98  52..A...v<k.5.%.
#     0010: 04 82 79 12 9E 01 8E 6A   27 1F 28 9F 5C C3 74 3D  ..y....j'.(.\.t=
#     0020: EC 53 D7 E2 29 4C 81 45   D8 3C DD AA 2C 94 81 B7  .S..)L.E.<..,...
#     0030: FC 94 F5 85 8D 04 33 27   C4 B0 37 13 F5 6C 51 07  ......3'..7..lQ.
#     0040: 33 A2 84 59 9B C1 BB EC   BD 26 2B 2E DB DB 33 24  3..Y.....&+...3$
#     0050: B3 FE 7A 56 45 B3 D2 D6   68 C3 F5 E8 0E 74 10 18  ..zVE...h....t..
#     0060: 97 62 77 33 39 A6 70 9A   26 F2 8A 98 96 AF E0 5D  .bw39.p.&......]
#     0070: 85 8F A3 4C 02 5A 11 C2   90 46 66 90 FD B7 26 5D  ...L.Z...Ff...&]
#     0080: CE 83 30 AD ED 2D 50 01   B4 1A 5B 5C 5C 4B 83 1F  ..0..-P...[\\K..
#     0090: EC E2 7C C4 85 7E A3 1A   00 41 7E 19 82 AB 7A C9  .........A....z.
#     00A0: 98 38 77 66 75 E0 6E 3D   C4 E4 B1 19 13 EF 03 5A  .8wfu.n=.......Z
#     00B0: 16 4A AC A5 08 C1 8D B2   95 2C 31 D0 76 C8 E4 23  .J.......,1.v..#
#     00C0: 85 7C AF 47 F9 66 89 E0   7B 40 3C 87 B2 72 EC D9  ...G.f...@<..r..
#     00D0: 48 93 68 00 4F 01 24 06   2B 22 56 B4 B4 82 6B 38  H.h.O.$.+"V...k8
#     00E0: C7 50 86 CB 52 BD 0E 24   4A 3C F9 CE 88 FB 6B 0B  .P..R..$J<....k.
#     00F0: 1B BF 4A 28 1B 1C FC 2C   38 E0 EA B2 D1 5F 2B 7C  ..J(...,8...._+.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:47.997 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 5D 14 32 3E 48 7A 09   FB 2B 90 2D 92 39 31 AC  .].2>Hz..+.-.91.
#     0010: 7C DF 13 EE AD 1C 23 B4   2F 93 0D 7A 88 91 D9 FA  ......#./..z....
#     0020: 6F 78 A2 F3 C8 1B 01 CF   7E CA C7 8E 0F 5A F3 DD  ox...........Z..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.001 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:48.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:48.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:48.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:48.003 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 14:10:48.003 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:10:48.003 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.004 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.007 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 17 61 F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:20.000 UTC",
#       "not  after"         : "2024-01-09 14:10:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 9B 18 DD 5B CC 21 21   9D 66 79 D8 E6 5E 85 1C  V...[.!!.fy..^..
#           0010: B8 81 2D CF                                        ..-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 C9 48 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:13.000 UTC",
#       "not  after"         : "2024-01-09 14:10:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#           0010: CE 7B C5 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.053 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 F5 17 3F 7F 3A 3E D6   50 0D F6 31 DC BB 69 DD  7..?.:>.P..1..i.
#     0010: C8 7A 5D 61 4F FD 5A 7A   2B 5B 57 8D 71 63 32 E5  .z]aO.Zz+[W.qc2.
#     0020: F3 18 46 E5 87 28 23 D7   CD 5C 51 B8 D1 B9 D9 47  ..F..(#..\Q....G
#     0030: ED 33 9C 4B BA DE DB 6B   DD F6 A0 35 FD A9 E2 78  .3.K...k...5...x
#     0040: 3D 55 D4 D1 4A 0F C1 6A   2F CF DD 15 77 6C C7 0E  =U..J..j/...wl..
#     0050: 40 80 3A 26 A0 68 00 9D   8B EC A9 C5 8F A2 A6 C9  @.:&.h..........
#     0060: 7A 34 12 38 DF 29 1C C1   03 49 A5 64 59 4E 56 C5  z4.8.)...I.dYNV.
#     0070: D8 9D B6 6F E7 E4 B8 2A   B6 9A 27 F5 6F FB A5 BD  ...o...*..'.o...
#     0080: 1F 64 71 A0 9E 38 AB CC   01 AF E3 87 32 C8 ED C6  .dq..8......2...
#     0090: 65 44 B0 67 80 C5 ED 19   B8 85 70 95 05 EE 20 61  eD.g......p... a
#     00A0: 06 9B 2E CE 91 B7 85 E0   B4 DC F4 8E 4F 70 F4 44  ............Op.D
#     00B0: 29 E1 37 BE D6 AD 16 1A   E0 8A 98 D7 64 5D 3D 53  ).7.........d]=S
#     00C0: D1 84 B0 89 7E FC 3A 47   92 A8 9D 8D 7C AD F2 E6  ......:G........
#     00D0: DE 36 33 23 D2 BC 71 2D   EB 3F 42 1B E0 E3 6F F8  .63#..q-.?B...o.
#     00E0: BA 9E 1A B3 41 7F 05 D1   59 D6 FD E6 39 6D 16 E7  ....A...Y...9m..
#     00F0: 9A 11 A2 73 9A A9 86 62   05 E3 E1 A4 85 D1 6E 7B  ...s...b......n.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.055 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 21 17 02 41 25 07 30   BB 34 57 60 E7 94 D7 09  w!..A%.0.4W`....
#     0010: 25 8C EF FD 99 FA 46 07   D4 7D 10 61 3E BE 69 87  %.....F....a>.i.
#     0020: 00 2C EE 76 32 13 46 18   7D DF A0 BA 61 9E 50 D5  .,.v2.F.....a.P.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.055 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:10:48.141 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F8 A0 22 3F CB 74 39 00 43 37 1A BC 96 54 55 0A 87 8D 08 A5 B0 DF 99 C4 FC CA B0 B5 FB 7F E7 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 14:10:48.479 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 14:10:48.480 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 14:11:01.112; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 14:11:01.478 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 98 1A 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:10.000 UTC",
#       "not  after"         : "2024-01-09 14:10:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#           0010: CE 7B C5 7E                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 C9 48 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 14:10:13.000 UTC",
#       "not  after"         : "2024-01-09 14:10:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D 31 0A A3 56 18 36 5E   E0 5F 9F DF 09 40 0F 8D  ]1..V.6^._...@..
#           0010: CE 7B C5 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B 7A FD 9B 92 07 86 CD   93 2A 4B 36 3E 69 9C 83  .z.......*K6>i..
#           0010: 21 24 D0 45                                        !$.E
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 14:11:01.495 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:11:01.746 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.746 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:11:01.748 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 14:11:01.748 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.754 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.769 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.769 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.770 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 14:11:01.773 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5C C4 DB 74 06 E8 AD 9D BE F4 90 39 28 5A AE C7 2C 22 E7 7F 41 AF 82 81 F4 3E 36 A9 F2 A1 E5 47",
#     "session id"          : "B2 73 7A 6F 88 EE 51 75 90 53 55 0F 02 C4 D3 26 9B 97 AA 1A FC 5C DB 76 8F E5 91 81 E7 1F E1 79",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 1D B6 D4 AC 8B E0 E4 23   2A A7 01 E9 2F D4 06 41  .......#*.../..A
#               0010: 3A DF 0E 7F 89 01 5B 98   59 01 7A 1E 43 AF 05 3D  :.....[.Y.z.C..=
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.797 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "00 EE 34 DE A0 01 6D D1 18 48 57 E5 41 AE 92 D9 82 85 DC 44 93 4F BB DD 8D 0C E0 C3 88 CC 02 E5",
#     "session id"          : "B2 73 7A 6F 88 EE 51 75 90 53 55 0F 02 C4 D3 26 9B 97 AA 1A FC 5C DB 76 8F E5 91 81 E7 1F E1 79",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D0 49 DF 2D 60 E9 97 EA   1A C4 68 41 FD 1E 89 B7  .I.-`.....hA....
#             0010: E1 5B 48 0C 2F D3 A0 E6   7F 2C A6 57 31 D4 6D 16  .[H./....,.W1.m.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.798 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.798 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.800 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.800 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.802 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.803 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.803 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.804 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.814 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.816 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.818 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.827 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.827 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.827 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.827 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.828 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:11:01.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:11:01.828 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 14:11:01.830 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 14:12:26.880 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:12:26.916 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:12:26.917 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:12:26.917 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 14:12:26.917 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43654/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28374ms
ok 65 stop command for single port in 31242ms
ok 66 status detects locally running solr in 14538ms
ok 67 status does not expose cli parameters to end user in 233ms
ok 68 listing out files in 2238ms
ok 69 copying files around in 6809ms
ok 70 upconfig in 2803ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1259ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1257ms
ok 73 Cleanup in 1241ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 24m 24s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 25m2.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5642 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5642/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43495/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 09:51:06.189; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 09:51:06.195; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 09:51:07.081; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 09:51:07.121; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22895ms
ok 61 start solr with client truststore and security manager in 24631ms
not ok 62 start solr with mTLS needed in 58606ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lf8AGX/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43495.
#
# Started Solr server on port 43495 (pid=201629). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43496.
#
# Started Solr server on port 43496 (pid=202083). Happy searching!
#
# INFO  - 2023-10-11 09:52:29.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 09:52:29.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 09:52:30.010; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 09:52:30.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@62e20a76(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 09:52:30.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2cc44ad(ca,h=[localhost],a=[],w=[]) for Client@363042d7[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:30.047 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 0A 92 09",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:52:05.000 UTC",
#     "not  after"         : "2024-01-09 09:52:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 C5 A6 DC C8 44 BD 26   98 93 74 0E 96 55 89 31  v....D.&..t..U.1
#         0010: 57 E0 B8 1B                                        W...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:30.052 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 1F 23 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:57.000 UTC",
#     "not  after"         : "2024-01-09 09:51:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:30.067 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:30.387 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:30.388 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:30.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:30.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:30.538 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:30.540 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:30.541 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.547 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.559 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:30.562 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9E B1 48 A3 D6 9D 23 A8 18 C3 8B BE 17 45 EC 2F D5 B2 88 88 BC CB C6 1D 1A 25 15 EE 39 AB BF C2",
#   "session id"          : "EE 3E BF 04 C6 BF F8 1F B5 59 00 67 09 9F FD 04 A6 ED 83 A6 3A 41 63 B6 12 C5 C0 DE E4 BD B7 EC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 75 6C CB 91 08 1B 6A 15   E1 2B BF 06 98 6C 28 C7  ul....j..+...l(.
#             0010: 30 4E 57 6A D3 C1 91 31   DD 76 3F CA 2F 70 EA 02  0NWj...1.v?./p..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.683 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6C FD AF 8D 63 E1 8A 46 56 8B 94 D4 95 06 DE E3 4C 72 E2 5A DC 47 A2 F0 DB 92 D4 48 CB 7D 96 87",
#   "session id"          : "EE 3E BF 04 C6 BF F8 1F B5 59 00 67 09 9F FD 04 A6 ED 83 A6 3A 41 63 B6 12 C5 C0 DE E4 BD B7 EC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 62 84 9B E1 60 FF 24 84   8C 7B 22 67 12 7C 5B 43  b...`.$..."g..[C
#           0010: C5 D7 8B A6 54 BE EC E8   5B C2 65 0D C1 D9 6A 61  ....T...[.e...ja
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.683 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.684 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.686 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.689 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.689 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.691 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.691 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.699 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.700 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.702 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.705 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.708 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.709 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.709 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.710 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.711 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.712 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.712 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.716 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 FF 5A E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:52:01.000 UTC",
#       "not  after"         : "2024-01-09 09:52:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 72 4B 62 2E 17 F6 D4   CF 90 2E 5A 2F AD 7B DA  .rKb.......Z/...
#           0010: BB C6 46 80                                        ..F.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.800 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.804 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 B1 96 2A 15 15 48 3B   D3 5B FE DA 6E 78 8A B2  q..*..H;.[..nx..
#     0010: 1C 34 4F 10 1D BF AA D3   AF 33 7B 34 0A 60 81 7B  .4O......3.4.`..
#     0020: 73 21 2B 5B 37 EB CA 3A   69 D7 DF 32 A3 8F 90 0A  s!+[7..:i..2....
#     0030: 2D 3A 56 52 CD DF B4 D0   56 0F 70 C4 07 AD D2 BE  -:VR....V.p.....
#     0040: DC 00 8B ED 2B C9 6D BB   52 16 A3 81 CD 09 B0 B8  ....+.m.R.......
#     0050: E4 9A 31 BB DC 29 F9 21   D9 59 CB 44 B6 13 E0 0F  ..1..).!.Y.D....
#     0060: 10 9D B1 D9 D2 DE A8 6B   DF C6 CE C1 0B 29 9D A8  .......k.....)..
#     0070: 10 73 7A 03 F0 41 27 D7   E6 94 86 21 4F 81 68 C1  .sz..A'....!O.h.
#     0080: 0A 15 D2 B3 69 F4 F8 B9   08 8C FA EC 7A 2A 42 A7  ....i.......z*B.
#     0090: D5 39 B9 37 EF C9 71 FB   EC 76 C9 43 1D 92 15 06  .9.7..q..v.C....
#     00A0: 91 76 75 1A 50 46 49 E9   7D A6 E9 01 E0 BF 9C 19  .vu.PFI.........
#     00B0: ED F5 0F DF 6A 7A E8 71   B8 95 F4 7B 54 C4 B6 E2  ....jz.q....T...
#     00C0: 5F D7 73 4E F4 FA B2 12   D8 C6 42 FD 31 98 D6 A5  _.sN......B.1...
#     00D0: 29 0B 19 6F 4B 54 17 88   EF A7 5D 63 64 A1 05 1C  )..oKT....]cd...
#     00E0: 00 8E 90 F9 CD 02 99 25   DF F8 37 C7 1B FB CD 74  .......%..7....t
#     00F0: 83 81 38 04 0E B6 63 8D   B0 55 D2 ED 6D FC FD 29  ..8...c..U..m..)
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.806 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E2 97 1F CE 6E E7 E3 CD   09 31 38 88 C9 AF 04 18  ....n....18.....
#     0010: 8B 26 2F 16 8B A7 8F 2C   DD 18 1C 7A ED 0C A5 E7  .&/....,...z....
#     0020: FD 12 6F FF D3 63 E1 FD   66 5B 3B 8B B4 42 32 A5  ..o..c..f[;..B2.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.809 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:30.810 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.810 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:30.811 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.811 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:30.811 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:30.811 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.812 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.815 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 0A 92 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:52:05.000 UTC",
#       "not  after"         : "2024-01-09 09:52:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 C5 A6 DC C8 44 BD 26   98 93 74 0E 96 55 89 31  v....D.&..t..U.1
#           0010: 57 E0 B8 1B                                        W...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 63 15 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:51:59.000 UTC",
#       "not  after"         : "2024-01-09 09:51:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#           0010: DE EA 27 FF                                        ..'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.842 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 74 B2 3D B9 AF 60 57   1B 86 1C 3F 30 03 6C EC  zt.=..`W...?0.l.
#     0010: 5C 7F 01 64 DE 00 28 18   29 19 C1 A6 E9 89 15 C3  \..d..(.).......
#     0020: 0B DA ED F7 65 94 88 75   AA 9F D6 CD B0 5B 21 AD  ....e..u.....[!.
#     0030: 04 77 18 4D 12 A8 F8 43   EA 3C 3E 39 52 76 9E B2  .w.M...C.<>9Rv..
#     0040: 54 94 FD A9 4A 0B 7A 4D   4B 64 70 E8 CA 67 A4 77  T...J.zMKdp..g.w
#     0050: 37 5B 08 47 D2 B5 A8 E7   D7 F1 20 2E EB 3C 06 AF  7[.G...... ..<..
#     0060: 31 00 50 BE F0 AB 47 F5   1A 20 78 3E AE 0B 34 1A  1.P...G.. x>..4.
#     0070: 43 E5 9D 1E 96 D0 E2 6D   D7 7E 42 13 09 11 59 B7  C......m..B...Y.
#     0080: E6 34 41 F7 62 99 10 6B   15 6D 29 92 D5 8F 24 F4  .4A.b..k.m)...$.
#     0090: 58 B7 BE 3D 00 AF D7 19   A0 4C 08 6E C4 88 45 99  X..=.....L.n..E.
#     00A0: 5C 8C B9 97 9D 94 95 24   60 48 90 BB 9E 17 6B BE  \......$`H....k.
#     00B0: AB 80 27 E5 74 73 16 53   19 35 39 D6 0C D6 7D A8  ..'.ts.S.59.....
#     00C0: 8A 51 A6 8F 22 2E 47 21   90 52 2C E1 5A C4 B0 EF  .Q..".G!.R,.Z...
#     00D0: EC C0 1B B2 19 90 1F 1E   A8 31 E3 49 FF E0 D7 10  .........1.I....
#     00E0: 48 60 B4 85 CB 23 16 2B   1C 9A 2F 3F C0 87 FB 7D  H`...#.+../?....
#     00F0: 56 88 1A 4F 21 5C 7F 0B   E6 76 E8 C2 40 26 36 D9  V..O!\...v..@&6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.843 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AA 9C 62 8E 93 4F 55 16   CC 7B 9E 66 E2 02 22 71  ..b..OU....f.."q
#     0010: B8 2A 14 A2 3B D0 B1 F0   31 1D 2E EE DA DC FC 8C  .*..;...1.......
#     0020: FA 79 26 3E A1 32 21 74   28 F2 A3 7F 0F 9F 68 FD  .y&>.2!t(.....h.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.844 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:30.906 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "16 DA AA 00 25 8A 52 9E 9B 9E CA 1A 1C 05 6A 1B 70 3B 75 8C 6B 3B 9F CB 9F 97 14 B1 01 92 78 A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 09:52:31.278 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 09:52:31.279 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 09:52:32.190; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 09:52:32.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 09:52:32.563; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 09:52:32.566; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 09:52:32.567; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lf8AGX/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:32.598 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 0A 92 09",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:52:05.000 UTC",
#     "not  after"         : "2024-01-09 09:52:05.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 C5 A6 DC C8 44 BD 26   98 93 74 0E 96 55 89 31  v....D.&..t..U.1
#         0010: 57 E0 B8 1B                                        W...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:32.603 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 1F 23 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:57.000 UTC",
#     "not  after"         : "2024-01-09 09:51:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:32.617 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:32.838 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:32.841 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:32.841 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.846 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.857 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.858 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.858 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:32.860 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 50 B6 7A AD B9 AF E8 05 46 26 10 3C 85 46 4E 7C BB C0 C7 C6 74 E4 13 7F 65 A5 18 B7 7A 7E 4A",
#   "session id"          : "66 A9 23 11 03 C8 DF 5F D9 89 A1 6B 1A CB FF 8F 13 7A DE 61 58 69 7D BD 11 24 36 E1 E3 68 10 AD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DD 1F 91 F1 60 B0 73 0B   25 53 90 82 B5 44 D9 60  ....`.s.%S...D.`
#             0010: 2A C4 DB 67 EC 05 2A CE   0D EE 0E ED BF 70 F2 3A  *..g..*......p.:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.960 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "87 AB EC E8 44 76 7B 0C 8C 42 00 65 90 97 C2 D4 9D 7B CA C9 65 C6 71 E6 52 35 43 32 D8 6C 0E C5",
#   "session id"          : "66 A9 23 11 03 C8 DF 5F D9 89 A1 6B 1A CB FF 8F 13 7A DE 61 58 69 7D BD 11 24 36 E1 E3 68 10 AD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E3 BE 00 07 0B 37 46 41   42 82 F5 36 7D 61 73 A9  .....7FAB..6.as.
#           0010: C4 75 04 8C E6 D1 21 A1   B6 51 24 D2 6B 49 CA 1B  .u....!..Q$.kI..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.961 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.961 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.963 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.965 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.974 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.975 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.977 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.980 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.980 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.980 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:32.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.983 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.984 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.984 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:32.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.988 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 FF 5A E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:52:01.000 UTC",
#       "not  after"         : "2024-01-09 09:52:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BA 72 4B 62 2E 17 F6 D4   CF 90 2E 5A 2F AD 7B DA  .rKb.......Z/...
#           0010: BB C6 46 80                                        ..F.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:32.988 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:33.050 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:33.050 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:33.050 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:52:33.050 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.078 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 63 15 D4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 09:51:59.000 UTC",
#     "not  after"         : "2024-01-09 09:51:59.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#         0010: DE EA 27 FF                                        ..'.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#         0010: 10 87 E6 F8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.082 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 14 34 19 54 F9 5F D2 DA   DB 87 A6 34 9D F6 75 D4  .4.T._.....4..u.
#     0010: B2 C9 27 2E 6D 1D A4 49   41 25 AC CA 64 B0 58 25  ..'.m..IA%..d.X%
#     0020: 23 36 7F F2 91 7B FD 0B   02 09 8A 14 FC 0B BF 43  #6.............C
#     0030: EC C6 86 95 31 BA 27 0D   EB F5 A2 BD 8C 46 0C D0  ....1.'......F..
#     0040: 8E FB F2 05 BD 5D 4A C0   E7 D9 6F 87 50 57 3F FE  .....]J...o.PW?.
#     0050: 41 76 74 5E 84 72 EF A0   8B FB 0E 4B 64 B2 E3 1C  Avt^.r.....Kd...
#     0060: 20 C1 6C D6 C5 FB 66 15   4B 91 4D 74 17 04 91 1A   .l...f.K.Mt....
#     0070: 37 8F 2B 8C BC 0C 14 3C   90 EB CF 29 EB 91 3B 48  7.+....<...)..;H
#     0080: 05 26 5B B5 37 F2 E0 5E   C1 5A DA D7 B7 7F 0B 98  .&[.7..^.Z......
#     0090: 51 D1 DB 61 8C F1 AE E5   AB EB 7A 4B 6C FE EF AB  Q..a......zKl...
#     00A0: 98 7D 93 DA C5 CD 51 2E   D6 C0 A9 FD 07 81 93 C2  ......Q.........
#     00B0: 93 BA 7D B2 FD 2C DD BF   2E A8 E4 E3 B2 76 1B AB  .....,.......v..
#     00C0: FB C7 C6 76 C8 25 9C 69   C0 A8 79 F1 38 6E 1B F0  ...v.%.i..y.8n..
#     00D0: 16 62 9F 4E 2F E6 EA EA   64 C9 B1 B0 E4 9C DC F1  .b.N/...d.......
#     00E0: 3A CA 6B 5F 11 0E FF 6D   D3 B8 7F 78 3D E0 39 F3  :.k_...m...x=.9.
#     00F0: CF F3 D0 29 E5 6B F5 B7   56 B5 B9 99 3E 23 B4 92  ...).k..V...>#..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.084 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 9E BD 52 E7 86 BE 7E   BD 41 F8 FE 55 57 17 4C  v..R.....A..UW.L
#     0010: 7B D6 D0 1B 92 75 B6 31   CD 3B E6 23 22 BC 92 C5  .....u.1.;.#"...
#     0020: 69 50 CE 0D AE BB 7B E8   A2 A4 97 4C A9 DB CF 1F  iP.........L....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.086 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:33.087 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:33.087 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:33.088 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:33.088 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 09:52:33.088 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:33.088 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.089 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.091 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 0A 92 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:52:05.000 UTC",
#       "not  after"         : "2024-01-09 09:52:05.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 C5 A6 DC C8 44 BD 26   98 93 74 0E 96 55 89 31  v....D.&..t..U.1
#           0010: 57 E0 B8 1B                                        W...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 63 15 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:51:59.000 UTC",
#       "not  after"         : "2024-01-09 09:51:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#           0010: DE EA 27 FF                                        ..'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.118 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 23 80 29 99 59 92 2A 66   7D E1 80 36 07 2E 27 7C  #.).Y.*f...6..'.
#     0010: 04 C3 CA CA 98 FD 6B 54   BE D1 02 80 7D A9 E7 2D  ......kT.......-
#     0020: 1C 6A 8B 37 8D B6 FA 46   35 EC C8 E7 48 59 CE 19  .j.7...F5...HY..
#     0030: 36 1A F5 94 54 10 C3 F4   08 65 32 E9 05 3B 47 AF  6...T....e2..;G.
#     0040: 09 2A 80 6D D1 7B 0A 6F   62 62 9F 71 E8 F6 35 69  .*.m...obb.q..5i
#     0050: 1F AE 3F 69 FB EE 6A 3F   C1 57 AF 8A F4 27 DC D1  ..?i..j?.W...'..
#     0060: B8 F7 10 7F 05 FC 24 46   24 F0 E4 AA 58 E9 5C 41  ......$F$...X.\A
#     0070: 84 65 BA 2B BD 0A 38 B0   B0 B0 B5 66 AD FE B1 95  .e.+..8....f....
#     0080: 92 42 8F 88 7E A3 93 B8   07 23 DC 43 60 90 7B 87  .B.......#.C`...
#     0090: 48 C0 FD FD 88 E1 6C 22   66 5D 05 C1 DB DE F4 60  H.....l"f].....`
#     00A0: 1B 26 B7 70 7C FF BE 96   AC 87 F5 6C 06 92 2C B5  .&.p.......l..,.
#     00B0: BA B6 17 18 CF 09 54 AB   9B 79 C2 0C CC E7 9C 2F  ......T..y...../
#     00C0: C1 9A 3B 62 D3 97 ED 85   E8 41 2E D9 17 A2 4B A8  ..;b.....A....K.
#     00D0: 27 60 5D 09 33 3B 81 A5   4F 90 13 EC BB 67 4A 2D  '`].3;..O....gJ-
#     00E0: FA 5A 9A 34 CC 64 44 23   D6 95 33 36 1A 27 E1 DA  .Z.4.dD#..36.'..
#     00F0: A2 D5 49 2B 24 38 49 11   59 4D 10 1B DF 35 B3 DA  ..I+$8I.YM...5..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.119 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 35 21 87 58 CE BE B4 20   3B 38 C7 5D 5E D6 26 E4  5!.X... ;8.]^.&.
#     0010: 0B 77 99 1D D0 38 91 D9   4A 4A 35 C8 63 ED BE F7  .w...8..JJ5.c...
#     0020: C7 8F 5E 5D 75 53 09 20   ED 6B 92 54 8B 78 5A 0C  ..^]uS. .k.T.xZ.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.119 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:33.174 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A8 F0 CF F2 C8 24 34 31 9C 25 52 EA C6 6F 1A 03 A4 33 D0 42 85 1F 02 0B 14 D1 A0 BE BA 81 4C 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 09:52:33.462 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 09:52:33.463 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 09:52:44.180; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:44.511 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 63 15 D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:51:59.000 UTC",
#       "not  after"         : "2024-01-09 09:51:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#           0010: DE EA 27 FF                                        ..'.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 4D 20 46 80 72 F9 16   F8 76 9F C8 06 C2 F5 A3  WM F.r...v......
#           0010: 10 87 E6 F8                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 1F 23 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 09:51:57.000 UTC",
#       "not  after"         : "2024-01-09 09:51:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 99 EC 7D C2 EF 41 C5   68 B9 FC C5 8A DC 6B 6C  ......A.h.....kl
#           0010: DE EA 27 FF                                        ..'.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 09:52:44.526 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:44.749 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:44.751 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 09:52:44.751 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.756 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.768 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 09:52:44.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A9 52 90 C4 28 21 54 A2 2E E0 39 10 92 44 35 51 25 48 08 65 0D A3 56 05 7D 8D 49 25 A7 0C 66 43",
#     "session id"          : "5F DB EC 1B 21 21 40 A4 AC DD 0F 09 74 0A 93 41 DB CC FC E6 5E CD A6 BE B3 0E 9E E6 6E 01 7A 43",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E6 0E B3 CD 8D 6E C4 CB   36 51 A1 77 E2 A4 64 29  .....n..6Q.w..d)
#               0010: 28 1E C3 55 23 42 EA 5F   4F 3F AD 46 9B 4C 52 30  (..U#B._O?.F.LR0
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.789 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "66 38 6E 7C 0C 12 80 8E 7F D0 E6 EE E0 89 35 6D DB 4C CB 17 50 96 6B B2 8B 4E 7B 03 9A 48 91 21",
#     "session id"          : "5F DB EC 1B 21 21 40 A4 AC DD 0F 09 74 0A 93 41 DB CC FC E6 5E CD A6 BE B3 0E 9E E6 6E 01 7A 43",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 DC 6B C6 88 B3 31 63   A8 1A C5 AF 1D A4 23 81  b.k...1c......#.
#             0010: F7 02 FE FC 49 E7 C1 35   AE AE 6F 6F 35 FF 71 31  ....I..5..oo5.q1
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.789 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.789 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.791 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.792 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.794 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.794 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:44.795 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:44.796 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.803 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.804 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.805 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.809 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.809 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.809 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.809 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.810 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:44.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:52:44.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 09:52:44.811 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsa

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 09:54:04.850 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:54:04.897 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:54:04.897 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:54:04.898 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 09:54:04.898 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43496/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28051ms
ok 65 stop command for single port in 31342ms
ok 66 status detects locally running solr in 14391ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2165ms
ok 69 copying files around in 6585ms
ok 70 upconfig in 2608ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1215ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 31s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m0s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5641 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5641/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39337/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 06:50:44.883; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 06:50:44.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 06:50:45.799; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 06:50:45.840; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23162ms
ok 61 start solr with client truststore and security manager in 25297ms
not ok 62 start solr with mTLS needed in 58964ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-3ZyBlN/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39337.
#
# Started Solr server on port 39337 (pid=198541). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39338.
#
# Started Solr server on port 39338 (pid=198995). Happy searching!
#
# INFO  - 2023-10-11 06:52:09.292; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 06:52:09.299; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 06:52:09.692; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 06:52:09.695; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 06:52:09.696; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:09.729 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 9F 9E 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:45.000 UTC",
#     "not  after"         : "2024-01-09 06:51:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 12 42 42 AF 7B 02 64   FB 03 AD E4 17 88 9D 96  2.BB...d........
#         0010: 91 63 24 BA                                        .c$.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:09.734 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 99 06 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:37.000 UTC",
#     "not  after"         : "2024-01-09 06:51:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:09.749 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:10.069 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:10.069 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:10.070 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:10.070 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:10.223 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:10.226 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:10.226 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.232 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.245 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.246 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.246 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:10.249 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "70 5B 63 85 68 8E E9 2C 5E 41 BB C9 D5 18 4B 8E 89 6B A7 70 28 B2 8B 81 C0 35 7B 2B F7 58 AD F1",
#   "session id"          : "91 94 AF A6 FB 5E D8 AB 7E D2 F4 D4 13 BE 0A 2E 4D 5D EC 51 10 2F 48 F9 DA A7 00 FD 49 F5 3F 15",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 01 36 9B DF 91 92 D8 2D   98 B5 55 9A 6A B6 37 90  .6.....-..U.j.7.
#             0010: F7 6A B9 1E 56 D1 72 EC   54 96 EE 38 02 B1 D7 4F  .j..V.r.T..8...O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.363 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 E1 EC F2 07 97 46 72 28 AE 87 90 9E 1D 17 37 A9 52 A7 C3 3F 79 F6 FD F3 FC EF 5E 24 68 36 5B",
#   "session id"          : "91 94 AF A6 FB 5E D8 AB 7E D2 F4 D4 13 BE 0A 2E 4D 5D EC 51 10 2F 48 F9 DA A7 00 FD 49 F5 3F 15",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 DA 01 A8 91 36 FB 56   BD F0 F3 36 B6 B8 F7 46  .....6.V...6...F
#           0010: EA 7C 87 D4 92 43 DD 49   1A F4 F3 BC AF B2 10 2B  .....C.I.......+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.364 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.364 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.366 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.369 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.369 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.369 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.371 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.378 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.380 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.381 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.385 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.385 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.385 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.386 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.388 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.389 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.389 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.389 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.391 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.391 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.394 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 24 F3 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:41.000 UTC",
#       "not  after"         : "2024-01-09 06:51:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 DA FF F3 E6 3C D0 D6   C8 CC 24 44 3F 72 03 B1  .....<....$D?r..
#           0010: 3A 62 95 61                                        :b.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.394 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.478 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.482 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E CF A9 CD 2B 0D C0 70   08 A6 8B D9 60 17 FF B8  ....+..p....`...
#     0010: 93 B3 57 6F E1 AE D1 A4   15 D8 7C 6F 04 BA 27 34  ..Wo.......o..'4
#     0020: 36 82 89 29 98 B0 F9 F0   97 3C 5B 7A 7D 83 CC 27  6..).....<[z...'
#     0030: EA 17 5A 1A 67 5F 34 07   77 60 CD CA FE 78 54 97  ..Z.g_4.w`...xT.
#     0040: B6 25 EB 6D F0 6B EF 0F   61 33 8E D4 BC B6 86 A4  .%.m.k..a3......
#     0050: 64 75 EB 5D A5 7C F0 B5   A3 79 DD 29 22 4C F7 C0  du.].....y.)"L..
#     0060: 1E 95 36 10 49 05 7E 10   E1 7C 8C CD 53 7E 86 01  ..6.I.......S...
#     0070: 4B 08 44 C9 72 31 A6 31   8C 48 B4 3E C6 A2 16 FF  K.D.r1.1.H.>....
#     0080: 75 C0 D3 98 04 42 71 94   CB 52 E4 71 FF F5 48 E5  u....Bq..R.q..H.
#     0090: ED 3B E3 04 48 8A 9B 0E   56 CD 51 38 CC 0F 39 E3  .;..H...V.Q8..9.
#     00A0: 36 57 05 3B 92 73 32 72   F0 D6 E8 16 B5 BB F9 C6  6W.;.s2r........
#     00B0: CA 1A 05 28 7F 81 B5 02   16 E8 7D 6E 17 3C DE 28  ...(.......n.<.(
#     00C0: D8 4E 63 6F F6 08 79 B1   4F DD FA 30 40 23 8C AF  .Nco..y.O..0@#..
#     00D0: B1 79 D0 78 84 B2 6A 6F   4E E7 4D 09 9A C0 A9 52  .y.x..joN.M....R
#     00E0: E5 B4 7F 68 92 CF D2 4E   48 77 73 B8 96 42 26 14  ...h...NHws..B&.
#     00F0: F7 03 F0 99 8F 07 8B D9   7D 36 BC 1E 02 92 10 73  .........6.....s
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.483 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AE 27 4C C6 BB AA FD E4   E7 8A 18 3D D1 3D FF AA  .'L........=.=..
#     0010: E2 58 38 CC A1 75 F5 A3   83 A2 BC D4 38 AB 0E 00  .X8..u......8...
#     0020: 5B DB BE 95 BE 36 43 D5   B4 C3 2C 63 9D CD F3 33  [....6C...,c...3
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.486 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:10.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.487 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:10.487 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.487 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:10.488 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:10.488 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.488 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.492 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 9F 9E 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:45.000 UTC",
#       "not  after"         : "2024-01-09 06:51:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 32 12 42 42 AF 7B 02 64   FB 03 AD E4 17 88 9D 96  2.BB...d........
#           0010: 91 63 24 BA                                        .c$.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 4F 10 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:39.000 UTC",
#       "not  after"         : "2024-01-09 06:51:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#           0010: D4 23 97 C2                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.518 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D 9D 6F CF 32 18 C8 3B   5D D0 D1 1F 13 2C 71 91  M.o.2..;]....,q.
#     0010: B2 70 56 4C A3 A9 BF 4A   05 58 23 48 7E A6 63 64  .pVL...J.X#H..cd
#     0020: E5 4B 0D 63 60 1F BA 87   68 C0 B0 20 9D CC 9B 09  .K.c`...h.. ....
#     0030: 27 E6 AA 72 FB 32 28 E6   A9 30 F3 54 7B C6 F9 E5  '..r.2(..0.T....
#     0040: F4 F4 FA A1 85 B1 70 8D   B0 5A D9 4D 01 E8 2B D8  ......p..Z.M..+.
#     0050: DD 48 00 CE B1 63 1A 83   19 01 4F B6 86 E8 3C 65  .H...c....O...<e
#     0060: A6 3B EE 5D 27 54 05 26   44 FA B1 07 41 07 94 A7  .;.]'T.&D...A...
#     0070: E1 73 48 E2 B6 F5 83 F5   6F F3 E5 E8 53 A0 05 29  .sH.....o...S..)
#     0080: 41 2B 94 13 6D 8D D5 C8   FF F8 E2 A3 92 38 99 96  A+..m........8..
#     0090: D1 B3 42 73 EF DE 0F 89   5D E9 CC 29 06 D6 07 B0  ..Bs....]..)....
#     00A0: D2 06 F4 13 07 8F A2 6D   A7 E9 66 79 20 6D DC 7A  .......m..fy m.z
#     00B0: 81 6A E6 04 F6 40 C9 57   0B 38 74 75 F7 8E C3 80  .j...@.W.8tu....
#     00C0: 92 E2 67 E6 50 94 CB 34   31 8E 45 42 C8 0D F5 D1  ..g.P..41.EB....
#     00D0: F3 49 46 44 11 99 A6 93   C1 39 63 0A 5F 8E 68 07  .IFD.....9c._.h.
#     00E0: 16 64 35 BA BF 9B 9C EA   E8 E3 8B 8F CB 8A E9 9F  .d5.............
#     00F0: 0D B5 1C D5 29 3A 62 7C   65 41 33 ED 2C D2 76 02  ....):b.eA3.,.v.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.521 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1A 05 05 FB 6E F0 61 0E   EE BB E5 03 9C B5 F2 7C  ....n.a.........
#     0010: 39 26 55 DC 6E A4 14 4B   B5 32 64 3A 66 F3 3E 0E  9&U.n..K.2d:f.>.
#     0020: 4B 68 0E BF 1A 88 46 B6   78 4C B9 FE EA 4E 50 C5  Kh....F.xL...NP.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.522 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:10.584 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D7 FD 56 BB 20 93 5B 44 31 AC A8 43 4C 4E 5A 2B AF E6 84 02 9F 9B 13 03 6A A3 92 BC 30 6E D3 2D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 06:52:10.879 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 06:52:10.880 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 06:52:11.809; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 06:52:11.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 06:52:12.198; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 06:52:12.200; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 06:52:12.201; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3ZyBlN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:12.233 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 9F 9E 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:45.000 UTC",
#     "not  after"         : "2024-01-09 06:51:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 32 12 42 42 AF 7B 02 64   FB 03 AD E4 17 88 9D 96  2.BB...d........
#         0010: 91 63 24 BA                                        .c$.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:12.237 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 99 06 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:37.000 UTC",
#     "not  after"         : "2024-01-09 06:51:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:12.252 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:12.326 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:12.327 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:12.327 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:52:12.328 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:12.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:12.484 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:12.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.490 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.502 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:12.504 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF D9 6F B1 21 5A B0 E6 1F A9 B2 C3 1F 2B 1B A6 0B E8 60 E1 F5 05 03 5C C5 79 86 E4 04 BA B5 B1",
#   "session id"          : "AF FF 0B 27 1A B1 04 CF E4 DE 84 A6 B4 A7 39 07 12 EF 16 8E 23 71 85 5E 58 C6 CA CA DA 06 AA 44",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C0 81 0D 46 34 AD BD 39   06 0E B2 D3 77 84 25 C7  ...F4..9....w.%.
#             0010: 3B 9D 24 FC EC 68 6B F2   19 89 88 B2 0B 28 1D 55  ;.$..hk......(.U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.607 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5D 3C 9F 15 B1 F3 B5 69 6F F5 4A 31 23 25 83 32 64 43 FB C3 21 48 96 03 75 BC 73 90 C4 E8 F6 B7",
#   "session id"          : "AF FF 0B 27 1A B1 04 CF E4 DE 84 A6 B4 A7 39 07 12 EF 16 8E 23 71 85 5E 58 C6 CA CA DA 06 AA 44",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB 8B B4 92 F9 4B CC 90   01 9A 1A A0 67 0F 81 B3  .....K......g...
#           0010: 7A A2 96 AB E5 F0 9F 84   FC 09 A4 0F 0C 38 2F 75  z............8/u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.607 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.608 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.609 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.610 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.613 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.613 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.613 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.623 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.625 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.626 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.629 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.630 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.630 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.630 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.630 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.633 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.633 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.633 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.633 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.634 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.635 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.638 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 24 F3 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:41.000 UTC",
#       "not  after"         : "2024-01-09 06:51:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 DA FF F3 E6 3C D0 D6   C8 CC 24 44 3F 72 03 B1  .....<....$D?r..
#           0010: 3A 62 95 61                                        :b.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.639 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.724 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 4F 10 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 06:51:39.000 UTC",
#     "not  after"         : "2024-01-09 06:51:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#         0010: D4 23 97 C2                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#         0010: 49 9E 63 87                                        I.c.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.728 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 E0 25 CB 7E DE 2F FC   94 92 06 E9 22 05 0C EB  ..%.../....."...
#     0010: 30 79 80 1F 01 15 11 9B   ED 5A 32 89 8F B6 B0 CF  0y.......Z2.....
#     0020: E0 DE 73 3C FF 16 20 C1   B3 1F F5 65 0B 36 02 D8  ..s<.. ....e.6..
#     0030: E9 8F F8 4C F9 82 47 A8   A4 61 89 5B 26 0A A0 71  ...L..G..a.[&..q
#     0040: 44 3C A9 83 12 45 BC 9E   87 DF 26 58 15 13 81 E4  D<...E....&X....
#     0050: F1 D3 CC 01 4D 25 60 19   60 93 33 99 49 60 C9 43  ....M%`.`.3.I`.C
#     0060: 3B 10 E1 1A E9 E7 51 A6   BA A3 59 F5 3D 26 3C 15  ;.....Q...Y.=&<.
#     0070: B5 68 D2 CA 78 D9 3D 8A   58 E4 32 73 21 61 A9 5E  .h..x.=.X.2s!a.^
#     0080: 2A 5D 20 B4 18 4B 30 2E   1D DE D9 ED 98 92 10 34  *] ..K0........4
#     0090: 4C FC 57 F0 02 B2 CE 60   B9 99 26 EC 81 A2 F9 0C  L.W....`..&.....
#     00A0: 36 5C 27 28 CD C4 23 FE   3D CA B1 9D BF F5 68 A5  6\'(..#.=.....h.
#     00B0: 5C AE 97 AF CD B6 01 9E   E4 32 B4 A9 F9 CB EF 02  \........2......
#     00C0: 77 F7 AF 7A 80 F7 B3 97   CA 5E DD CF F6 D1 02 A2  w..z.....^......
#     00D0: EE E5 9E 6C 7B 20 4A FB   7E 3F 76 D9 7D F3 9A 66  ...l. J..?v....f
#     00E0: D4 D0 40 12 B4 EC E8 6F   C0 A5 D0 CE 40 5D 73 0F  ..@....o....@]s.
#     00F0: 07 17 06 3B 3F 1F D4 96   91 DE B3 2F 34 81 24 22  ...;?....../4.$"
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.730 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 93 8B B5 29 8E BB A0 BB   3C C8 E7 D4 6F 25 B3 F0  ...)....<...o%..
#     0010: 12 10 56 2F 8D E1 A6 22   D4 E7 1C 16 6E D3 DA BF  ..V/..."....n...
#     0020: E3 B4 AC 43 65 43 21 42   55 74 35 54 B9 0F 2D 60  ...CeC!BUt5T..-`
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.733 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:12.734 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.734 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:12.734 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.734 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 06:52:12.735 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:12.735 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.736 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.738 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 9F 9E 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:45.000 UTC",
#       "not  after"         : "2024-01-09 06:51:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 32 12 42 42 AF 7B 02 64   FB 03 AD E4 17 88 9D 96  2.BB...d........
#           0010: 91 63 24 BA                                        .c$.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 4F 10 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:39.000 UTC",
#       "not  after"         : "2024-01-09 06:51:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#           0010: D4 23 97 C2                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.765 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 1B 1A 66 40 C8 5F 75   EF EC 91 1B F8 E7 E5 55  ...f@._u.......U
#     0010: 39 AF 10 C1 22 FC 51 7A   12 27 48 7B 60 C7 5F CD  9...".Qz.'H.`._.
#     0020: E9 4B FD FD 96 FB 93 FC   67 9E 93 3E 32 46 A9 E6  .K......g..>2F..
#     0030: 45 BA 19 98 17 B0 13 EB   5A C0 FF 6D DD ED 6D 0C  E.......Z..m..m.
#     0040: D1 D2 71 3D 5E 80 D2 A6   C8 67 AE E5 08 00 96 CC  ..q=^....g......
#     0050: 85 C2 B8 CC DC 37 FE D6   06 0A 4E F1 B6 53 EA F8  .....7....N..S..
#     0060: 26 4D 54 1E 68 74 B4 3C   1F E4 C2 04 7B E5 C6 D8  &MT.ht.<........
#     0070: 04 2D B3 9F 0D 7D 37 3B   F4 20 0F D8 7E 10 17 70  .-....7;. .....p
#     0080: 3E BD 0B 7D 02 68 5D CA   57 65 71 57 CC AF F2 AE  >....h].WeqW....
#     0090: C3 D1 60 DC 89 FF FA 60   19 43 5B 0B C5 DC 7C E3  ..`....`.C[.....
#     00A0: C6 6D 76 09 C4 59 27 BD   C0 D1 5B 65 2F E4 14 30  .mv..Y'...[e/..0
#     00B0: C2 56 00 89 6B AB B2 A4   44 44 32 3D 7C F0 7E 88  .V..k...DD2=....
#     00C0: E6 0E 99 07 0C 53 56 2D   A9 04 F8 75 F1 42 87 88  .....SV-...u.B..
#     00D0: 5C 64 F1 86 A3 50 FF 5C   D4 8B 1C A5 68 B5 89 D9  \d...P.\....h...
#     00E0: 0E 7C A7 06 01 42 FD 04   2E 1C A9 38 4B B3 78 7C  .....B.....8K.x.
#     00F0: 97 49 36 91 9C 7F 0D E5   67 21 8E 2B D3 CD C4 31  .I6.....g!.+...1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.766 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 16 DC 75 AA E5 49 72 75   E3 72 82 D8 04 5D 8A 23  ..u..Iru.r...].#
#     0010: 24 8E B2 24 5A A3 20 D9   28 E3 F3 87 2D 60 62 ED  $..$Z. .(...-`b.
#     0020: A6 87 B6 CA BC 80 C6 E0   0B 21 03 76 7E C2 37 49  .........!.v..7I
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.767 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:12.824 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F6 B8 B1 7F F6 28 A8 5E 73 61 97 9C 34 BF 03 C6 95 79 7E ED A8 AB 51 98 5A 58 FC 23 BC 17 5B BF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 06:52:13.124 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 06:52:13.125 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 06:52:24.485; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:24.829 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 4F 10 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:39.000 UTC",
#       "not  after"         : "2024-01-09 06:51:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#           0010: D4 23 97 C2                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 2E 76 0A 68 E1 43 28   61 31 9B 4F 3E 43 C2 11  ..v.h.C(a1.O>C..
#           0010: 49 9E 63 87                                        I.c.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 99 06 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 06:51:37.000 UTC",
#       "not  after"         : "2024-01-09 06:51:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 77 49 2D C7 51 8B 9E   C9 C6 86 03 0A 1B 84 2D  .wI-.Q.........-
#           0010: D4 23 97 C2                                        .#..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 06:52:24.845 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:25.090 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:25.092 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 06:52:25.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.098 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.110 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 06:52:25.112 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5E E1 25 53 13 EA F3 64 2B CD 4F F3 82 19 A2 49 95 2A 16 B0 B2 00 C4 98 FE 59 41 75 E2 51 E9 75",
#     "session id"          : "33 9D D5 74 D1 DE 78 03 05 09 2C 1A 25 D9 0A 92 8D E4 18 9D 04 BD BA 41 88 5D 77 AA 27 F1 E4 C3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 26 80 62 FD D0 2A 1A 41   46 FE B6 14 63 36 CB B9  &.b..*.AF...c6..
#               0010: EA 2E 57 6B E4 0F A2 68   E2 E6 F0 C1 78 13 E2 53  ..Wk...h....x..S
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.133 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DE 2D 63 65 79 25 A7 84 3F C8 CE F1 62 E0 D5 BB AE 19 EE D1 B6 84 50 10 29 1C 08 E6 B6 FC F8 58",
#     "session id"          : "33 9D D5 74 D1 DE 78 03 05 09 2C 1A 25 D9 0A 92 8D E4 18 9D 04 BD BA 41 88 5D 77 AA 27 F1 E4 C3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: AB 76 B0 91 44 BA FA 39   8A 7F E6 D6 51 60 4E 1D  .v..D..9....Q`N.
#             0010: 2A A5 87 AB B7 21 F0 28   17 FC 71 1B 69 83 C7 22  *....!.(..q.i.."
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.133 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.134 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.135 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:25.139 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:25.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.147 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.149 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.150 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:25.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:52:25.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 06:52:25.156 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 06:53:45.151 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:53:45.201 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:53:45.205 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:53:45.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 06:53:45.205 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39338/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28537ms
ok 65 stop command for single port in 31146ms
ok 66 status detects locally running solr in 14457ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2170ms
ok 69 copying files around in 6620ms
ok 70 upconfig in 2709ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1217ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 45s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m14.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5640 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5640/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40001/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 03:37:06.896; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 03:37:06.901; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 03:37:07.801; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 03:37:07.842; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22353ms
ok 61 start solr with client truststore and security manager in 25259ms
not ok 62 start solr with mTLS needed in 56273ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5zPij3/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40001.
#
# Started Solr server on port 40001 (pid=199787). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40002.
#
# Started Solr server on port 40002 (pid=200235). Happy searching!
#
# INFO  - 2023-10-11 03:38:30.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 03:38:30.556; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 03:38:30.935; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 03:38:30.939; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 03:38:30.940; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:30.977 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 83 41 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:06.000 UTC",
#     "not  after"         : "2024-01-09 03:38:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 8D 10 D4 78 90 FC D7   30 C0 36 05 50 88 28 69  ....x...0.6.P.(i
#         0010: 23 8A 28 94                                        #.(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:30.981 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 25 69 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:37:58.000 UTC",
#     "not  after"         : "2024-01-09 03:37:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:30.998 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:31.086 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:31.086 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:31.086 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:31.086 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:31.257 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.257 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:31.259 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:31.259 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.266 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.278 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.278 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.279 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:31.281 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EF 9B BC ED 91 4D FF 73 D7 FB F1 06 1A 25 05 47 E8 B1 4F C8 12 19 88 FD 4F 62 49 86 FD FC 88 F3",
#   "session id"          : "4D 02 5B 8E CE 9C 35 AE 36 D8 78 10 3A 54 19 D4 C9 85 ED 5D B1 96 9A 44 A2 82 FE 17 99 E8 F1 16",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 16 4C 3E BB 33 5C 23   1B F9 F7 5A 3C D1 F0 3A  ..L>.3\#...Z<..:
#             0010: BB 27 ED 9B CF 2B 00 8F   99 8F 6D 46 2E B9 D8 75  .'...+....mF...u
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.388 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "49 DD BF B7 04 37 7C 03 7F A3 08 86 C6 D5 5A 36 62 3F 19 30 D4 F7 FB 54 45 D0 00 63 2B 13 BE 4D",
#   "session id"          : "4D 02 5B 8E CE 9C 35 AE 36 D8 78 10 3A 54 19 D4 C9 85 ED 5D B1 96 9A 44 A2 82 FE 17 99 E8 F1 16",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2B 6A B0 4D DE BE 39 33   CB 0B 3A 43 56 7D E2 CB  +j.M..93..:CV...
#           0010: A0 DD 2F C2 FF A8 CE 8F   64 6F BB 91 11 5F 57 5F  ../.....do..._W_
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.389 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.389 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.390 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.391 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.391 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.391 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.391 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.391 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.394 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.394 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.395 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.395 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.395 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.396 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.405 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.406 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.407 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.411 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.412 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.412 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.412 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.412 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.412 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.413 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.413 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.413 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.415 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.415 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.415 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.416 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.417 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.418 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.418 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.421 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A E1 A9 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:02.000 UTC",
#       "not  after"         : "2024-01-09 03:38:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 9C EE E0 CA 8D 94 3A   D5 D8 87 09 C2 3F 7F 12  w......:.....?..
#           0010: A4 8D BE 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.421 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.515 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.519 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 2B DE EA C2 EB 8F 6C   A0 CA 62 79 E8 07 73 54  @+.....l..by..sT
#     0010: CD C8 04 0B BB E0 E6 7C   4D F2 B6 46 59 96 B5 CC  ........M..FY...
#     0020: 3F 51 3D CB 5E 66 1E CC   EF BC 0E E1 78 36 31 BB  ?Q=.^f......x61.
#     0030: 35 05 34 F0 26 40 73 75   4C 2F 58 F6 78 3E 80 73  5.4.&@suL/X.x>.s
#     0040: F7 6B CF 2E 00 58 1B 72   1F 11 3E 7C FE 9F 04 CE  .k...X.r..>.....
#     0050: BF 1E 50 6E 8E 39 36 4D   E6 8E 22 98 9A F8 07 1E  ..Pn.96M..".....
#     0060: 96 54 68 48 D2 49 1D 86   D2 25 8B 1A 9E 6C AA B6  .ThH.I...%...l..
#     0070: 2D 0A D8 F9 E4 60 55 BC   9A 60 19 34 11 A2 EB D5  -....`U..`.4....
#     0080: DC 8B 9A 7B 0A 65 6A C2   BE B0 DC 9E F0 FD C2 50  .....ej........P
#     0090: AB C6 AB C0 1E 0F EB 12   84 A7 7F 38 1E 6B 46 C9  ...........8.kF.
#     00A0: 60 5C 89 97 6C 6B B2 D4   9F 59 37 41 77 E3 55 C8  `\..lk...Y7Aw.U.
#     00B0: F8 77 3B AA FE E6 06 A9   56 B3 7A 1A 5E C4 EF 27  .w;.....V.z.^..'
#     00C0: 87 2E 6E BC 29 1A A4 77   91 76 9D 86 31 96 AB 14  ..n.)..w.v..1...
#     00D0: 87 5E D7 76 7E B3 3F BD   D9 E9 1B 63 AA 63 BF BF  .^.v..?....c.c..
#     00E0: F8 CD 00 D0 4F 6F E2 5A   89 4A 06 B6 2D 09 F3 C5  ....Oo.Z.J..-...
#     00F0: 04 BD 78 C4 DE BB DB D1   2A DA 59 E0 4B 59 2C 88  ..x.....*.Y.KY,.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.521 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 71 DF 11 B9 CD 93 C8 94   9F F3 4C D9 C2 FF 6E 10  q.........L...n.
#     0010: 2C 00 DF E8 BD C4 99 CF   CE 8A 5D 9B 2A 7F 65 8F  ,.........].*.e.
#     0020: 41 FE 83 F4 8F 4E C7 8F   8A 86 F2 76 28 FA A9 E8  A....N.....v(...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.523 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:31.524 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.524 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:31.524 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.524 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:31.525 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:31.525 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.526 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.528 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 83 41 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:06.000 UTC",
#       "not  after"         : "2024-01-09 03:38:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 8D 10 D4 78 90 FC D7   30 C0 36 05 50 88 28 69  ....x...0.6.P.(i
#           0010: 23 8A 28 94                                        #.(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 71 5E 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:00.000 UTC",
#       "not  after"         : "2024-01-09 03:38:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#           0010: C4 44 D9 1E                                        .D..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.553 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 BD 3E 2D 4E 7A EA 29   A2 1A 4C 7F 51 E1 0B 6D  u.>-Nz.)..L.Q..m
#     0010: 08 0A CB 75 07 31 03 72   67 B5 9F 28 A4 46 87 C6  ...u.1.rg..(.F..
#     0020: 98 E7 3E E0 16 EC BE 3B   DD 5F D8 A2 38 23 6E 63  ..>....;._..8#nc
#     0030: A7 52 98 EB 76 B2 8D 3F   22 A2 AF 2E 2A 30 FA 12  .R..v..?"...*0..
#     0040: 93 95 92 8C 70 BF D8 4B   B9 F1 B5 48 5A A1 E4 ED  ....p..K...HZ...
#     0050: C9 C3 66 BC 22 FF F7 CD   13 5E D1 5B 09 57 B3 DB  ..f."....^.[.W..
#     0060: 69 31 35 B0 C5 96 AE 3E   56 0C 8C 2D F9 95 A2 F1  i15....>V..-....
#     0070: D8 94 E7 55 57 58 12 DD   88 E8 2E 86 7F 77 7F 7A  ...UWX.......w.z
#     0080: 66 29 04 37 27 3C 82 2B   48 B6 6C 7B E8 BE 57 AB  f).7'<.+H.l...W.
#     0090: 99 3A B3 8E 6C 0E C5 EC   99 86 40 29 E1 DC 78 02  .:..l.....@)..x.
#     00A0: 0D AC 31 3A 5D DF DE 6A   11 A2 EC 25 B9 0E 57 03  ..1:]..j...%..W.
#     00B0: 41 12 E6 AC F7 1B 62 CD   17 2D 82 00 14 64 01 C4  A.....b..-...d..
#     00C0: F8 48 6D 8E F0 1C 82 69   D6 16 D1 CF 92 C4 E8 5B  .Hm....i.......[
#     00D0: 1E 8F B4 C4 E9 8D E9 85   84 88 92 AB CE 93 1E C7  ................
#     00E0: 4D E0 CA 4F 0C 1C 7B 0E   64 A0 DC BF 32 FD C6 0B  M..O....d...2...
#     00F0: AF F1 88 70 B3 3C E3 94   0C B6 D2 E1 CD 4E 67 7B  ...p.<.......Ng.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.554 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 67 9D F2 E9 72 64 3C 6D   44 5B 10 18 28 04 8F 8F  g...rd<mD[..(...
#     0010: 15 80 12 DA F5 71 DC 15   0B BF D8 EF C7 B1 D9 2C  .....q.........,
#     0020: 60 71 9A C3 72 AE 95 8A   09 06 B6 C3 DF 01 AD 41  `q..r..........A
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.555 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:31.616 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "15 30 20 90 FC 87 8A 63 01 45 DC 4B FC 0C 4E 6D 59 F9 AB 3E E3 E9 15 4D FA EA AA 30 2F 47 0A CC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 03:38:31.913 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 03:38:31.914 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 03:38:32.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 03:38:32.835; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 03:38:33.210; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 03:38:33.213; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 03:38:33.213; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5zPij3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:33.245 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 83 41 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:06.000 UTC",
#     "not  after"         : "2024-01-09 03:38:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 8D 10 D4 78 90 FC D7   30 C0 36 05 50 88 28 69  ....x...0.6.P.(i
#         0010: 23 8A 28 94                                        #.(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:33.249 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 25 69 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:37:58.000 UTC",
#     "not  after"         : "2024-01-09 03:37:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:33.263 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:33.350 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:33.351 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:33.351 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:33.352 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:33.487 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:33.489 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:33.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.495 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.508 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.508 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:33.510 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "04 9C B8 C1 2F B0 05 E1 5C 0B C7 C6 97 3F 8B D2 E3 A7 F1 A8 51 EF 49 FB 04 E8 08 DE A8 4C E5 6B",
#   "session id"          : "1D A4 C1 E0 66 19 E8 EA FE 34 E9 E1 32 D7 3E B2 32 30 89 60 74 39 4D BE 99 E9 14 71 40 2B DF 2C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8C F1 BE 28 DF 15 84 CB   57 5C 89 4A 2E F6 04 58  ...(....W\.J...X
#             0010: B7 B8 4D FA 1C D0 71 18   FB 9C A4 E5 DE 4F 3E 1E  ..M...q......O>.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.614 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6C 96 5D BD C8 D2 30 51 BF E2 7E EB 3E 45 ED 3B CA 24 39 05 44 F1 DE 52 D9 16 7F 5F 23 18 74 42",
#   "session id"          : "1D A4 C1 E0 66 19 E8 EA FE 34 E9 E1 32 D7 3E B2 32 30 89 60 74 39 4D BE 99 E9 14 71 40 2B DF 2C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 37 80 69 7B 07 21 BC 24   AF B7 B5 95 19 58 A3 93  7.i..!.$.....X..
#           0010: 18 43 F5 48 41 31 37 C2   B0 A2 6F 31 96 0A 37 37  .C.HA17...o1..77
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.615 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.615 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.618 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.620 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.621 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.622 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.622 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.629 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.630 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.631 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.635 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.635 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.636 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.638 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.638 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.639 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.639 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.640 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.640 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.644 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A E1 A9 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:02.000 UTC",
#       "not  after"         : "2024-01-09 03:38:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 9C EE E0 CA 8D 94 3A   D5 D8 87 09 C2 3F 7F 12  w......:.....?..
#           0010: A4 8D BE 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.644 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.725 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 71 5E 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 03:38:00.000 UTC",
#     "not  after"         : "2024-01-09 03:38:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#         0010: C4 44 D9 1E                                        .D..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#         0010: 9C DE E4 92                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.728 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 2E 1E 81 F4 5D 73 30   11 D8 6E 6E 59 C7 B1 11  .....]s0..nnY...
#     0010: 6F E5 B8 B3 9E A1 59 34   1E F6 9B 96 E3 B7 E1 88  o.....Y4........
#     0020: 09 80 1E EF 1D BB 49 24   28 6E CD 05 A3 BE 8C 36  ......I$(n.....6
#     0030: 5A FC 03 A1 68 24 4D A1   7A 87 FA 6C 33 8C A6 55  Z...h$M.z..l3..U
#     0040: 72 A9 36 BC 04 8A 87 E3   8E 95 C7 01 8B F6 CF 70  r.6............p
#     0050: E7 C5 9C 4E DD CE 0E 80   EC AA 63 DF CF E5 9F 49  ...N......c....I
#     0060: CC F3 28 E7 29 ED E7 47   96 A3 C9 1F 6F 0E 50 3E  ..(.)..G....o.P>
#     0070: F8 C6 21 F2 36 CA EC BB   38 53 37 A3 5F BA C6 65  ..!.6...8S7._..e
#     0080: BA A9 D4 F8 A8 2E 47 34   58 74 03 3B 69 68 7F E9  ......G4Xt.;ih..
#     0090: 46 85 5D 14 00 36 33 D3   C6 9D 1A 44 30 7E CF A5  F.]..63....D0...
#     00A0: 3D CA E8 3D F4 B4 25 83   A4 7E CC 14 91 A5 C3 7D  =..=..%.........
#     00B0: 04 62 4A ED 24 0C CF 77   C0 B0 9D 5A 55 CD 1B 20  .bJ.$..w...ZU..
#     00C0: 02 55 06 28 2E 6B 29 D8   2B 79 C0 36 BB 20 2B 18  .U.(.k).+y.6. +.
#     00D0: 42 7E AD 6E A5 CE C4 02   60 D5 62 D6 0F 0B 94 DE  B..n....`.b.....
#     00E0: 0C B6 98 35 47 CB AD AC   11 AF 91 AB 4D 0B 06 8D  ...5G.......M...
#     00F0: 84 11 DE E7 14 C0 27 B5   EA 7C EA 66 8D D0 74 1D  ......'....f..t.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.730 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 80 85 7E EF 38 D2 AA FD   7B C9 5C 4F 17 22 32 41  ....8.....\O."2A
#     0010: 68 57 DF DA 13 2B 26 4D   96 7B 2F 10 F2 FE B4 3A  hW...+&M../....:
#     0020: 96 21 07 00 68 14 B4 24   0C 0F 15 A0 29 51 BF DF  .!..h..$....)Q..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.732 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:33.733 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.734 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:33.734 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.734 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 03:38:33.734 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:33.735 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.735 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.737 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 83 41 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:06.000 UTC",
#       "not  after"         : "2024-01-09 03:38:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 8D 10 D4 78 90 FC D7   30 C0 36 05 50 88 28 69  ....x...0.6.P.(i
#           0010: 23 8A 28 94                                        #.(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 71 5E 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:00.000 UTC",
#       "not  after"         : "2024-01-09 03:38:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#           0010: C4 44 D9 1E                                        .D..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.764 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 E7 7C C3 5D 21 95 C9   0B 2F 78 4C 96 DD 3B A8  ....]!.../xL..;.
#     0010: 1D 66 C1 A6 F8 C2 E9 63   A8 93 26 BC 95 0D 70 CC  .f.....c..&...p.
#     0020: 52 E9 E7 9C 7C 31 F8 E0   B6 4E 5F 76 81 3E E0 FA  R....1...N_v.>..
#     0030: 9D AA AD 3D B4 4A A0 85   66 1D EC 90 B9 71 EE 06  ...=.J..f....q..
#     0040: EC E9 B4 BC 2B AD B3 CA   5C 85 1F 8A 98 9F 78 92  ....+...\.....x.
#     0050: 89 70 65 65 50 4E 61 CC   F7 5B AE 95 05 B1 B0 E5  .peePNa..[......
#     0060: 4A BB DD 37 47 79 11 45   B3 04 C9 84 E9 5A 79 9F  J..7Gy.E.....Zy.
#     0070: 74 64 EC 03 BE 5B AD 3F   0D D0 B4 8F 31 44 01 DC  td...[.?....1D..
#     0080: 45 A8 A6 00 7B DF 2C 4C   81 D7 5B 16 D9 75 08 DB  E.....,L..[..u..
#     0090: E8 79 21 02 FE EA BB E1   09 2E 04 8E 2D F3 5B BC  .y!.........-.[.
#     00A0: 15 4B DB 21 37 46 9B 5F   27 1F CE 7E DC C4 97 AB  .K.!7F._'.......
#     00B0: DF 43 76 9D 07 FC BE E3   E6 07 16 1A D9 96 CA 7E  .Cv.............
#     00C0: D9 21 D5 D9 54 D7 5B 86   EE F8 D3 04 77 7F 79 70  .!..T.[.....w.yp
#     00D0: E7 1C E0 E9 3C 1B 4A 4E   F4 3B 8B 13 1D F2 01 F6  ....<.JN.;......
#     00E0: B7 5E 8C 62 2E 18 0F CB   6C 13 7C 57 A6 79 3B B1  .^.b....l..W.y;.
#     00F0: 34 BC DC 93 95 4C A9 A3   22 23 55 A5 D3 B6 36 15  4....L.."#U...6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.765 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 D9 44 9E 18 F0 E0 F5   99 DF 8F 7B 12 C9 26 C4  ..D...........&.
#     0010: 1C 8C 2F 19 DA A9 64 CA   E0 04 43 D4 B0 3F 03 FD  ../...d...C..?..
#     0020: 84 28 8F 22 55 9F 38 EB   68 E9 2A CD AE A7 64 AD  .(."U.8.h.*...d.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.766 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:33.822 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "52 08 0C F9 C2 CF 68 83 D7 58 B0 DC 45 72 1D 09 D5 38 AF 21 47 77 99 A6 FA A9 7F 34 08 4C 54 C5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 03:38:34.091 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 03:38:34.092 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 03:38:44.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:45.008 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 71 5E 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:38:00.000 UTC",
#       "not  after"         : "2024-01-09 03:38:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#           0010: C4 44 D9 1E                                        .D..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 41 81 2C 5B A9 D4 0C   67 54 D6 E3 69 1B 06 7D  .A.,[...gT..i...
#           0010: 9C DE E4 92                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 25 69 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 03:37:58.000 UTC",
#       "not  after"         : "2024-01-09 03:37:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E 35 85 8D 26 72 12 93   6E 96 F3 8B D0 15 81 98  .5..&r..n.......
#           0010: C4 44 D9 1E                                        .D..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 03:38:45.024 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:45.127 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:45.128 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:45.129 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:38:45.129 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:45.261 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.262 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:45.263 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 03:38:45.264 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.268 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.280 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.280 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.280 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 03:38:45.282 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F 0D E7 2E 9F 60 2B 25 63 CB 2C C6 17 EA AC A7 CA 35 62 6C 49 F8 DB 0D 2F 93 F8 BE 72 9A BD 87",
#     "session id"          : "F9 9B 5F D7 AD 2A 7E F9 A5 C2 77 CA AE 77 B6 AB 27 C4 25 82 8F 9C 83 E5 E5 43 B3 DB DF 6C 94 B1",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 54 37 E5 66 BA 93 F8 38   69 E0 A6 7A F6 20 86 BA  T7.f...8i..z. ..
#               0010: 0E ED 92 08 3D 9D 20 C7   ED 90 DC 9E C0 A6 D8 0A  ....=. .........
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.301 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "42 90 02 9A E2 E3 4C 80 20 7F 34 75 42 01 9A 6C 0B 34 0D 2D 1A F1 D1 15 C8 03 2F DB 4D 24 5F 12",
#     "session id"          : "F9 9B 5F D7 AD 2A 7E F9 A5 C2 77 CA AE 77 B6 AB 27 C4 25 82 8F 9C 83 E5 E5 43 B3 DB DF 6C 94 B1",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F 64 AE FA 42 2B 65 F8   C5 27 9A 17 BC 8D A5 E2  .d..B+e..'......
#             0010: A0 5D 81 F1 98 53 E8 D4   76 13 E0 EF C4 78 D7 6B  .]...S..v....x.k
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.301 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.301 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.302 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.302 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.302 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.303 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.303 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.303 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.303 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.303 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.306 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.307 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.314 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.316 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.317 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:45.321 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:38:45.322 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 03:38:45.323 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 03:40:04.954 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:40:04.992 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:40:04.992 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:40:04.992 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 03:40:04.992 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40002/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28110ms
ok 65 stop command for single port in 31393ms
ok 66 status detects locally running solr in 14640ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2157ms
ok 69 copying files around in 6536ms
ok 70 upconfig in 2642ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1220ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 9s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5639 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5639/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34615/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-11 00:22:24.663; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 00:22:24.668; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-11 00:22:25.610; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 00:22:25.651; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22933ms
ok 61 start solr with client truststore and security manager in 25601ms
not ok 62 start solr with mTLS needed in 56912ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-LjV5BD/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34615.
#
# Started Solr server on port 34615 (pid=198970). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2408: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34616.
#
# Started Solr server on port 34616 (pid=199422). Happy searching!
#
# INFO  - 2023-10-11 00:23:49.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 00:23:49.429; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 00:23:49.807; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 00:23:49.809; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 00:23:49.810; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:49.842 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 80 18 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:25.000 UTC",
#     "not  after"         : "2024-01-09 24:23:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 18 D2 B0 A4 69 10 18   2F E4 B2 6E 5A 54 EC 12  a....i../..nZT..
#         0010: BA 23 0D 8A                                        .#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:49.846 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 31 BD 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:17.000 UTC",
#     "not  after"         : "2024-01-09 24:23:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:49.861 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:50.082 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:50.085 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:50.086 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.093 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.105 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.105 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:50.108 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 9B 32 FE 8E 53 66 A8 D4 78 10 75 4B 21 3C A5 42 A5 E7 2B 6B D2 F5 EC C4 C3 4F EA AA C4 8B 80",
#   "session id"          : "5F 75 B3 18 F8 03 00 86 4A B9 DE 4F F0 0E 53 F7 46 B1 A1 13 62 82 51 6D FE CE A5 49 8F 46 4B D9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E D1 B3 80 23 B8 DA F6   79 EA F2 73 46 4A 4A C0  ^...#...y..sFJJ.
#             0010: 44 4E 93 F3 29 29 91 2F   A2 AA 25 3E 4B 60 91 6D  DN..))./..%>K`.m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.221 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BC A2 E0 DC BB C2 27 DC 99 1A 6C 8F 7C ED 89 BD FB DA 54 0F 9E 54 45 AD 28 01 83 A6 AC AB 6C DA",
#   "session id"          : "5F 75 B3 18 F8 03 00 86 4A B9 DE 4F F0 0E 53 F7 46 B1 A1 13 62 82 51 6D FE CE A5 49 8F 46 4B D9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3D 51 18 85 B6 6D B5 37   AA 2E 18 75 63 5A C3 32  =Q...m.7...ucZ.2
#           0010: D6 32 3F E0 2A 7E AD 30   39 95 D3 0B DE 1A C5 3F  .2?.*..09......?
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.221 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.221 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.223 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.223 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.223 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.223 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.224 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.226 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.226 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.236 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.237 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.238 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.242 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.242 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.243 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.244 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.245 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.245 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.246 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.246 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.247 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.247 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.248 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.250 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 AA 25 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:21.000 UTC",
#       "not  after"         : "2024-01-09 24:23:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B1 BC E2 02 C3 54 2C   6B 10 8A 00 9F 1F 34 AB  @.....T,k.....4.
#           0010: BE 4F BE 4D                                        .O.M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.251 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:50.309 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:50.310 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:50.310 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:50.310 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.343 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.346 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 CF 02 E2 1A 3B 6C 9A   FA 5D EE 48 1E 4C 0B FF  Q....;l..].H.L..
#     0010: D0 2B 88 46 BD A5 6E 48   A2 6F 5D B4 29 7F CF 75  .+.F..nH.o].)..u
#     0020: 0C 63 CB 9F CF 24 A0 46   0C FF D1 6E E4 FB 9F 47  .c...$.F...n...G
#     0030: 60 E0 2C 84 72 B8 7B 40   9D A2 A5 61 5A F4 5F 6E  `.,.r..@...aZ._n
#     0040: 8F 58 F1 2B 68 31 B5 0C   BB 69 1D BF 87 6C A3 86  .X.+h1...i...l..
#     0050: 76 5F 80 93 00 04 46 38   FF 23 E1 5F DC E3 C2 95  v_....F8.#._....
#     0060: 91 FD 1D 01 83 91 E2 C9   EA 04 DC 67 BA 08 D9 13  ...........g....
#     0070: 84 4E BE 7F 2C 3D 3B 4F   38 A5 AA 7C C6 07 7C 25  .N..,=;O8......%
#     0080: 6F 3A D4 D3 3A 2D 3B 0F   36 69 B7 63 C5 46 AC F3  o:..:-;.6i.c.F..
#     0090: 03 70 B3 4A A7 DD 18 DF   B3 CE F9 F2 F7 E5 FB 82  .p.J............
#     00A0: 42 90 DD A6 BB BE FC 76   56 64 7C A0 87 90 6E 5E  B......vVd....n^
#     00B0: 6A 7F 1F 0B 01 2D B5 48   94 34 24 D4 B3 7E F1 5E  j....-.H.4$....^
#     00C0: 1F B4 C1 BF 7E 0C 84 17   80 13 3B C3 C3 59 9A 09  ..........;..Y..
#     00D0: 11 18 6E CC 53 B3 CF 94   EB AE 6D 44 FD 97 7B 44  ..n.S.....mD...D
#     00E0: EC CC AB BD D2 CC E0 BB   A2 55 63 04 45 2D BB DA  .........Uc.E-..
#     00F0: 3A 4C 48 A6 8D 9E 9B A2   6D 19 32 35 A3 54 BC 36  :LH.....m.25.T.6
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.348 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FB BE CD A8 E2 F6 37 39   5F 46 28 E4 CB 01 87 A2  ......79_F(.....
#     0010: 14 29 E8 CE 6C 42 B9 2A   BD 50 25 C5 4D 0E 33 DB  .)..lB.*.P%.M.3.
#     0020: EB 07 90 BD 59 4E 34 79   21 B0 5A 3C E6 18 D1 10  ....YN4y!.Z<....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.350 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:50.351 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:50.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:50.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:50.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.353 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.356 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C 80 18 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:25.000 UTC",
#       "not  after"         : "2024-01-09 24:23:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 18 D2 B0 A4 69 10 18   2F E4 B2 6E 5A 54 EC 12  a....i../..nZT..
#           0010: BA 23 0D 8A                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 3B F1 E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:19.000 UTC",
#       "not  after"         : "2024-01-09 24:23:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#           0010: 3A 69 FE 57                                        :i.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.382 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 FD 6C 22 58 82 01 C8   80 33 D5 F5 35 91 6E 7A  ..l"X....3..5.nz
#     0010: C1 82 6B 03 41 A5 6C DC   2C 40 AF 66 62 92 FA 0C  ..k.A.l.,@.fb...
#     0020: 20 0F 27 7A 0A 53 3E 11   C1 6C 78 4A CC 24 8C 71   .'z.S>..lxJ.$.q
#     0030: 6F BE 93 2D 13 E6 17 C0   36 20 62 3A 46 F7 49 86  o..-....6 b:F.I.
#     0040: 87 CB 24 F0 AE 1D 91 67   CA 16 63 B8 02 32 47 B7  ..$....g..c..2G.
#     0050: F0 08 58 0B 19 82 57 B3   20 AA D9 1E 06 64 CB D8  ..X...W. ....d..
#     0060: CA 4A 69 B1 CC C8 B7 82   21 92 C2 A0 D1 0C 51 B1  .Ji.....!.....Q.
#     0070: 2A 4D 6E CC EE 4C 55 33   B9 38 50 EA 22 55 D6 3E  *Mn..LU3.8P."U.>
#     0080: E0 C4 37 85 2E A1 34 EE   FB 7A 40 94 8B EF 4A BA  ..7...4..z@...J.
#     0090: 35 1B BD 7E AF AF CD 1C   98 D4 6A 12 91 35 CD 5F  5.........j..5._
#     00A0: D9 69 AB 1A 5A 3F DF EA   A4 10 C8 7F F7 95 1F 43  .i..Z?.........C
#     00B0: D5 F1 50 30 DE A5 EE E5   BD 8A 7F 28 6D F9 AA 1F  ..P0.......(m...
#     00C0: F8 91 59 C4 A9 8D F2 2D   B4 A8 A8 F2 9B D5 4C DC  ..Y....-......L.
#     00D0: 4C 9A 50 28 70 46 1F 41   D7 FC E9 E7 57 7E 88 9A  L.P(pF.A....W...
#     00E0: 92 C0 67 3F 0A 24 22 00   75 B0 07 50 17 B7 FF 5F  ..g?.$".u..P..._
#     00F0: CF 7C 29 10 48 5C 9C 17   A5 37 25 05 8F FD 15 47  ..).H\...7%....G
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.383 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C9 08 7C 9D 2C C4 5C 35   FD F1 AA 89 08 DC 1F D1  ....,.\5........
#     0010: 31 92 39 E5 D1 CC 75 D3   BB DA 24 9C 47 C8 F7 9B  1.9...u...$.G...
#     0020: 83 3D 98 94 07 81 35 3F   4E 92 24 44 4F 3F 99 16  .=....5?N.$DO?..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.384 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:50.443 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A2 15 A6 8C 5A 4E 3D 65 8A CC FB 6F 3F 3B 48 88 83 32 56 6F D6 D7 02 30 3F 82 7A DF 6E 1D 07 75",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 24:23:50.754 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 24:23:50.755 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 00:23:51.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 00:23:51.703; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 00:23:52.073; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 00:23:52.076; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 00:23:52.077; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-LjV5BD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:52.109 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 80 18 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:25.000 UTC",
#     "not  after"         : "2024-01-09 24:23:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 18 D2 B0 A4 69 10 18   2F E4 B2 6E 5A 54 EC 12  a....i../..nZT..
#         0010: BA 23 0D 8A                                        .#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:52.114 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 31 BD 94",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:17.000 UTC",
#     "not  after"         : "2024-01-09 24:23:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 24:23:52.129 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:52.219 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:52.219 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:52.360 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.361 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:52.363 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:23:52.363 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.380 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.380 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.381 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:23:52.383 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CD 1A 37 4B F5 21 A9 30 CE AA DB 22 F7 DD D7 DE CD 56 52 B4 CB 85 AE 5C 90 27 AE 71 46 26 D4 D6",
#   "session id"          : "C7 31 D1 18 B3 B0 E9 43 5E 0C 63 23 A3 B6 44 C9 4C 16 DB 13 EA E5 3A 4F E5 B7 F5 DE 29 9E 41 55",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 19 37 06 E1 83 E3 30   F0 BC BA AB D1 30 89 11  ^.7....0.....0..
#             0010: E8 53 92 81 8F 11 7D FE   97 4E 01 47 BE 11 9F 0C  .S.......N.G....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.495 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "97 74 8C F6 1E 0E 4D E1 62 1B 79 BF 10 99 FF D9 DF ED 1E 32 4E 56 EE 9C 92 F6 1A 04 F8 68 80 E7",
#   "session id"          : "C7 31 D1 18 B3 B0 E9 43 5E 0C 63 23 A3 B6 44 C9 4C 16 DB 13 EA E5 3A 4F E5 B7 F5 DE 29 9E 41 55",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 29 20 FD E7 18 13 3F 65   6F 83 51 A8 D3 8B AB 04  ) ....?eo.Q.....
#           0010: 57 5E 7F 3A 4A 7F 9D 09   EB 07 6B F9 EA D9 94 0E  W^.:J.....k.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.495 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.496 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.498 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.500 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.500 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.510 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.511 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.512 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.516 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.519 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.519 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.519 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.520 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.520 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.521 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.521 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.524 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 AA 25 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:21.000 UTC",
#       "not  after"         : "2024-01-09 24:23:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 B1 BC E2 02 C3 54 2C   6B 10 8A 00 9F 1F 34 AB  @.....T,k.....4.
#           0010: BE 4F BE 4D                                        .O.M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:52.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:23:52.589 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.612 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 3B F1 E5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 24:23:19.000 UTC",
#     "not  after"         : "2024-01-09 24:23:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#         0010: 3A 69 FE 57                                        :i.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#         0010: 51 6D 96 8E                                        Qm..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.616 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D DE D0 5E 81 02 D1 28   9B EB 34 0B 37 E9 B1 B2  ...^...(..4.7...
#     0010: BF 6B 80 27 30 53 4C AE   AC 92 BA 8D 9F 55 9E 33  .k.'0SL......U.3
#     0020: 11 73 6F 67 C2 A3 20 7B   66 9E 19 6A 93 EA CE 7F  .sog.. .f..j....
#     0030: 04 86 82 D5 F4 D2 1E 5B   CC C2 82 19 6E 87 6A 1A  .......[....n.j.
#     0040: A7 DD F3 9E 50 F9 EE 5A   2C 64 B6 F7 23 F0 ED B2  ....P..Z,d..#...
#     0050: 37 05 41 4E 24 F2 13 89   B6 5A 38 D0 34 EB 02 9D  7.AN$....Z8.4...
#     0060: E4 C2 BB EA 78 53 67 D3   2C BD ED F1 7B 98 37 A0  ....xSg.,.....7.
#     0070: 58 C2 E4 34 EA 59 67 12   D2 7F 85 D7 77 3E A9 40  X..4.Yg.....w>.@
#     0080: 94 82 A4 1C B2 DF 5E DA   1C A6 36 50 92 A7 D1 A4  ......^...6P....
#     0090: 72 2C 9F 01 95 E4 8C DD   F2 9F 62 28 3B B9 58 C7  r,........b(;.X.
#     00A0: 3E 0A 68 BB 22 3E 36 0E   56 50 98 D9 55 88 B2 D2  >.h.">6.VP..U...
#     00B0: 27 1A 9C 22 35 C4 AF DB   5B 62 D8 96 AB B1 37 AC  '.."5...[b....7.
#     00C0: C3 28 9A EE 7E 5B B3 86   FA E5 BD 8F C5 24 04 D9  .(...[.......$..
#     00D0: 78 46 3A F1 AA 70 0A 41   DA 81 6A 70 1C 80 88 A8  xF:..p.A..jp....
#     00E0: 36 4D BC 1E 48 89 6E BF   4F 62 1B 06 16 C0 BD 9F  6M..H.n.Ob......
#     00F0: 8E A5 47 0A D3 44 37 E1   A1 58 71 6B 62 E4 79 71  ..G..D7..Xqkb.yq
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.618 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 53 17 6C 95 30 CA 21 46   8A 96 FD 80 DC B5 72 CB  S.l.0.!F......r.
#     0010: CC 45 DD 07 3E AC 62 1D   D5 66 9A EC 2F EB 1F 5B  .E..>.b..f../..[
#     0020: 7C 97 4D C9 EE 4C 8B CA   94 2F 10 74 65 CA B6 66  ..M..L.../.te..f
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.620 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:52.621 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.621 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:52.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-11 24:23:52.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:23:52.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.623 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.625 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C 80 18 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:25.000 UTC",
#       "not  after"         : "2024-01-09 24:23:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 18 D2 B0 A4 69 10 18   2F E4 B2 6E 5A 54 EC 12  a....i../..nZT..
#           0010: BA 23 0D 8A                                        .#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 3B F1 E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:19.000 UTC",
#       "not  after"         : "2024-01-09 24:23:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#           0010: 3A 69 FE 57                                        :i.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.652 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 3A AE 23 65 13 F5 5E   67 5F 6C 18 3F 92 8E 12  h:.#e..^g_l.?...
#     0010: 6A 01 3E E9 C6 0E C3 87   6A 67 8D 11 38 FA 75 0D  j.>.....jg..8.u.
#     0020: AF 2F CF 99 87 FF EE D8   48 2D 97 98 0D 9C 61 16  ./......H-....a.
#     0030: 0E 7E A9 02 C6 36 99 45   16 DC 81 A1 7B 01 23 D3  .....6.E......#.
#     0040: 17 6A 8D 26 CA 6D 89 88   55 3E 20 8D DA 32 F5 00  .j.&.m..U> ..2..
#     0050: 7B F8 E3 89 86 92 C0 07   5C 30 B6 18 D8 2E 1C 6D  ........\0.....m
#     0060: E3 CF 36 86 DE AF DD 5B   28 41 65 BA FC 5B F7 42  ..6....[(Ae..[.B
#     0070: 4A AC 95 E0 36 51 47 25   BE BB 2F 93 28 85 0E 6F  J...6QG%../.(..o
#     0080: 19 7C F7 C8 89 95 3D CC   32 E8 0F 46 65 77 63 0D  ......=.2..Fewc.
#     0090: C5 A1 49 EE 88 C4 63 0E   12 A8 93 60 AC 9E 26 91  ..I...c....`..&.
#     00A0: 59 6B D7 BB 6E 7C D3 38   F8 43 82 6E 00 65 D2 E6  Yk..n..8.C.n.e..
#     00B0: C5 B2 A8 87 A1 82 BF B8   F1 54 21 A7 0B 0A 5F 72  .........T!..._r
#     00C0: B3 87 5D 74 A3 E0 AA B5   55 E9 A1 8F F1 73 2E 4B  ..]t....U....s.K
#     00D0: 6C F4 99 FE 43 0C A0 58   D0 D1 43 45 B4 3B 6A A5  l...C..X..CE.;j.
#     00E0: 52 07 BC 47 B0 B6 D5 EC   34 DF F2 57 46 B1 FD F0  R..G....4..WF...
#     00F0: 10 D8 89 1E 18 1E 61 9B   F6 34 5F 71 5B F2 E2 67  ......a..4_q[..g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.653 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 DD 1A 49 2A 9D 2A C7   E0 C4 CA EB 9F 78 76 C1  ...I*.*......xv.
#     0010: D9 C4 0E DD CC B0 A6 F7   71 B9 29 76 89 38 43 76  ........q.)v.8Cv
#     0020: DF D8 FB 45 E8 54 18 C4   20 42 D9 F2 36 71 D4 B3  ...E.T.. B..6q..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.654 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:23:52.709 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A8 0C 40 D7 64 82 8A DD BD F0 A0 AE 7F 8E 5F 35 71 CF F1 89 18 E0 83 3D 85 64 8F B0 EB A7 9C 37",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 24:23:53.023 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 24:23:53.023 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-11 00:24:04.400; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 24:24:04.720 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 31 BD 94",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:17.000 UTC",
#       "not  after"         : "2024-01-09 24:23:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#           0010: 3A 69 FE 57                                        :i.W
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 3B F1 E5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 24:23:19.000 UTC",
#       "not  after"         : "2024-01-09 24:23:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 79 ED 01 A3 A5 0F E1   A9 F4 E9 D3 05 27 5F FC  ky...........'_.
#           0010: 3A 69 FE 57                                        :i.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 B3 12 95 6B A1 13 74   15 B9 6D 99 AF 07 6B 96  ....k..t..m...k.
#           0010: 51 6D 96 8E                                        Qm..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 24:24:04.736 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:24:04.969 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.969 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:24:04.971 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-11 24:24:04.971 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.977 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.988 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.989 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-11 24:24:04.991 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F3 EE 93 A7 AD F9 77 6C 69 E3 FD 74 91 05 DD 72 F4 12 43 B5 35 CE 8A 4A DE DF 83 9D 14 F0 52 2B",
#     "session id"          : "18 9B 98 8D 24 55 3E 32 08 3D 79 6A E6 EB 48 DF 7B B9 D0 17 90 3F 29 D9 21 12 A1 86 99 39 F6 C6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C5 65 88 98 50 9D 50 72   30 85 3E DC 26 35 C0 48  .e..P.Pr0.>.&5.H
#               0010: 38 9F 5C 45 AE 5E 37 EB   12 E6 57 76 C4 BD 1D 1F  8.\E.^7...Wv....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.010 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4D 0D FD B8 29 BB B8 60 47 DD 64 0D 2A 18 0B 80 F3 64 1F 3C 5F 13 89 3B CD F8 E3 29 3A C3 84 49",
#     "session id"          : "18 9B 98 8D 24 55 3E 32 08 3D 79 6A E6 EB 48 DF 7B B9 D0 17 90 3F 29 D9 21 12 A1 86 99 39 F6 C6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7E E5 91 F8 D4 BF 00 7D   E2 27 DA C9 14 B4 6F E0  .........'....o.
#             0010: 96 19 62 7F 35 D4 63 8E   C2 58 13 1E 1B E1 62 1C  ..b.5.c..X....b.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.010 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.010 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.011 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.011 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.012 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.015 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.015 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.023 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.025 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.026 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:24:05.031 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:24:05.031 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-11 24:24:05.032 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-11 24:25:24.096 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:25:24.138 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:25:24.138 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:25:24.138 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 24:25:24.138 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34616/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28120ms
ok 65 stop command for single port in 30774ms
ok 66 status detects locally running solr in 14652ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2183ms
ok 69 copying files around in 6598ms
ok 70 upconfig in 2662ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1216ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 49s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m15s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5638 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5638/

All tests passed

Build Log:
[...truncated 1336 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46855/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 20:25:09.902; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 20:25:09.908; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 20:25:10.815; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 20:25:10.857; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22878ms
ok 61 start solr with client truststore and security manager in 25097ms
not ok 62 start solr with mTLS needed in 57160ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MFQSV3/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46855.
#
# Started Solr server on port 46855 (pid=200680). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46856.
#
# Started Solr server on port 46856 (pid=201106). Happy searching!
#
# INFO  - 2023-10-10 20:26:34.193; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 20:26:34.199; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 20:26:34.576; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 20:26:34.579; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 20:26:34.579; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:34.611 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 4C 53 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:10.000 UTC",
#     "not  after"         : "2024-01-08 20:26:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 87 BF 95 35 EC 18 00   C3 6C A6 8F 68 0B 37 C4  %...5....l..h.7.
#         0010: 36 02 11 D2                                        6...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:34.616 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 08 1D 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:01.000 UTC",
#     "not  after"         : "2024-01-08 20:26:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:34.630 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:34.861 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.861 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:34.863 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:34.863 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.869 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.880 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:34.883 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4F CC 1C FF F6 5C 82 B0 AA 53 01 AB 15 29 A4 22 9C DE 86 44 A6 3D 35 AC 43 75 4C 8D D3 82 6E B1",
#   "session id"          : "AB 6A 35 3A 5E 4E DB AA 17 B2 94 27 C5 BE 0B 4B CB 50 94 DE 1B EF A1 3F FA AD BD 19 78 12 16 23",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 07 EC C8 C5 64 1A D3 4C   AA 77 7B 87 84 F6 D7 88  ....d..L.w......
#             0010: 84 03 38 6E 67 03 2B 9A   F8 2F 13 8A E7 4C 47 10  ..8ng.+../...LG.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.010 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B4 90 D8 B6 DF 48 98 CD E6 96 9C 53 C9 9C 98 61 31 48 D2 96 1F D0 02 C0 EB 8F B3 C2 9E 65 13 84",
#   "session id"          : "AB 6A 35 3A 5E 4E DB AA 17 B2 94 27 C5 BE 0B 4B CB 50 94 DE 1B EF A1 3F FA AD BD 19 78 12 16 23",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 4A 1C CF 44 BD CA 5B   1E 9E DE AB 48 A3 46 75  .J..D..[....H.Fu
#           0010: 27 82 D7 A8 7C A1 0E AB   13 90 24 03 8C 93 46 79  '.........$...Fy
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.011 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.011 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.012 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.013 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.013 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.015 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.015 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.024 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.026 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.027 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.030 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.031 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.032 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.032 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.033 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.034 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.034 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.035 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.036 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.036 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.039 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 5C FC DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:06.000 UTC",
#       "not  after"         : "2024-01-08 20:26:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 FE 59 97 50 DA 7B 2A   BC B6 F3 B8 E1 CC 3B 1F  ..Y.P..*......;.
#           0010: F6 07 86 0E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.039 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:35.103 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:35.104 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:35.104 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:35.104 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.124 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.128 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 50 27 C2 C0 9A 81 F4   C0 3A B5 4E 7B 5D DD D1  bP'......:.N.]..
#     0010: 82 A1 0C 17 78 B2 8D 0C   E4 E1 27 1D B3 02 F8 2A  ....x.....'....*
#     0020: 64 A0 F5 65 D3 BE 59 27   45 5D 8D 11 BD 29 3F 92  d..e..Y'E]...)?.
#     0030: D3 90 1C B2 22 E3 69 A0   B4 6F F2 B1 6B E8 1F 50  ....".i..o..k..P
#     0040: 29 6A 6D 02 00 42 B6 DA   E5 78 01 67 74 CA 80 8B  )jm..B...x.gt...
#     0050: 89 24 2F C3 23 87 23 CA   8B 14 FD E4 7D 16 4E BA  .$/.#.#.......N.
#     0060: 0E C5 1F 51 40 B9 C0 A2   84 5A 4C 44 E4 22 87 37  ...Q@....ZLD.".7
#     0070: FC C8 B9 C6 8E 8F 4E A4   69 39 A4 94 4C 0C 4B E0  ......N.i9..L.K.
#     0080: C6 D7 2A 1B FC EF 34 DD   8A C1 CD 72 18 6C 62 F5  ..*...4....r.lb.
#     0090: 1C 6D 09 AA AF 20 F7 E1   63 70 F7 8D 9F 72 8E 26  .m... ..cp...r.&
#     00A0: 27 24 28 86 37 A0 0E 68   C8 B9 99 01 F0 D1 47 75  '$(.7..h......Gu
#     00B0: 35 79 E5 6B 36 D7 06 17   45 F4 F0 55 96 4A 18 8C  5y.k6...E..U.J..
#     00C0: 2F 17 7C 61 B3 A2 71 1B   00 39 73 7C BD DE 1C DA  /..a..q..9s.....
#     00D0: 45 D2 54 81 B6 E0 6E 56   2C 09 78 C1 D7 1C 36 09  E.T...nV,.x...6.
#     00E0: 2E A6 F5 E3 9E 3B 3C C3   10 25 12 3B 99 D1 A1 21  .....;<..%.;...!
#     00F0: 8F 00 24 B8 3C 1F 57 18   79 FF FE 94 F8 E0 B8 B1  ..$.<.W.y.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.130 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DB A4 5D ED 88 08 64 FE   8D 35 9E D1 3C 7A 17 37  ..]...d..5..<z.7
#     0010: 0C 35 09 B8 56 5E C6 BF   5C C2 00 51 42 F6 40 AB  .5..V^..\..QB.@.
#     0020: EF 8D E9 BE 18 54 AD FB   36 C7 EF FB DC 09 D6 0A  .....T..6.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.132 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:35.133 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.133 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:35.133 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.134 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:35.134 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:35.134 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.135 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.137 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 4C 53 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:10.000 UTC",
#       "not  after"         : "2024-01-08 20:26:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 87 BF 95 35 EC 18 00   C3 6C A6 8F 68 0B 37 C4  %...5....l..h.7.
#           0010: 36 02 11 D2                                        6...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 57 41 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:03.000 UTC",
#       "not  after"         : "2024-01-08 20:26:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#           0010: 1F B7 79 C4                                        ..y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.164 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 01 3F D7 EE 37 5E 69   F9 3E 9D 58 3E 78 4A 3B  G.?..7^i.>.X>xJ;
#     0010: A7 99 8E D1 9C 68 BA A2   09 58 C3 89 8D AC B2 15  .....h...X......
#     0020: 74 3C A5 4A 69 F8 45 D6   26 9A 87 06 1A EF C1 59  t<.Ji.E.&......Y
#     0030: F4 23 6B 63 F9 A3 BB 14   0B 8B C9 1B BC 46 EB 0D  .#kc.........F..
#     0040: CE 05 4A A4 DF 44 91 2A   E2 65 03 C4 0C ED ED 54  ..J..D.*.e.....T
#     0050: 3E AB 93 2C 68 C4 EA 50   16 C7 27 9C B9 29 83 2F  >..,h..P..'..)./
#     0060: F9 36 6E 93 60 C2 65 DC   F3 1B D2 90 AF 98 7C D9  .6n.`.e.........
#     0070: 9A 0B 1C FA A2 2E 57 8D   F6 01 64 CA E3 86 A8 9E  ......W...d.....
#     0080: 43 51 01 0C 21 A0 D1 FE   C0 10 0D B6 BE 01 87 F2  CQ..!...........
#     0090: 9C 87 20 8D C3 C6 AA 71   62 5B 90 BB EF 53 8A C6  .. ....qb[...S..
#     00A0: 5E 3E A2 A7 ED 8D 2B 6F   85 B5 9F BC 4F CA E3 54  ^>....+o....O..T
#     00B0: 71 EF E8 D1 43 A6 8D EA   1C 03 94 16 46 E2 76 94  q...C.......F.v.
#     00C0: 13 B1 9D 9E 90 35 54 25   B4 F2 0B 48 DF 51 12 B0  .....5T%...H.Q..
#     00D0: 1B 0F 8E 06 2B A7 2E 9E   86 63 41 37 10 B8 92 07  ....+....cA7....
#     00E0: 85 DD 35 A2 4D 9F E7 67   C2 D2 9B 3B BC 04 60 32  ..5.M..g...;..`2
#     00F0: 58 05 F5 EB E0 75 F1 1E   A4 66 05 AA 96 3E 2A BA  X....u...f...>*.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.165 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1F 55 EA 68 B2 98 17 D0   76 FA F7 AA D0 FB E8 05  .U.h....v.......
#     0010: E8 20 A3 FF DF 3F AF EC   A8 73 85 ED 72 CF 42 36  . ...?...s..r.B6
#     0020: 2D 02 7B 55 3F 2A 08 5D   77 99 6B 24 0C 2E 20 A3  -..U?*.]w.k$.. .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.166 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:35.215 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BE 6E BF E0 DA A9 75 3D 4E 05 8A 15 67 48 91 F3 D2 47 5D F4 D8 2E EA 31 B9 61 18 A2 29 80 A5 C6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 20:26:35.492 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 20:26:35.493 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 20:26:36.447; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 20:26:36.453; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 20:26:36.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 20:26:36.832; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 20:26:36.833; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MFQSV3/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:36.866 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 4C 53 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:10.000 UTC",
#     "not  after"         : "2024-01-08 20:26:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 87 BF 95 35 EC 18 00   C3 6C A6 8F 68 0B 37 C4  %...5....l..h.7.
#         0010: 36 02 11 D2                                        6...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:36.871 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 08 1D 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:01.000 UTC",
#     "not  after"         : "2024-01-08 20:26:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:36.886 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:37.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:37.122 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:37.123 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:26:37.123 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:37.282 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.283 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:37.284 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:37.285 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.290 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.302 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.302 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.302 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:37.305 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CA 2B 62 47 9C 72 4E ED BE 55 1E 71 A7 B9 F3 64 B5 01 88 D0 4A 27 31 75 31 7E E9 A3 84 CB AD 8A",
#   "session id"          : "2B 63 D8 65 F9 F0 E3 C2 0F 6C 00 70 06 C0 B3 98 AF ED FE A9 3A 8A 87 73 9C 07 51 E8 C7 D6 E8 15",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 65 C4 3B 46 0E 69 85   EE 03 6F FA C4 1E 8B 8B  .e.;F.i...o.....
#             0010: CD 6B 78 E5 81 CE 5A C3   F0 E4 FB 59 68 63 27 2E  .kx...Z....Yhc'.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.431 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1C 4D E2 F9 D8 1D 62 00 90 AF 4F 3F A5 44 C0 AB D5 EE 34 34 3C 09 87 F5 59 CA 26 F4 25 F4 EB ED",
#   "session id"          : "2B 63 D8 65 F9 F0 E3 C2 0F 6C 00 70 06 C0 B3 98 AF ED FE A9 3A 8A 87 73 9C 07 51 E8 C7 D6 E8 15",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 57 6A 7B 5E C7 01 6A C7   EB F1 7E DD 65 6D 63 6C  Wj.^..j.....emcl
#           0010: 5B 80 9B DC 77 3A 42 8C   AE D3 6A FD 75 46 8B 24  [...w:B...j.uF.$
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.432 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.432 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.435 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.435 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.437 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.437 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.437 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.439 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.446 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.448 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.449 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.453 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.453 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.454 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.456 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.456 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.456 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.457 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.457 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.458 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.461 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 5C FC DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:06.000 UTC",
#       "not  after"         : "2024-01-08 20:26:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 FE 59 97 50 DA 7B 2A   BC B6 F3 B8 E1 CC 3B 1F  ..Y.P..*......;.
#           0010: F6 07 86 0E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.462 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.568 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 57 41 0C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 20:26:03.000 UTC",
#     "not  after"         : "2024-01-08 20:26:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#         0010: 1F B7 79 C4                                        ..y.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#         0010: FB 89 6C 0A                                        ..l.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.572 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C EC A8 EC 60 E7 0E ED   ED F1 9E 3B F3 D8 FF 19  L...`......;....
#     0010: A4 8F 8E CF 66 9F B1 19   6F 30 C9 BB 1C 2B 8F DC  ....f...o0...+..
#     0020: 75 C5 68 9A 58 C5 DE 30   EC F4 B3 38 97 DF 3A AB  u.h.X..0...8..:.
#     0030: B0 62 07 25 B2 E7 2A 43   1D C3 78 70 BC D8 0A 49  .b.%..*C..xp...I
#     0040: EA E2 D2 F4 47 AA 87 C7   CE 03 6E D0 32 16 E1 67  ....G.....n.2..g
#     0050: 65 E0 75 06 12 DB 32 71   48 AF C5 83 35 B8 72 BC  e.u...2qH...5.r.
#     0060: C2 0C 53 DC B4 90 68 8D   FA 5B B2 60 27 9F A7 6C  ..S...h..[.`'..l
#     0070: BF 8F D2 A9 63 3B 76 0D   05 02 C2 CE 3F 56 A4 D3  ....c;v.....?V..
#     0080: 9A F7 C7 6D DC 9C 82 3B   C3 CD 8B FC 68 33 E0 4E  ...m...;....h3.N
#     0090: 90 EF 67 54 D7 EC 48 47   B1 03 D1 BD E7 3F A3 96  ..gT..HG.....?..
#     00A0: AB 2C 8F 13 E4 3A 9D 73   1B FC F6 5F A3 EB E6 40  .,...:.s..._...@
#     00B0: 05 19 97 3C 3C 7F B0 48   D7 70 05 01 6C 40 1A EA  ...<<..H.p..l@..
#     00C0: A6 EB C9 98 B6 57 5E DE   51 04 1C DC A5 D1 C9 DC  .....W^.Q.......
#     00D0: 57 EA 2B BA 56 AB 90 6F   D0 C1 59 1B 2F C7 8A 29  W.+.V..o..Y./..)
#     00E0: B2 3D F3 DC 35 8E 93 C1   8F CF 2C BA 9E EC B8 71  .=..5.....,....q
#     00F0: CB E0 67 37 00 3E 60 C4   82 31 AF C0 8F 4B 0A 50  ..g7.>`..1...K.P
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.574 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 AA 0F A8 A8 66 C9 B1   EC 76 5C 84 BF 26 CC 54  v....f...v\..&.T
#     0010: 6B 29 40 87 40 17 ED 6E   1A CD 3B 3C A4 55 56 79  k)@.@..n..;<.UVy
#     0020: B0 34 99 6D 0A D6 EF FD   8B CA 82 56 BD EC 3D 96  .4.m.......V..=.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.576 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:37.577 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.577 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:37.578 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.578 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 20:26:37.578 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:37.578 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.579 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.582 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 4C 53 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:10.000 UTC",
#       "not  after"         : "2024-01-08 20:26:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 87 BF 95 35 EC 18 00   C3 6C A6 8F 68 0B 37 C4  %...5....l..h.7.
#           0010: 36 02 11 D2                                        6...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 57 41 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:03.000 UTC",
#       "not  after"         : "2024-01-08 20:26:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#           0010: 1F B7 79 C4                                        ..y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.607 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 03 B7 5D E1 A6 F6 E7   C7 3D 53 7C CA B9 9C 71  ...].....=S....q
#     0010: 8A BF 4C 52 49 D7 53 AD   01 90 77 14 2B CC 2E 83  ..LRI.S...w.+...
#     0020: 2E F1 BE 52 C5 5A 92 A1   7F BF 86 13 1A C3 CD E1  ...R.Z..........
#     0030: 3A 15 F3 31 AD 9C 76 B6   3B D9 BC 0B AE 99 3F 58  :..1..v.;.....?X
#     0040: 7B FE D3 6E 42 61 75 C6   5C 8F 0C 77 30 2E 0A 9B  ...nBau.\..w0...
#     0050: 5E 79 A4 C0 4B FD 63 AB   B1 10 96 90 91 63 23 B9  ^y..K.c......c#.
#     0060: 97 3C 20 A3 8C A0 9C F9   C4 12 80 53 C1 23 9E 30  .< ........S.#.0
#     0070: CD 05 AC B5 A5 04 FF 29   B9 07 B7 77 AE 61 BB A9  .......)...w.a..
#     0080: 88 B4 46 45 01 CB D6 F8   6F D2 63 79 64 75 A1 37  ..FE....o.cydu.7
#     0090: 5A 61 60 B5 94 7D 8A D8   19 81 52 A5 F6 85 DD 6B  Za`.......R....k
#     00A0: 15 11 F5 8B C1 8E 1A 49   DA 31 72 98 D9 C6 84 64  .......I.1r....d
#     00B0: 74 8F 5C FD F5 31 15 73   43 3E A6 55 41 20 5F 93  t.\..1.sC>.UA _.
#     00C0: 78 D9 AA 0E D7 EA A0 A3   59 B5 FD 58 E3 7C 8E DB  x.......Y..X....
#     00D0: 78 C6 AD 8B 52 EF 8A 25   67 52 3E BB FD 13 9B C3  x...R..%gR>.....
#     00E0: 1B 08 EF 7A 00 99 B7 73   9F 90 F8 FA BB 21 5B 8C  ...z...s.....![.
#     00F0: D5 A9 5C 88 60 5C F3 76   1C 21 7D 5C 36 26 94 80  ..\.`\.v.!.\6&..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.608 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2D 92 A8 84 B3 12 50 57   25 4C 34 5A B8 CA F5 AD  -.....PW%L4Z....
#     0010: 0E 85 32 56 B4 1C 11 6B   C3 A4 C4 25 53 8D 5A 36  ..2V...k...%S.Z6
#     0020: FF 4E B0 E9 5E 90 1A 38   1B EB 98 EF EE 8B 8B F2  .N..^..8........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.609 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:37.673 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "09 8D 91 DF 13 71 DA 9E 9C 51 F5 81 42 D4 D2 12 73 23 AE E5 45 A8 AD 8D 1B 39 26 E9 DE 7C E4 93",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 20:26:37.989 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 20:26:37.990 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 20:26:49.236; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:49.561 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 08 1D 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:01.000 UTC",
#       "not  after"         : "2024-01-08 20:26:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#           0010: 1F B7 79 C4                                        ..y.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 57 41 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 20:26:03.000 UTC",
#       "not  after"         : "2024-01-08 20:26:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 7E 7E 7E 00 D3 79 5A   E8 63 90 F7 9F 0E 9B 35  ......yZ.c.....5
#           0010: 1F B7 79 C4                                        ..y.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 53 E4 40 EC 15 CA 1D   D1 6F DE 52 7B CC 96 D6  .S.@.....o.R....
#           0010: FB 89 6C 0A                                        ..l.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 20:26:49.576 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:49.807 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.807 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:49.809 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 20:26:49.809 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.814 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.826 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.826 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.826 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 20:26:49.828 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "34 4D AF 3D FC 98 38 84 73 14 C7 3C 12 E8 8C 37 B4 28 CB D0 33 40 74 03 AB 5A 91 C0 37 3F 48 36",
#     "session id"          : "BE 81 8F E3 F5 7C 09 23 CF 03 ED 37 16 FD 05 F6 1B 39 5F AC 42 67 CD 60 73 69 D5 8A 8D 98 0B 41",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 72 7B 8A 14 93 16 EC 3F   44 AC 0B 45 CB AC 73 1F  r......?D..E..s.
#               0010: 23 99 9E 0A 30 4C 13 3D   D5 6A AA 9B F8 C5 E0 1B  #...0L.=.j......
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.850 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8A 5B E7 0C 6A 6A A0 AA 04 B1 E7 44 4E 9B A5 D7 6C 45 AC 7A 49 97 87 ED B1 64 8C 5D 5C C3 D5 A4",
#     "session id"          : "BE 81 8F E3 F5 7C 09 23 CF 03 ED 37 16 FD 05 F6 1B 39 5F AC 42 67 CD 60 73 69 D5 8A 8D 98 0B 41",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FD 09 70 24 97 54 35 9A   B2 B4 06 61 C2 8D 21 9C  ..p$.T5....a..!.
#             0010: 78 D2 96 D6 87 29 2D 8C   FA A4 69 3C B8 D3 C4 35  x....)-...i<...5
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.850 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.850 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.852 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.852 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.852 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.852 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.854 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.855 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.863 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.865 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.866 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:49.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:26:49.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 20:26:49.872 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 20:28:08.531 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:28:08.580 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:28:08.581 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:28:08.581 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 20:28:08.581 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46856/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28472ms
ok 65 stop command for single port in 31394ms
ok 66 status detects locally running solr in 14406ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2195ms
ok 69 copying files around in 6589ms
ok 70 upconfig in 2671ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1217ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1222ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 30s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m55.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5637 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5637/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33913/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 14:57:14.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 14:57:14.944; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 14:57:15.880; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 14:57:15.922; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23350ms
ok 61 start solr with client truststore and security manager in 25962ms
not ok 62 start solr with mTLS needed in 60603ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hy0XTn/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33913.
#
# Started Solr server on port 33913 (pid=200716). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33914.
#
# Started Solr server on port 33914 (pid=201164). Happy searching!
#
# INFO  - 2023-10-10 14:58:41.470; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 14:58:41.476; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 14:58:41.900; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 14:58:41.904; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 14:58:41.905; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:41.942 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 D5 B4 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:17.000 UTC",
#     "not  after"         : "2024-01-08 14:58:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F0 96 E9 59 BF B8 4C 21   DC 69 12 9B D0 00 42 20  ...Y..L!.i....B
#         0010: B3 64 DB 67                                        .d.g
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:41.947 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A E5 1A 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:08.000 UTC",
#     "not  after"         : "2024-01-08 14:58:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:41.964 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:42.060 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:42.067 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:42.069 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:42.069 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:42.225 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:42.227 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:42.228 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.235 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.249 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.249 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.250 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:42.253 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8E 81 91 63 35 B7 74 EA 87 2D 30 5A 62 A6 AB C0 38 F6 12 A0 7F 47 13 AE 03 80 42 AD E8 61 FB 5C",
#   "session id"          : "83 36 B9 E3 5E 5E C2 48 19 F0 BE 67 50 58 30 0B 4C 15 77 F6 E9 70 F2 E6 06 2E BD 33 C7 16 88 C3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C DE DE 7D 2C CF AF 6E   D0 8C E1 47 80 D2 88 CF  \...,..n...G....
#             0010: 93 57 5E 2F A3 20 95 9D   7A CA D7 7E 51 0F 05 17  .W^/. ..z...Q...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.394 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1B 71 BA 28 F6 CE 69 BE 63 E8 15 7A FA 55 04 F8 C2 41 3C 37 25 DD 4A D8 54 61 F0 14 56 34 AD 2E",
#   "session id"          : "83 36 B9 E3 5E 5E C2 48 19 F0 BE 67 50 58 30 0B 4C 15 77 F6 E9 70 F2 E6 06 2E BD 33 C7 16 88 C3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9B 65 F2 E4 A6 D4 2C 6F   78 45 ED 2D 76 89 9D B0  .e....,oxE.-v...
#           0010: BE 90 F4 F0 E3 F6 16 F3   62 E6 F7 17 02 45 03 3C  ........b....E.<
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.394 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.394 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.397 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.398 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.399 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.399 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.409 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.411 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.412 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.421 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.421 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.422 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.425 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.425 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.425 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.426 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.427 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.428 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.428 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.432 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 B2 E3 D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:13.000 UTC",
#       "not  after"         : "2024-01-08 14:58:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 64 32 ED D2 54 F2 91 E8   73 2A 25 AC CD 05 1A E6  d2..T...s*%.....
#           0010: 51 23 78 CB                                        Q#x.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.432 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.528 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.535 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 26 0F E6 37 78 2B E9   62 31 0D 74 0E D3 5D CF  c&..7x+.b1.t..].
#     0010: 29 B6 AC 81 CD 96 D7 18   99 21 98 81 76 F1 CC 49  )........!..v..I
#     0020: 7F 5D 6B 5D 91 CE 48 98   4A 2A 8E 0B 6C 8A DD BB  .]k]..H.J*..l...
#     0030: 60 3B 72 BE BC 95 F6 51   6D 84 3B B6 47 2D AE FA  `;r....Qm.;.G-..
#     0040: BE 3E 08 F8 A8 22 55 16   59 BC D7 58 22 BB 24 14  .>..."U.Y..X".$.
#     0050: 17 22 ED 59 DE 52 8F 33   DC 97 DD 6F 2D 55 D7 4A  .".Y.R.3...o-U.J
#     0060: 6D D8 E7 03 D5 4B 81 DE   7F 85 46 7F 1D F4 9F A9  m....K....F.....
#     0070: 46 49 4A D1 64 07 0D 50   0F 81 CC 46 2F D2 75 E8  FIJ.d..P...F/.u.
#     0080: 18 30 33 BA BB 69 2F C4   13 A1 1F FD 5D E9 99 FC  .03..i/.....]...
#     0090: E6 5A FA BF 18 CD FE 36   27 76 D4 2A A9 4D C5 5B  .Z.....6'v.*.M.[
#     00A0: 70 EB F2 C9 88 14 98 EB   CD 7B D1 C3 22 47 36 66  p..........."G6f
#     00B0: 44 29 F5 33 C7 D8 EB 74   84 D0 F9 0A AF 59 E6 A1  D).3...t.....Y..
#     00C0: 19 BB 37 2D 96 E0 4B EC   02 80 CB 6D 2F DA 43 05  ..7-..K....m/.C.
#     00D0: 19 B2 2B B2 32 7B 09 B3   3F BF 18 56 CE DD 3A B8  ..+.2...?..V..:.
#     00E0: BC A8 65 9D 9B 64 DF 05   BF 24 A8 17 74 73 53 2F  ..e..d...$..tsS/
#     00F0: 36 C2 E3 E2 D0 AB 12 F0   EA 60 B9 68 4C 38 E9 98  6........`.hL8..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.538 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 3E 20 D0 B7 88 2E 19   32 96 0E B9 A1 FF D5 40  .> .....2......@
#     0010: DE 4E 2D A8 43 C5 22 46   80 AA 1C 3F 6D AD 07 A0  .N-.C."F...?m...
#     0020: 35 25 93 3A A2 44 00 3E   40 FD 5E 85 B2 9F BC 36  5%.:.D.>@.^....6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.542 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:42.543 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.543 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:42.543 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.543 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:42.543 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:42.544 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.544 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.548 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 D5 B4 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:17.000 UTC",
#       "not  after"         : "2024-01-08 14:58:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F0 96 E9 59 BF B8 4C 21   DC 69 12 9B D0 00 42 20  ...Y..L!.i....B
#           0010: B3 64 DB 67                                        .d.g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 94 9F 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:10.000 UTC",
#       "not  after"         : "2024-01-08 14:58:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#           0010: 99 9E 82 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.588 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D 51 EF 0F 72 C7 93 8D   1A 37 DF 20 AA 5F 09 4D  ]Q..r....7. ._.M
#     0010: 08 24 8B ED A2 B0 5D A7   5A CC 7F A3 DE 3E C0 D7  .$....].Z....>..
#     0020: 54 2C 70 B4 A9 0D 7B 27   6B 71 DC 97 8D 89 1E 71  T,p....'kq.....q
#     0030: 55 64 49 CB 36 FC 4B EC   B4 E3 03 95 72 39 07 A9  UdI.6.K.....r9..
#     0040: 61 E4 11 3F A0 E3 98 18   55 9A 62 63 35 10 9C DF  a..?....U.bc5...
#     0050: 90 A9 32 47 04 14 3E F1   2F 5B 6C B9 24 AD B3 9E  ..2G..>./[l.$...
#     0060: 96 31 A7 6F F5 FA AC 06   32 46 24 C0 E0 EC 37 0F  .1.o....2F$...7.
#     0070: 9E 52 78 A0 6F EA A0 43   6A 20 61 67 0C 88 76 71  .Rx.o..Cj ag..vq
#     0080: 04 62 E5 DB C3 B1 F9 B9   E6 82 DE 5E 0A 92 7D 96  .b.........^....
#     0090: 9F 10 F3 64 DA 80 68 A2   19 0B 56 8D 97 71 6C C7  ...d..h...V..ql.
#     00A0: AF C7 C6 FB 0A 91 B4 9E   65 24 14 D7 99 B7 64 29  ........e$....d)
#     00B0: 38 DA EF 8D C9 E7 CC 04   E6 AF 4B 74 8E 5F 80 DA  8.........Kt._..
#     00C0: E1 E9 FA 8D 03 2F 70 0E   BD AD B2 63 BE 92 8F D3  ...../p....c....
#     00D0: 72 E4 4A DD B6 CC 51 C9   DC 31 1E 3E D9 91 3A C4  r.J...Q..1.>..:.
#     00E0: 76 BE FE 6F C8 1C 2C 09   75 43 A0 55 A2 31 72 BD  v..o..,.uC.U.1r.
#     00F0: A6 6C 67 91 A6 04 34 12   79 DA 10 F5 56 AA 77 A9  .lg...4.y...V.w.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.590 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C BE A0 5C 2A C7 CE 1B   F8 1B B8 C9 5E 52 8F 4E  ...\*.......^R.N
#     0010: 76 A8 51 DA 3C 6F CD EC   6E 45 FF 7D 78 A1 C6 62  v.Q.<o..nE..x..b
#     0020: 5E F7 7F C9 1B 40 9F 72   FC CB 40 70 D7 8D 0E D5  ^....@.r..@p....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.590 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:42.642 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 C6 C1 5F BC 69 BE 16 EC 32 32 40 FA E3 47 FE 5B 11 F6 CD 9A CF ED B2 07 D7 8C 38 11 6A 04 6C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 14:58:42.925 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 14:58:42.925 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 14:58:43.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 14:58:43.908; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 14:58:44.283; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 14:58:44.286; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 14:58:44.287; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hy0XTn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:44.321 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 D5 B4 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:17.000 UTC",
#     "not  after"         : "2024-01-08 14:58:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F0 96 E9 59 BF B8 4C 21   DC 69 12 9B D0 00 42 20  ...Y..L!.i....B
#         0010: B3 64 DB 67                                        .d.g
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:44.326 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A E5 1A 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:08.000 UTC",
#     "not  after"         : "2024-01-08 14:58:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:44.342 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:44.577 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:44.580 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:44.580 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.586 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.601 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.601 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.601 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:44.604 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 C1 C5 3C 81 9B D5 87 42 5A A2 B4 90 D2 B5 19 05 67 BA CD 0D 5B D3 6A C6 89 99 52 20 83 65 E4",
#   "session id"          : "84 DD B8 E9 3B C8 F2 32 69 4C 97 5A D5 0D AB B8 5E 82 AC 78 D3 16 A2 87 02 B9 B8 18 20 07 69 54",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9D DA 7A D4 97 3A 2B 3C   88 07 88 29 5A BF 53 D4  ..z..:+<...)Z.S.
#             0010: EC A2 4B 22 02 D9 95 E5   51 26 1C D2 85 B6 C9 51  ..K"....Q&.....Q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.727 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F C7 9C 2F 27 2D FD C1 03 66 9C 7E E1 B0 30 2F 77 5D A3 B7 28 57 96 13 43 1B 2F F0 7D 95 F8 6B",
#   "session id"          : "84 DD B8 E9 3B C8 F2 32 69 4C 97 5A D5 0D AB B8 5E 82 AC 78 D3 16 A2 87 02 B9 B8 18 20 07 69 54",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4E 6E 93 18 98 73 55 5F   FD 1B C4 0D 64 37 43 7B  Nn...sU_....d7C.
#           0010: 22 80 04 8D C4 CC E3 30   6C 9B B7 93 E3 85 8F 2B  "......0l......+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.728 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.728 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.730 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.732 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.732 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.733 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.734 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.743 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.745 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.746 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.756 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.756 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.756 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.757 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.759 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.759 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.759 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.760 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.761 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.762 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.765 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 B2 E3 D5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:13.000 UTC",
#       "not  after"         : "2024-01-08 14:58:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 64 32 ED D2 54 F2 91 E8   73 2A 25 AC CD 05 1A E6  d2..T...s*%.....
#           0010: 51 23 78 CB                                        Q#x.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.765 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:44.825 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:44.825 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:44.826 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:44.826 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.857 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 94 9F 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 14:58:10.000 UTC",
#     "not  after"         : "2024-01-08 14:58:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#         0010: 99 9E 82 57                                        ...W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#         0010: 91 48 FD DE                                        .H..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.863 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 87 8A 59 AD 9B F3 8A B1   D9 E7 06 9E D7 7B E9 88  ..Y.............
#     0010: D3 4D 5E 7F D8 5C 76 87   0B 9A FB 40 56 FD 2A 49  .M^..\v....@V.*I
#     0020: AA D3 CB 2A A8 D3 52 53   7A 1B 46 63 50 5D E5 8C  ...*..RSz.FcP]..
#     0030: 64 03 D3 42 8E 97 5F F9   79 6B 01 05 04 61 31 6C  d..B.._.yk...a1l
#     0040: A7 9A 58 B8 36 84 11 5E   B4 7D 20 8A BF 3C DD 54  ..X.6..^.. ..<.T
#     0050: 29 61 9C A0 75 2E B7 82   6B 19 E0 B7 42 8A FF 2B  )a..u...k...B..+
#     0060: C2 FB B9 72 7B 3F 3E DA   B4 07 A9 1A A2 3D AA 23  ...r.?>......=.#
#     0070: A1 DB FD A3 2D DC 50 3E   CE A8 06 10 28 7A 71 8F  ....-.P>....(zq.
#     0080: 40 F6 D3 9E CA 0C D8 E6   B8 A5 C2 D4 B4 E0 49 77  @.............Iw
#     0090: AA 7D 7E 9A 04 CE 31 09   83 8F ED 4F 71 8E DC AE  ......1....Oq...
#     00A0: 5B 1B 85 5B EC 22 23 50   35 1B BB 4D 6D 72 95 14  [..[."#P5..Mmr..
#     00B0: 87 C5 A3 7F 11 A0 E6 EF   DF 5F A6 7E 12 8A 60 9D  ........._....`.
#     00C0: 13 1E 59 BF C9 85 D3 46   74 08 12 80 91 E9 5D 20  ..Y....Ft.....]
#     00D0: 44 FC DA 64 0C 46 94 C3   93 9F 22 6A 5A A2 8E CD  D..d.F...."jZ...
#     00E0: FB 23 8B 2F 26 79 40 18   9A 72 C4 C8 97 E7 A6 3F  .#./&y@..r.....?
#     00F0: D9 89 6A D9 88 D8 B4 29   2C 97 77 67 4E C5 71 62  ..j....),.wgN.qb
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.865 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5F EC F9 5D 9B 87 24 AA   86 55 73 DE BF 85 14 FC  _..]..$..Us.....
#     0010: 46 66 59 D8 74 0C F8 D2   BB FE C7 1B 04 0F C0 E8  FfY.t...........
#     0020: B9 46 29 D8 50 92 33 AB   1C CE 08 3D 12 D9 5C 19  .F).P.3....=..\.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.869 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:44.870 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.870 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:44.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 14:58:44.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:44.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.872 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.875 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 D5 B4 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:17.000 UTC",
#       "not  after"         : "2024-01-08 14:58:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F0 96 E9 59 BF B8 4C 21   DC 69 12 9B D0 00 42 20  ...Y..L!.i....B
#           0010: B3 64 DB 67                                        .d.g
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 94 9F 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:10.000 UTC",
#       "not  after"         : "2024-01-08 14:58:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#           0010: 99 9E 82 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.918 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 D1 5B 6C 9E 6A D4 F9   2F 49 D5 F5 3A CF 85 2D  ..[l.j../I..:..-
#     0010: 41 B4 B9 55 F3 3B 34 66   D5 D7 9C 86 F1 B4 9C E9  A..U.;4f........
#     0020: B8 50 DC 67 05 7C 77 44   AB 2A F9 92 F0 1B C3 BB  .P.g..wD.*......
#     0030: CC BB D9 45 9D 07 FD 78   3A CB 6C CC 52 68 85 22  ...E...x:.l.Rh."
#     0040: E3 AE 22 12 00 DE A4 77   22 72 8B F8 EC FC FA C1  .."....w"r......
#     0050: AE DA 19 CC 88 07 95 25   51 11 B0 C4 09 22 9B 3B  .......%Q....".;
#     0060: 43 F4 02 E3 C3 16 FF 22   5A 77 2B 48 2A B9 6B 85  C......"Zw+H*.k.
#     0070: 69 61 B6 BB D0 2B 5D 7C   0B 6E 9A 1A 7B DC 07 F0  ia...+]..n......
#     0080: EA EF B5 8A 4A 30 A1 B6   0C 99 C5 00 BA C2 E8 2A  ....J0.........*
#     0090: 5F 83 AB CF C4 75 29 F2   68 95 EC B9 7F C1 73 D8  _....u).h.....s.
#     00A0: A3 C2 93 95 06 E6 13 15   F2 94 0F 9B 45 9C 40 1E  ............E.@.
#     00B0: CA 38 7A AB E9 E7 1F 87   C9 F2 65 8B 1D 88 C4 C3  .8z.......e.....
#     00C0: 2E 65 9C FC F1 82 C6 F1   39 2B 65 CF 5C C0 03 87  .e......9+e.\...
#     00D0: 82 16 04 2E A7 57 7F 9C   94 46 B8 B2 12 45 28 74  .....W...F...E(t
#     00E0: 8D C7 33 8E E2 C6 37 19   6E 7C 42 1A A0 D0 4C 90  ..3...7.n.B...L.
#     00F0: B9 7F 3A 3E B5 52 A3 57   54 FA 29 3A A1 F1 1E 25  ..:>.R.WT.):...%
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.919 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CB A3 F6 4E 21 47 65 68   31 D8 21 3A 4A 14 54 B4  ...N!Geh1.!:J.T.
#     0010: B8 21 11 93 0C E4 FA B3   46 98 9F 10 89 57 2B 69  .!......F....W+i
#     0020: 8B F5 10 4D 53 5C A2 25   2C F3 DE 46 F8 BE AA 32  ...MS\.%,..F...2
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.920 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:44.969 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B9 FF BA 93 FC E1 E3 2F 31 EE 3E A1 32 08 DD 37 9E 74 21 99 09 45 DE 43 24 69 5D 93 B1 78 66 33",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 14:58:45.243 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 14:58:45.244 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 14:58:56.695; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:57.029 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 94 9F 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:10.000 UTC",
#       "not  after"         : "2024-01-08 14:58:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#           0010: 99 9E 82 57                                        ...W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FA A0 51 46 04 A6 44 C9   1F E9 8F 05 F5 F9 84 43  ..QF..D........C
#           0010: 91 48 FD DE                                        .H..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A E5 1A 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 14:58:08.000 UTC",
#       "not  after"         : "2024-01-08 14:58:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 06 A7 8A AA 83 B8 3B 08   32 2D 25 DF 18 F8 94 BE  ......;.2-%.....
#           0010: 99 9E 82 57                                        ...W
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 14:58:57.046 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:57.205 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:57.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:57.206 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 14:58:57.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:57.293 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.293 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:57.296 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 14:58:57.296 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.303 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.320 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.320 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 14:58:57.323 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "27 B0 FA 52 EA 7C 7E F1 A6 68 28 3D E5 2C A4 92 8C 02 1E 9A 31 B9 DC 50 94 2D D3 74 9A 3F 60 A0",
#     "session id"          : "3C 94 6D 91 76 CE AF E3 99 3B EB 55 4A 7F 3B BE B6 BD 35 87 35 B7 82 74 2B F2 C8 2D 6D 79 5F 89",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2F FA A8 35 AB 9F F4 99   A1 C5 CC FA 94 B1 FE CC  /..5............
#               0010: 40 CD 61 10 6A 19 41 8C   61 C6 41 0F EA 64 DD 14  @.a.j.A.a.A..d..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.344 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "23 AD 2F 28 7B 0A 40 BA C2 42 9C F9 1F 0E 6C E2 2F 80 EC 3A 9B A1 F0 92 DE 35 C2 D2 52 B8 EE 69",
#     "session id"          : "3C 94 6D 91 76 CE AF E3 99 3B EB 55 4A 7F 3B BE B6 BD 35 87 35 B7 82 74 2B F2 C8 2D 6D 79 5F 89",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 8F 25 7F C2 27 8A B9   9E 48 35 90 0F 48 6E 74  ..%..'...H5..Hnt
#             0010: A7 D4 90 BB BD D8 16 94   16 6E 1F A3 B4 60 60 27  .........n...``'
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.344 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.347 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.347 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.349 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.349 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.349 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:57.351 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:57.351 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.360 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.362 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.363 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.372 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.372 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 14:58:57.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 14:58:57.375 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sche

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 15:00:23.108 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 15:00:23.164 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 15:00:23.164 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 15:00:23.164 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 15:00:23.165 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33914/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28521ms
ok 65 stop command for single port in 31501ms
ok 66 status detects locally running solr in 14704ms
ok 67 status does not expose cli parameters to end user in 228ms
ok 68 listing out files in 2260ms
ok 69 copying files around in 6831ms
ok 70 upconfig in 2846ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1273ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1289ms
ok 73 Cleanup in 1248ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 23m 18s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m48.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5636 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5636/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38785/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 12:39:50.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 12:39:50.155; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 12:39:51.443; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 12:39:51.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22931ms
ok 61 start solr with client truststore and security manager in 25732ms
not ok 62 start solr with mTLS needed in 59280ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PNTc8O/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38785.
#
# Started Solr server on port 38785 (pid=198696). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38786.
#
# Started Solr server on port 38786 (pid=199128). Happy searching!
#
# INFO  - 2023-10-10 12:41:15.517; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 12:41:15.523; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 12:41:15.902; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 12:41:15.905; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 12:41:15.906; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:15.938 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 95 24 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:51.000 UTC",
#     "not  after"         : "2024-01-08 12:40:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D7 4F D4 6D 9D FC 41   7F B5 E6 37 30 A2 B6 BA  ..O.m..A...70...
#         0010: F8 CB 37 B1                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:15.943 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 EE 0B 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:43.000 UTC",
#     "not  after"         : "2024-01-08 12:40:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:15.957 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:16.200 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.200 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:16.202 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:16.202 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.208 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.220 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.221 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.221 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:16.223 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EC 41 C9 D3 8B 2D CB FD 2E 22 50 AE E0 A0 26 1B AE 0C B3 F4 87 65 3F CB FF 6F 6A 5C C7 DB 66 2D",
#   "session id"          : "19 85 E9 42 2F B4 D5 09 96 24 16 19 4A 63 6B 7A C6 E0 AD EA 1F F1 44 2E 11 C3 A4 34 1E 0D 86 48",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 A5 75 1D 7B 8B 9F 8E   D8 7F CD 51 BC C6 67 A9  ..u........Q..g.
#             0010: 01 B8 94 7F 1D EE 45 3E   4A 86 DB 68 FE 8C 0C 29  ......E>J..h...)
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.340 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3E D0 BB 3F 47 32 E0 3F A7 A1 9C 92 04 85 E2 75 42 8A 41 8B 38 4F 81 E7 E1 35 E4 D1 63 3E 05 65",
#   "session id"          : "19 85 E9 42 2F B4 D5 09 96 24 16 19 4A 63 6B 7A C6 E0 AD EA 1F F1 44 2E 11 C3 A4 34 1E 0D 86 48",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9E BA 0B F2 0A AC 29 07   2B AD 0A A5 E3 F6 8E A2  ......).+.......
#           0010: 7F CF 79 38 83 B3 A1 51   E9 CB 9A AD 88 A6 05 5B  ..y8...Q.......[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.341 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.341 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.342 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.343 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.343 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.343 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.345 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.345 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.345 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.347 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.354 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.356 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.357 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.361 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.361 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.361 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.362 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.364 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.364 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.364 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.365 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.365 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.366 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.366 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.369 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 93 B8 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:47.000 UTC",
#       "not  after"         : "2024-01-08 12:40:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A8 C9 9C 00 89 16 9F   CC 59 FD 90 29 1A A7 53  B........Y..)..S
#           0010: 1F FA 93 3F                                        ...?
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.370 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:16.415 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:16.416 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:16.416 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:16.416 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.451 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.454 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 53 A8 A5 B6 2A B4 89   FC D1 FC 6B 94 F1 23 1B  .S...*.....k..#.
#     0010: 43 BD 32 BB 09 7F A3 1F   E3 9D B4 90 05 7F 5A 36  C.2...........Z6
#     0020: 6A E9 8F 7F 0F 72 99 6C   F5 2C F7 93 71 8E CD F9  j....r.l.,..q...
#     0030: BF 6D D9 00 AC 54 F1 8C   29 ED 65 9B 8A 8B B8 BB  .m...T..).e.....
#     0040: 1E D1 DB 48 3A 91 DC B5   58 B5 1D E3 C9 5A 07 98  ...H:...X....Z..
#     0050: 6A 89 4C 4E 99 18 0B 04   49 CF 1C D5 1C 9E DD 60  j.LN....I......`
#     0060: DA C6 B6 4A 4D 53 30 1E   BC 5F 3B C9 E2 25 8C E4  ...JMS0.._;..%..
#     0070: 8C B3 BE 40 44 34 79 81   D5 1A 94 93 B6 B3 4C 4C  ...@D4y.......LL
#     0080: 1E 2B 56 A5 5E FC 00 4E   BD 1A 01 68 87 34 29 02  .+V.^..N...h.4).
#     0090: B6 71 67 18 27 38 91 4F   5A B1 50 42 70 02 1A 3E  .qg.'8.OZ.PBp..>
#     00A0: F4 37 87 DE 66 EE 9A 1D   B2 90 E1 D3 63 1D 90 5F  .7..f.......c.._
#     00B0: A8 B7 B2 84 9D 7A A8 CD   7C 69 AB AF E0 DE 70 BE  .....z...i....p.
#     00C0: EC 1C D8 1F 1D B5 B4 39   A3 F0 86 42 65 0D 16 E6  .......9...Be...
#     00D0: 3E C7 E9 96 08 D6 08 01   DC 75 C9 DD 29 77 25 A7  >........u..)w%.
#     00E0: 8E 33 E9 51 E9 7E 31 73   ED D2 B5 51 FF 61 74 89  .3.Q..1s...Q.at.
#     00F0: DA 5B 34 5D 26 83 FB 71   44 E9 DE FD C3 01 A8 6A  .[4]&..qD......j
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.456 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 DA 51 1D 82 F6 87 45   83 04 97 70 CD 9B A8 A9   .Q....E...p....
#     0010: 18 32 6A 8C 25 43 62 2E   A3 8A 58 6B A6 99 0D 33  .2j.%Cb...Xk...3
#     0020: A0 CA 13 76 44 62 8A E8   F8 72 CF 83 AA BF 0E 8C  ...vDb...r......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.459 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:16.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.460 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:16.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.460 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:16.461 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:16.461 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.461 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.464 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 95 24 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:51.000 UTC",
#       "not  after"         : "2024-01-08 12:40:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 D7 4F D4 6D 9D FC 41   7F B5 E6 37 30 A2 B6 BA  ..O.m..A...70...
#           0010: F8 CB 37 B1                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 BE 78 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:45.000 UTC",
#       "not  after"         : "2024-01-08 12:40:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#           0010: 9C 85 3D F4                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.491 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 94 04 D1 E0 66 FF DC   9B 5F 94 05 7F B2 52 D7  .....f..._....R.
#     0010: F1 14 10 42 78 C1 21 A9   C0 C7 B7 04 DF 06 AD 6F  ...Bx.!........o
#     0020: 81 B9 BC 57 FB 2F 74 8C   96 16 3E CE 8E 08 FB 2A  ...W./t...>....*
#     0030: 93 96 28 54 E7 38 D4 20   23 61 79 98 76 D1 4F 65  ..(T.8. #ay.v.Oe
#     0040: 4B CD 60 32 C7 31 B9 C5   31 15 67 EC 37 45 8C 91  K.`2.1..1.g.7E..
#     0050: 47 2E 72 14 4B B4 23 63   D8 E4 D7 51 9B B1 5F 21  G.r.K.#c...Q.._!
#     0060: 86 D4 55 AB 50 DE 1D 5E   FC 9F 85 83 9A 3D 1B 49  ..U.P..^.....=.I
#     0070: 41 0E 4D 51 BF 00 65 1E   23 1B C1 56 1E 6E 43 6F  A.MQ..e.#..V.nCo
#     0080: 72 8F 8F CE 28 4F 72 0D   88 80 24 C6 A3 29 FB 2A  r...(Or...$..).*
#     0090: 7D 5A 22 5F CE 13 02 76   CA F3 91 34 92 4A FC 9E  .Z"_...v...4.J..
#     00A0: B4 14 C9 8C 81 1F F3 18   01 EA F2 1D DA 97 AC 4B  ...............K
#     00B0: E4 59 21 29 3C A1 3F C5   C1 41 F6 69 5B 57 95 7C  .Y!)<.?..A.i[W..
#     00C0: 1F 9B 12 D0 AB D0 2D DA   32 9A 18 18 F8 34 77 82  ......-.2....4w.
#     00D0: 0F 36 7B 72 F2 93 B5 30   AA 6A 26 86 EA CC 9B 60  .6.r...0.j&....`
#     00E0: 37 3F 83 53 D9 52 87 3F   52 CB C3 38 D4 4D 92 9D  7?.S.R.?R..8.M..
#     00F0: B7 3B 02 67 5F 3E C1 03   D7 AC 21 1E 53 A0 3A 14  .;.g_>....!.S.:.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.492 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 49 B4 BD 5D 91 68 8B 5E   D9 36 A0 EC 68 42 D6 87  I..].h.^.6..hB..
#     0010: B7 B4 08 D5 B8 C4 D7 A7   29 65 69 F8 2D B6 B3 8D  ........)ei.-...
#     0020: 61 4E 67 9D 57 F9 96 72   F5 AB 18 31 72 D5 87 95  aNg.W..r...1r...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.493 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:16.544 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4C 13 5D 38 73 37 91 8C BF 19 25 F0 26 C1 53 8B 82 7A 70 4B 35 CD 64 98 A2 88 40 8F 5C 2E EB A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 12:41:16.836 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 12:41:16.837 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 12:41:17.800; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 12:41:17.806; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 12:41:18.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 12:41:18.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 12:41:18.180; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PNTc8O/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:18.212 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 95 24 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:51.000 UTC",
#     "not  after"         : "2024-01-08 12:40:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 D7 4F D4 6D 9D FC 41   7F B5 E6 37 30 A2 B6 BA  ..O.m..A...70...
#         0010: F8 CB 37 B1                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:18.216 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 EE 0B 13",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:43.000 UTC",
#     "not  after"         : "2024-01-08 12:40:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:18.231 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:18.469 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.469 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:18.471 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:18.472 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.477 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.489 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:18.492 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 E7 2B 06 DD 8A 23 C3 3B A6 46 09 0C 34 E3 0B F4 19 9F 7B E5 63 1D 55 1F 13 00 32 07 50 2B C4",
#   "session id"          : "94 CF 1F 5F B2 DA A3 01 9C 98 67 8D AC FA A8 D2 36 47 C7 9C E5 28 7A 9B 52 C0 11 14 E4 75 3E 19",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C2 74 A0 40 8F D7 C5 09   19 58 A3 64 1B 55 DE 98  .t.@.....X.d.U..
#             0010: 3B 0E 77 E4 BF 2F F6 17   D0 75 FE 91 24 BD DB 14  ;.w../...u..$...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.599 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "63 B5 66 45 AC 2E C6 C5 D8 70 F6 98 C2 FF 0C 75 EE A2 2F 7F B6 F9 57 A4 98 DE EA F9 F2 09 39 EC",
#   "session id"          : "94 CF 1F 5F B2 DA A3 01 9C 98 67 8D AC FA A8 D2 36 47 C7 9C E5 28 7A 9B 52 C0 11 14 E4 75 3E 19",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E7 9C BD 05 30 27 FB 5B   08 04 FE 14 EB E2 2A 7F  ....0'.[......*.
#           0010: F6 90 6C F0 AD DD 3D 49   A5 80 50 22 43 D8 29 66  ..l...=I..P"C.)f
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.599 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.599 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.602 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.603 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.604 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.606 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.613 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.614 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.615 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.619 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.619 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.619 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.622 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.622 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.622 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.622 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.623 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.624 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.627 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 93 B8 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:47.000 UTC",
#       "not  after"         : "2024-01-08 12:40:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 A8 C9 9C 00 89 16 9F   CC 59 FD 90 29 1A A7 53  B........Y..)..S
#           0010: 1F FA 93 3F                                        ...?
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.627 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:18.681 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:18.682 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:18.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:41:18.683 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.720 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 BE 78 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 12:40:45.000 UTC",
#     "not  after"         : "2024-01-08 12:40:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#         0010: 9C 85 3D F4                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#         0010: EB AD 42 E6                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.724 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 76 6E 9D E7 46 8A 26   BF D6 34 4C 5B 06 1B 05  .vn..F.&..4L[...
#     0010: 51 97 09 82 80 BC DE D5   95 36 A1 09 9F AD B1 D0  Q........6......
#     0020: F5 35 B9 27 17 D9 64 0E   F8 BE A0 94 60 A8 F0 9B  .5.'..d.....`...
#     0030: 9F 78 52 C4 AF FB 00 88   BD 8D 46 77 87 5B 60 C6  .xR.......Fw.[`.
#     0040: BA AB C2 DA DA 6F F1 84   D2 C7 6F B8 C6 F9 50 FD  .....o....o...P.
#     0050: E2 ED 70 EB 1F EE EF 64   07 76 A8 5C 63 9A A5 02  ..p....d.v.\c...
#     0060: B3 53 60 B6 EC 30 D8 82   0F 9E CB A7 4F F4 C6 93  .S`..0......O...
#     0070: F5 0F 9D 01 6F 96 28 84   69 D6 91 5B A0 A8 58 49  ....o.(.i..[..XI
#     0080: CF 2B 76 0B 43 BD 80 33   C6 49 14 A3 18 CE 22 8C  .+v.C..3.I....".
#     0090: 24 4D C6 63 CF 5D E5 6B   56 9C 98 13 0F 99 C4 C2  $M.c.].kV.......
#     00A0: AA 10 6D 9C 53 A3 02 12   15 90 33 11 BC A1 D9 EB  ..m.S.....3.....
#     00B0: DF CC 29 56 1D 00 A7 F3   32 54 46 E4 83 48 27 3F  ..)V....2TF..H'?
#     00C0: 58 C6 C7 D4 58 30 16 91   DE 03 32 48 4E D5 85 54  X...X0....2HN..T
#     00D0: 3B E7 70 CE 79 C9 2B DA   B0 D4 FB D0 F7 49 56 04  ;.p.y.+......IV.
#     00E0: 5F 7C FD E4 C6 51 F9 F2   A5 28 DC 46 FF 84 49 7B  _....Q...(.F..I.
#     00F0: 1E 44 7C BF D7 DC 2E 56   EE F1 3F 58 40 EA C7 5A  .D.....V..?X@..Z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.726 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 66 2E A5 6D 99 64 79   79 4D 6B 91 91 88 6A 5E  .f..m.dyyMk...j^
#     0010: EE 50 CD AD 85 7C F0 89   71 B0 E3 A9 88 70 C5 D1  .P......q....p..
#     0020: FC E8 D5 D1 D8 C9 6E CE   F9 EA 3B B0 6F 44 00 40  ......n...;.oD.@
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.728 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:18.729 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.729 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:18.729 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.730 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 12:41:18.730 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:18.730 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.731 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.733 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 95 24 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:51.000 UTC",
#       "not  after"         : "2024-01-08 12:40:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 D7 4F D4 6D 9D FC 41   7F B5 E6 37 30 A2 B6 BA  ..O.m..A...70...
#           0010: F8 CB 37 B1                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 BE 78 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:45.000 UTC",
#       "not  after"         : "2024-01-08 12:40:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#           0010: 9C 85 3D F4                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.760 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D F0 0B A2 8E B1 CD CC   5F 68 17 54 3B 6A F0 1B  ........_h.T;j..
#     0010: 94 00 8B 24 46 0A BE 3E   3C 60 48 18 50 1F 18 A6  ...$F..><`H.P...
#     0020: AC F4 3E BF 56 FE 48 52   BD 59 BB 53 04 38 5D 7D  ..>.V.HR.Y.S.8].
#     0030: 84 AA 0E DC 4B 70 B3 49   99 95 5E 37 C1 32 F7 70  ....Kp.I..^7.2.p
#     0040: 51 5C F3 43 70 08 19 2A   A8 B4 AB CD E3 67 7C 2E  Q\.Cp..*.....g..
#     0050: 5A B9 33 1B C5 CE A3 0E   1A F4 36 23 E3 F0 28 D2  Z.3.......6#..(.
#     0060: 15 33 DB 0C 7F 63 F3 E6   53 B8 75 0F F2 87 03 C9  .3...c..S.u.....
#     0070: 5C 70 5A 61 34 24 27 6F   96 84 F2 05 13 46 90 E7  \pZa4$'o.....F..
#     0080: EA 7A 73 80 B8 06 84 B4   E6 EA 27 23 2F E5 31 EB  .zs.......'#/.1.
#     0090: F5 88 D0 47 DB 55 E6 AE   0A EE DD 4B C4 E5 BA F8  ...G.U.....K....
#     00A0: B7 1F D0 57 02 FE 7A 3C   03 E8 16 7F 00 77 75 D3  ...W..z<.....wu.
#     00B0: 7C 19 CE 5B F2 67 76 80   11 7C 4A 03 0E 8F D6 1C  ...[.gv...J.....
#     00C0: CA 79 E7 18 2D C3 68 EB   45 C0 7E 6D 77 2A EE FD  .y..-.h.E..mw*..
#     00D0: B8 65 4F 7F 04 21 70 F2   88 61 6D 57 53 06 B8 D8  .eO..!p..amWS...
#     00E0: 00 12 F5 B2 CD 12 0C 9A   8D B7 E9 02 FB 5B A8 D7  .............[..
#     00F0: FB 72 5C 1C 91 58 3D 4A   90 F6 0B 85 B7 C1 25 71  .r\..X=J......%q
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.761 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 26 EF 52 5D 12 9A F5   EB 79 C1 97 59 17 FB 9C  .&.R]....y..Y...
#     0010: 14 65 C1 A9 2D 2A 11 FC   72 93 53 92 68 04 B9 3F  .e..-*..r.S.h..?
#     0020: E7 58 EC 06 AE B9 4C BE   DD 5D A5 F2 73 3A E4 D9  .X....L..]..s:..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.761 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:18.810 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "15 3A 9E EC 75 12 0F 85 26 50 4B FF 39 F2 BA 4B C3 2D 77 EC 64 DF AC 20 5B EA 39 8D C8 E0 86 64",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 12:41:19.125 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 12:41:19.126 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 12:41:30.562; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:30.888 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 EE 0B 13",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:43.000 UTC",
#       "not  after"         : "2024-01-08 12:40:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#           0010: 9C 85 3D F4                                        ..=.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 BE 78 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 12:40:45.000 UTC",
#       "not  after"         : "2024-01-08 12:40:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BB 3D 2D 60 CD C0 56 5F   F9 E7 AD 13 F9 EF 59 56  .=-`..V_......YV
#           0010: 9C 85 3D F4                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F 49 22 42 FC AD E8 E7   38 D1 48 96 1C 3C 6F 45  _I"B....8.H..<oE
#           0010: EB AD 42 E6                                        ..B.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 12:41:30.904 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:31.142 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.142 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:31.144 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 12:41:31.144 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.162 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.162 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.162 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 12:41:31.165 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "9D CE 3C 18 D8 13 49 14 C8 78 AD 16 4A C1 8D 0A 02 B3 42 10 16 AD B3 23 AB B9 7F C9 ED 8D FA 9C",
#     "session id"          : "50 9E EF 10 D5 47 57 4C 2C 57 83 19 3F 12 F0 0B 91 C6 A2 A1 11 DA 2A BA A3 EF 3E D8 BE 51 B3 3E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C0 43 C0 24 91 CD 4B D3   4C FC 5F F7 B3 CF AE 04  .C.$..K.L._.....
#               0010: CD 3B 18 35 49 E3 D0 20   EE 48 1D D0 31 16 96 29  .;.5I.. .H..1..)
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.186 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F1 2F B5 54 9F D7 5D BA 39 98 FB BD A3 F0 41 B6 C0 EB 9D 4D CF EA 78 55 2D E6 EC 01 5E 07 1D 70",
#     "session id"          : "50 9E EF 10 D5 47 57 4C 2C 57 83 19 3F 12 F0 0B 91 C6 A2 A1 11 DA 2A BA A3 EF 3E D8 BE 51 B3 3E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 30 91 A3 18 DA CE A6 2B   95 83 69 91 C2 42 7F 33  0......+..i..B.3
#             0010: 2B CA 7F A4 87 90 C8 12   1F 2C 6E 9F 5D 1B 33 5E  +........,n.].3^
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.187 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.187 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.189 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.191 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.191 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:31.193 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:31.193 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.200 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.202 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.203 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.207 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.207 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.207 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:41:31.208 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 12:41:31.209 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 12:42:52.478 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:42:52.520 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:42:52.520 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:42:52.520 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 12:42:52.520 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38786/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28247ms
ok 65 stop command for single port in 31348ms
ok 66 status detects locally running solr in 14443ms
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2217ms
ok 69 copying files around in 6701ms
ok 70 upconfig in 2687ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 40s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m8s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5635 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5635/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33587/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 10:34:55.513; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 10:34:55.518; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 10:34:56.755; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 10:34:56.799; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22388ms
ok 61 start solr with client truststore and security manager in 25152ms
not ok 62 start solr with mTLS needed in 58572ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-GJuBMR/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33587.
#
# Started Solr server on port 33587 (pid=196099). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33588.
#
# Started Solr server on port 33588 (pid=196536). Happy searching!
#
# INFO  - 2023-10-10 10:36:19.300; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 10:36:19.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 10:36:19.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 10:36:19.677; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 10:36:19.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:19.710 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 9A 17 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:55.000 UTC",
#     "not  after"         : "2024-01-08 10:35:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 01 75 38 75 1D 1A F5   5F 44 04 66 51 46 4F B0  ..u8u..._D.fQFO.
#         0010: CA CF 59 33                                        ..Y3
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:19.714 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 3F CE 5F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:47.000 UTC",
#     "not  after"         : "2024-01-08 10:35:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:19.729 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:19.823 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:19.824 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:19.825 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:19.825 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:19.961 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:19.963 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:19.963 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.980 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.980 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.980 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:19.982 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 98 4B 40 8F 1F 9C 6C 1D 78 93 D1 D9 9D 99 8B 4A AC CB 50 F3 31 BD 63 5C AD 1D 08 30 3B 8E E4",
#   "session id"          : "03 E7 E8 A4 CC 79 CB B7 58 B2 50 82 7C 56 0B E7 99 64 4E 50 9D ED 9F E5 84 D5 9D E1 3E C3 BA 2F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 62 9B 4A A6 72 AB D6 3D   39 CA 72 49 1B 33 C2 BA  b.J.r..=9.rI.3..
#             0010: 98 CC 09 21 C1 9D 2F 3B   1F 4A 69 53 C3 AF 5C 4F  ...!../;.JiS..\O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.097 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3F BC 66 41 F2 F8 91 02 76 99 4D E0 49 5F 8C 0C 9F F6 EE CB 07 F9 DA 40 7D 6A B6 A3 E6 BA AB BF",
#   "session id"          : "03 E7 E8 A4 CC 79 CB B7 58 B2 50 82 7C 56 0B E7 99 64 4E 50 9D ED 9F E5 84 D5 9D E1 3E C3 BA 2F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E7 13 74 D6 4F 08 B8 A3   77 FF 43 F3 AB D1 78 16  ..t.O...w.C...x.
#           0010: B9 2B 23 6F 66 1E EF 3F   65 82 1B C7 40 89 70 01  .+#of..?e...@.p.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.098 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.098 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.099 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.100 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.101 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.102 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.102 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.104 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.111 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.112 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.113 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.117 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.118 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.120 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.121 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.121 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.122 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.125 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 A5 25 C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:51.000 UTC",
#       "not  after"         : "2024-01-08 10:35:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D F7 09 F0 48 31 C5 B6   46 5E F2 F7 FD 12 6F 84  ....H1..F^....o.
#           0010: AC EF 72 FA                                        ..r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.125 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.220 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.223 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AF D0 4A DA 48 2F BA 2E   EF 18 C4 6D 33 4D 53 E8  ..J.H/.....m3MS.
#     0010: 7A D8 62 37 1E BA F1 D1   7B 7D 94 1D AD 6E 47 08  z.b7.........nG.
#     0020: 7B 13 1E 8A 0C 2E 66 FA   A7 EE A2 22 D0 73 F5 B2  ......f....".s..
#     0030: 27 CD EB 34 CD 0A DE 3E   25 19 DC 03 39 46 1B B9  '..4...>%...9F..
#     0040: 35 4B 1E 0C 35 AE 62 2E   02 2B 73 5F AD 4A 42 B9  5K..5.b..+s_.JB.
#     0050: E9 16 0C CA 1F D4 87 91   B2 91 5C 1B D6 13 F5 EC  ..........\.....
#     0060: 2D C4 5E 40 A9 DA 13 81   E4 F5 30 99 8E B2 94 9D  -.^@......0.....
#     0070: 49 D6 D3 E3 94 90 9C 74   38 4D 48 D2 C4 3E 9F 12  I......t8MH..>..
#     0080: 0B 1C E3 82 A5 76 B1 FF   F9 40 DC 32 27 09 9C C5  .....v...@.2'...
#     0090: FA B6 09 E2 58 F0 47 15   56 AE 26 0C 0B 36 1D 55  ....X.G.V.&..6.U
#     00A0: 64 5C 8B 17 55 CA BA 9A   30 88 40 7B 70 9B EA C1  d\..U...0.@.p...
#     00B0: 47 6B A4 8D 0C AB 8C F3   4A 3E FF C5 FE C9 67 83  Gk......J>....g.
#     00C0: 37 C3 FA AF 39 4F F6 9A   B5 76 0A 2F 21 5D D4 AD  7...9O...v./!]..
#     00D0: 01 4C D1 20 1C 1B B5 F1   A6 AE 5D 20 12 E1 80 AB  .L. ......] ....
#     00E0: A5 CA D3 7D 73 3C FB FE   8C 7C 0E 62 B1 DF 44 20  ....s<.....b..D
#     00F0: 91 30 DF 0D 69 57 96 FD   7F B2 D2 AE CB BF 97 05  .0..iW..........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.225 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 25 33 8D 68 FF 02 D1 D7   62 39 EA 39 50 11 4A C4  %3.h....b9.9P.J.
#     0010: 0D CF 3C 59 53 45 F1 C5   8B E2 5C 36 84 A0 39 4E  ..<YSE....\6..9N
#     0020: 0B 6B 8C A5 61 83 DD 68   41 FC 72 1C 9F E6 C2 B4  .k..a..hA.r.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.227 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:20.228 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.229 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:20.229 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.229 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:20.229 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:20.229 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.230 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.232 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 9A 17 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:55.000 UTC",
#       "not  after"         : "2024-01-08 10:35:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 01 75 38 75 1D 1A F5   5F 44 04 66 51 46 4F B0  ..u8u..._D.fQFO.
#           0010: CA CF 59 33                                        ..Y3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 32 96 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:49.000 UTC",
#       "not  after"         : "2024-01-08 10:35:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#           0010: C5 39 34 9D                                        .94.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.257 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 9E 56 C3 7E D5 BD 0C   0C 12 AD 87 19 AD 2D 3B  ^.V...........-;
#     0010: F7 DF 41 E0 77 50 71 64   67 C6 C5 52 0A 1E A8 DC  ..A.wPqdg..R....
#     0020: 35 A1 E4 8E F4 F7 26 E2   48 30 CD A7 9F A4 7C FF  5.....&.H0......
#     0030: 8C 4C 16 CB 47 B4 BF 76   3D B1 9C 8E 5B FA F7 15  .L..G..v=...[...
#     0040: 10 10 B3 59 18 6D 7A B7   22 80 58 44 9F 3D E0 49  ...Y.mz.".XD.=.I
#     0050: 7C F7 5A 63 D8 6E 3A 53   33 75 66 E9 1C 36 34 DF  ..Zc.n:S3uf..64.
#     0060: 68 8A 0C 1D D1 02 48 E8   99 A3 13 55 00 95 E1 AF  h.....H....U....
#     0070: F3 C2 D7 90 6A 72 8A F7   54 23 80 D2 6B 56 F4 35  ....jr..T#..kV.5
#     0080: F7 2B CF FE 39 A2 87 B3   EE 0D D3 D8 74 AE 38 34  .+..9.......t.84
#     0090: 12 BD DB 4D ED 22 99 37   CC 1E 06 7A 34 A5 75 4A  ...M.".7...z4.uJ
#     00A0: 5F 68 D1 78 4E 00 AD DC   5B 46 FB 7B 8F E4 E8 4A  _h.xN...[F.....J
#     00B0: 6B DD 2D 0A 01 AE 1B B1   46 0D 2C 5B 4A AD CC F3  k.-.....F.,[J...
#     00C0: FB EE AD 14 BB 17 90 9C   CE 35 2C 5E 5E F1 29 9D  .........5,^^.).
#     00D0: 54 BB 63 4F 2F 48 6C CE   38 EF FC B4 5F BF EE 56  T.cO/Hl.8..._..V
#     00E0: 6C 95 CD 38 5B 05 9E 66   19 2D 73 CA C2 E5 60 B2  l..8[..f.-s...`.
#     00F0: 4D 68 FA E8 DF A4 98 3B   CB 6C E7 C4 29 BE BD B0  Mh.....;.l..)...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.258 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 55 82 82 E6 05 96 73 FD   5F 78 41 99 39 2D F7 46  U.....s._xA.9-.F
#     0010: 15 79 21 10 B9 93 D9 BF   3C 41 1E 0F 57 B8 4C 28  .y!.....<A..W.L(
#     0020: B5 F0 01 30 DA DE 94 28   15 76 77 32 74 55 FA 83  ...0...(.vw2tU..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.259 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:20.307 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8E 74 79 26 AA BB 2E 23 1A 1F 0C DB 9B 35 42 F6 B9 2F 81 D9 A9 19 A6 24 91 16 BC 05 98 79 6E 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 10:36:20.687 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 10:36:20.688 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 10:36:21.649; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 10:36:21.654; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 10:36:22.039; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 10:36:22.042; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 10:36:22.043; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-GJuBMR/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:22.076 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 9A 17 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:55.000 UTC",
#     "not  after"         : "2024-01-08 10:35:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 01 75 38 75 1D 1A F5   5F 44 04 66 51 46 4F B0  ..u8u..._D.fQFO.
#         0010: CA CF 59 33                                        ..Y3
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:22.081 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 3F CE 5F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:47.000 UTC",
#     "not  after"         : "2024-01-08 10:35:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:22.096 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:22.433 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:22.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:22.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:36:22.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:22.586 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.586 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:22.588 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:22.589 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.596 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.608 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.608 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.608 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:22.611 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "68 BE B4 D4 48 77 51 6D 6E 3D DC CC 18 01 93 BC A2 29 04 3A B9 F2 40 85 04 0F 66 67 59 D4 95 2D",
#   "session id"          : "76 E8 E3 50 BC B0 69 3F A5 58 6F 93 13 C3 5F 40 3D A7 88 10 BD E2 6C A1 28 92 99 A5 39 08 BD A1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 22 80 64 6E 7F 6B AC D5   BE 63 21 C1 7E 04 EB C3  ".dn.k...c!.....
#             0010: 37 50 4A F2 6D F6 3A 96   4D 25 CD CF CE 7B DB 4A  7PJ.m.:.M%.....J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.715 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "46 44 7A 44 CA DA 83 5A 12 A5 06 03 06 44 31 15 6A 8B 24 13 98 F5 5D 68 03 C3 0C BE 26 60 14 F8",
#   "session id"          : "76 E8 E3 50 BC B0 69 3F A5 58 6F 93 13 C3 5F 40 3D A7 88 10 BD E2 6C A1 28 92 99 A5 39 08 BD A1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 33 71 56 95 A6 A7 7B BD   12 FA BC 6A 73 5D BE A4  3qV........js]..
#           0010: CE 40 6C BB 12 DA A7 CC   1B 98 BA 43 5E 9F 21 50  .@l........C^.!P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.716 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.716 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.717 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.721 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.722 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.723 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.732 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.733 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.735 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.739 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.739 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.740 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.742 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.742 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.743 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.743 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.744 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.745 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.746 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.749 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 A5 25 C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:51.000 UTC",
#       "not  after"         : "2024-01-08 10:35:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D F7 09 F0 48 31 C5 B6   46 5E F2 F7 FD 12 6F 84  ....H1..F^....o.
#           0010: AC EF 72 FA                                        ..r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.750 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.839 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 32 96 40",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 10:35:49.000 UTC",
#     "not  after"         : "2024-01-08 10:35:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#         0010: C5 39 34 9D                                        .94.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#         0010: A1 EE 4C 70                                        ..Lp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.843 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 98 E9 2E 02 26 6F E4 BD   FA E0 F8 83 44 EB 07 51  ....&o......D..Q
#     0010: E5 57 E1 18 E7 24 E9 D1   FC 0C D7 BB E6 31 8F C7  .W...$.......1..
#     0020: A2 D7 16 F8 51 B8 90 E2   74 A7 82 2B A1 D2 AC 08  ....Q...t..+....
#     0030: B3 B9 70 F6 0A 0A 6E 18   52 E9 06 5F 7B 12 50 76  ..p...n.R.._..Pv
#     0040: FE F0 7A 2E 24 AC A8 04   C5 FD 3C 1A F1 AC 32 D4  ..z.$.....<...2.
#     0050: A9 FE EF 3E 43 DA F1 51   4F 87 DF E4 F4 0E B6 4D  ...>C..QO......M
#     0060: FE 3A D7 8E B6 00 32 0F   ED A9 A3 11 4D BC C6 51  .:....2.....M..Q
#     0070: 8F B3 76 BA 91 43 44 C1   24 98 34 81 FD CB C4 DF  ..v..CD.$.4.....
#     0080: E5 98 E6 1B 91 52 AE D9   BB BB 14 84 12 AE DD 91  .....R..........
#     0090: E4 F8 41 F6 E1 94 A5 A4   58 0F E7 14 F5 EE 0C 59  ..A.....X......Y
#     00A0: 8E 2B 3C 06 BC 4B EC B0   35 54 60 2B 6A 97 8B E5  .+<..K..5T`+j...
#     00B0: B9 DC 44 67 A4 EB EA 8E   A0 AA 6B 25 63 28 71 22  ..Dg......k%c(q"
#     00C0: 96 AF 6A 81 63 7D FB 26   E0 F6 C8 C8 21 00 C9 9C  ..j.c..&....!...
#     00D0: F6 A1 91 50 5E 02 56 EF   5B A0 71 6C EF 75 C4 9C  ...P^.V.[.ql.u..
#     00E0: E7 C8 DB CA 02 AC A6 16   AC 8D 20 41 91 6D FF A9  .......... A.m..
#     00F0: C2 D1 3E 66 D2 14 DA 31   9F 8B D2 35 B4 0F 37 2C  ..>f...1...5..7,
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.845 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: ED 2C 77 7C B9 FF 38 B1   99 64 C3 DE 1C 3D C2 8F  .,w...8..d...=..
#     0010: 4F AC 61 F9 16 1C 55 00   59 39 B1 C1 BB 73 D2 3E  O.a...U.Y9...s.>
#     0020: 2E 37 A3 D0 98 EF 30 CA   BE C6 15 7D EE 4D 34 71  .7....0......M4q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.848 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:22.849 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.849 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:22.849 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.849 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 10:36:22.850 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:22.850 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.850 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.853 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 9A 17 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:55.000 UTC",
#       "not  after"         : "2024-01-08 10:35:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 01 75 38 75 1D 1A F5   5F 44 04 66 51 46 4F B0  ..u8u..._D.fQFO.
#           0010: CA CF 59 33                                        ..Y3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 32 96 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:49.000 UTC",
#       "not  after"         : "2024-01-08 10:35:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#           0010: C5 39 34 9D                                        .94.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.879 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 59 5B 85 85 CC 91 76 B1   01 92 06 70 01 86 64 DF  Y[....v....p..d.
#     0010: 07 28 03 40 1D 6A 46 5F   7B 3C 1B BA 7C 33 24 0A  .(.@.jF_.<...3$.
#     0020: 07 79 5F 10 E6 4D 41 43   1E D2 FC 42 75 F4 8D 2A  .y_..MAC...Bu..*
#     0030: 02 05 1B F6 18 FA BE E0   0B 27 17 B4 AD AC C6 10  .........'......
#     0040: 15 8F C5 65 61 E2 F6 49   1A 8F 75 FD 75 7B 55 BC  ...ea..I..u.u.U.
#     0050: F7 12 81 22 41 3A 7E 11   5B 85 FD 0C EC C1 76 E3  ..."A:..[.....v.
#     0060: C4 7E D1 B2 42 DD BF BA   DA 06 0F 39 EF 3D 9D 8E  ....B......9.=..
#     0070: 35 8B A1 A2 C0 1B BA 09   98 F6 7C F0 69 2A DC 2D  5...........i*.-
#     0080: 51 A5 99 FA D6 02 12 20   CA 0F 49 DE 25 C8 E3 B7  Q...... ..I.%...
#     0090: 5D 1B CC 57 02 2E 21 D4   57 22 AD 9D 8D DE ED 98  ]..W..!.W"......
#     00A0: 69 BF FF 82 0E 62 60 52   1F 29 CF 04 FF 37 30 1F  i....b`R.)...70.
#     00B0: C3 F1 20 3B F8 A9 2F 20   FD 2D 45 9A AC 94 BC 74  .. ;../ .-E....t
#     00C0: 1B 6D EC 23 78 FC BD 77   C2 B6 6A 6C FE F2 4F 84  .m.#x..w..jl..O.
#     00D0: 47 DC 19 30 7D 9C F4 E1   7C C0 A2 18 60 47 C1 EF  G..0........`G..
#     00E0: C6 EE 1E D6 05 65 AA 1E   AE 2F B7 6C 5D 95 BB F1  .....e.../.l]...
#     00F0: 23 D1 17 BF 20 D8 65 43   EA CF AE A1 7D 50 74 E8  #... .eC.....Pt.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.880 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 E1 CB 7B 9F 46 45 A8   AF 47 14 27 09 80 E6 E6  .....FE..G.'....
#     0010: 47 25 D8 0C 38 5D B5 CE   68 D6 AC 5E DD F9 E0 4D  G%..8]..h..^...M
#     0020: 05 CE 27 8D 15 BF 89 70   97 2E 74 22 8B 98 D0 E0  ..'....p..t"....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.880 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:22.936 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "59 5D F4 9C 3A CC 40 A5 A2 7A A9 E8 25 CA A2 64 64 85 69 8D 74 63 56 AC 2B AF 1D 75 06 DD 81 5F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 10:36:23.205 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 10:36:23.207 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 10:36:34.193; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:34.518 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 32 96 40",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:49.000 UTC",
#       "not  after"         : "2024-01-08 10:35:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#           0010: C5 39 34 9D                                        .94.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 8E 02 60 29 E2 E9 86   50 89 76 E5 66 BB C9 EC  ...`)...P.v.f...
#           0010: A1 EE 4C 70                                        ..Lp
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 3F CE 5F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 10:35:47.000 UTC",
#       "not  after"         : "2024-01-08 10:35:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 96 18 35 1C 9B DF A8 71   5F 54 82 5B E6 9D 92 0C  ..5....q_T.[....
#           0010: C5 39 34 9D                                        .94.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 10:36:34.533 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:34.765 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.765 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:34.767 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 10:36:34.767 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.772 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.784 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.784 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 10:36:34.786 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "09 94 72 DE 2C BD FE F2 FE A6 61 FB D2 88 2B D1 B3 F0 06 41 32 68 1F 57 3A C0 31 17 24 43 83 F1",
#     "session id"          : "24 29 B9 7D F9 0B 01 A1 C0 87 AE A6 A6 B7 CB 70 71 DA DE CB 99 FE F1 64 20 14 DE F8 38 12 1D 2D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 46 6C 08 8F 4B 3D 0D 1A   08 31 F9 40 13 C6 4D D9  Fl..K=...1.@..M.
#               0010: BE BB 87 77 55 47 61 2B   EA B4 7A 90 C9 99 AE 47  ...wUGa+..z....G
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.806 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "54 88 2D F6 E0 24 15 0E C9 AB 4C F7 5A 77 12 AC 5C D3 75 CC FB 91 A1 F1 13 47 E7 15 DF 2B 1C 04",
#     "session id"          : "24 29 B9 7D F9 0B 01 A1 C0 87 AE A6 A6 B7 CB 70 71 DA DE CB 99 FE F1 64 20 14 DE F8 38 12 1D 2D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F3 58 70 E8 E9 5F E0 BB   FB 1B 94 6A 2A 5F 76 60  .Xp.._.....j*_v`
#             0010: 46 3C 0C 4E 7E 7E B7 6B   BE 37 D9 17 BD 3F 72 1C  F<.N...k.7...?r.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.807 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.807 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.808 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.810 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.819 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.821 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.822 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:34.827 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:36:34.827 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 10:36:34.828 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 10:37:55.577 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:37:55.616 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:37:55.617 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:37:55.617 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 10:37:55.617 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33588/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28437ms
ok 65 stop command for single port in 30983ms
ok 66 status detects locally running solr in 14379ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2258ms
ok 69 copying files around in 6545ms
ok 70 upconfig in 2659ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 55s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m24s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5634 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5634/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45227/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 08:59:46.772; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:59:46.778; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 08:59:48.011; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 08:59:48.058; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23518ms
ok 61 start solr with client truststore and security manager in 25676ms
not ok 62 start solr with mTLS needed in 59545ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-9SeGRp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45227.
#
# Started Solr server on port 45227 (pid=200204). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45228.
#
# Started Solr server on port 45228 (pid=200660). Happy searching!
#
# INFO  - 2023-10-10 09:01:12.360; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 09:01:12.366; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 09:01:12.762; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 09:01:12.765; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 09:01:12.766; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:12.800 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 CD 2B DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:48.000 UTC",
#     "not  after"         : "2024-01-08 09:00:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 25 3B 8C 97 71 36 DE   D8 C4 43 B6 54 CB 04 91  .%;..q6...C.T...
#         0010: 8B AF F8 53                                        ...S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:12.804 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 03 80 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:40.000 UTC",
#     "not  after"         : "2024-01-08 09:00:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:12.820 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:13.156 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:13.158 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:13.158 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:13.158 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:13.314 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.314 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:13.316 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:13.316 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.336 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:13.339 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 C5 84 9E 5E 53 CF AD DF D9 3D CF 7E 6B 2C A9 0D F3 1D 6B 52 82 7C 14 94 D6 23 2C 69 92 90 18",
#   "session id"          : "C6 E6 6F 38 BE 57 37 78 4A 06 73 88 D8 8B 5D 89 E5 F1 CC 73 4E FE F1 20 9B 14 9F 5D 06 E1 A2 06",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A DC 59 04 E6 84 99 CF   D1 A1 FD 02 A7 DB F0 E7  Z.Y.............
#             0010: 3E 26 75 0E 9F 8B C2 B1   FA 9C 7B F8 D1 D8 30 67  >&u...........0g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.461 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 80 7C CB 55 94 26 7F 7E 67 82 DE E7 13 AC FC F4 9D B4 8D CE 99 2C 03 AB 71 29 51 11 34 6B 83",
#   "session id"          : "C6 E6 6F 38 BE 57 37 78 4A 06 73 88 D8 8B 5D 89 E5 F1 CC 73 4E FE F1 20 9B 14 9F 5D 06 E1 A2 06",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 52 1C 76 B4 13 FD 08 11   63 FE 1E BB C2 C1 96 DC  R.v.....c.......
#           0010: 0F 23 BE 5A C9 28 BC DC   15 45 A1 2A 81 52 DD 12  .#.Z.(...E.*.R..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.461 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.462 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.463 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.463 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.463 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.463 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.463 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.464 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.464 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.464 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.466 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.466 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.467 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.467 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.467 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.467 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.468 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.469 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.477 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.478 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.479 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.483 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.484 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.484 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.484 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.484 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.485 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.485 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.487 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.487 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.488 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.488 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.489 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.491 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.491 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.495 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 A6 80 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:44.000 UTC",
#       "not  after"         : "2024-01-08 09:00:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 B6 70 54 7E 4D DF BF   B8 C9 F2 F0 26 D3 38 AF  ..pT.M......&.8.
#           0010: 64 05 AF 2C                                        d..,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.495 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.600 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.604 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 CE 8C 48 14 2D 7A 0E   46 49 02 0B E4 B5 11 05  w..H.-z.FI......
#     0010: 65 C5 1F E5 A1 29 66 E1   79 79 4F 48 2B C2 72 4A  e....)f.yyOH+.rJ
#     0020: 49 0B AC ED A2 BD FD 9E   F8 69 CE CD DA E3 5E B6  I........i....^.
#     0030: 64 96 EE 43 65 C3 A8 D5   5D ED F9 F8 EF 0D EA E8  d..Ce...].......
#     0040: 67 87 F4 15 B0 D1 79 06   52 99 89 44 F0 43 AE 67  g.....y.R..D.C.g
#     0050: 13 35 17 33 58 9F 93 A0   31 87 56 A5 AA C0 7A 2D  .5.3X...1.V...z-
#     0060: 55 79 95 DC 37 B1 6C 2F   A0 3B E1 7C 6B 2C A8 06  Uy..7.l/.;..k,..
#     0070: EA EC 6B EF AF A6 DB 23   B7 D2 EE F0 93 9B C8 36  ..k....#.......6
#     0080: F8 31 BF E1 CB E8 79 A7   43 A6 D7 89 AD 50 BA B8  .1....y.C....P..
#     0090: E7 01 56 DF 51 E2 0E 7C   94 CA 4F 76 3B 91 35 B3  ..V.Q.....Ov;.5.
#     00A0: D3 D3 18 FD 04 82 29 3C   19 01 95 0A 13 95 F7 48  ......)<.......H
#     00B0: 09 E3 4F 47 30 A3 E0 A3   E7 CA FD D7 37 CD 26 A8  ..OG0.......7.&.
#     00C0: 26 19 C3 33 C3 9C A5 C8   6F 32 E4 6A B7 95 1C 94  &..3....o2.j....
#     00D0: 7C A9 4F 45 C9 B7 33 41   27 74 21 FB DC 8E 43 D2  ..OE..3A't!...C.
#     00E0: 9A 5E 14 A6 EF A9 27 3D   6E 68 A7 41 41 BC 27 69  .^....'=nh.AA.'i
#     00F0: E5 90 37 B7 51 31 A9 9C   76 91 AD CE 3F 06 A7 66  ..7.Q1..v...?..f
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.606 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 1D 59 16 23 93 2C F5   C9 82 DD C5 85 BB 9F F8  ..Y.#.,.........
#     0010: 46 B2 80 75 89 D9 01 1A   88 6D CF FD B9 84 8C 5D  F..u.....m.....]
#     0020: D4 FF 73 D4 46 3A E8 2C   36 62 D9 42 C6 62 46 81  ..s.F:.,6b.B.bF.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.608 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:13.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.609 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:13.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.609 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:13.610 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:13.610 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.610 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.613 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 CD 2B DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:48.000 UTC",
#       "not  after"         : "2024-01-08 09:00:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 25 3B 8C 97 71 36 DE   D8 C4 43 B6 54 CB 04 91  .%;..q6...C.T...
#           0010: 8B AF F8 53                                        ...S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 D8 6D 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:42.000 UTC",
#       "not  after"         : "2024-01-08 09:00:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#           0010: E9 AE EA F3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.639 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 87 CD 3D 4A 7A 3C 43   E3 E8 96 77 C1 9E 54 91  ,..=Jz<C...w..T.
#     0010: 66 15 20 41 C4 68 7E 55   C7 3E 78 69 B8 90 EB 0C  f. A.h.U.>xi....
#     0020: 64 84 36 60 CC 09 5B 06   1B A3 B7 0B 84 48 1B 6E  d.6`..[......H.n
#     0030: 05 2D C6 86 C8 29 78 49   B2 84 DF E6 07 5F 20 16  .-...)xI....._ .
#     0040: 7A 9D B9 F9 7B D5 0F 7E   F4 41 99 CE 31 23 86 94  z........A..1#..
#     0050: 28 57 5E 2D A0 DC 8A DB   CC 57 06 03 EA 72 F0 71  (W^-.....W...r.q
#     0060: 87 07 28 DD 44 61 5A F6   C8 D3 9A 0D F8 62 8A F7  ..(.DaZ......b..
#     0070: C0 45 48 12 C1 E7 DE 53   B6 97 64 85 5E 4B 82 31  .EH....S..d.^K.1
#     0080: 57 D1 E3 3F DA A8 46 00   AF 78 E0 00 1E 86 F9 0D  W..?..F..x......
#     0090: 2C 5D 48 2D 32 C4 A4 2C   35 5A 95 97 EA 0A 3E F3  ,]H-2..,5Z....>.
#     00A0: C9 56 41 15 7E FB B3 F3   C0 C3 DF D6 66 1C 39 A7  .VA.........f.9.
#     00B0: 6F 4A EC 1F 33 2E EF AE   3B 26 48 DF BB 12 12 A2  oJ..3...;&H.....
#     00C0: D0 07 8B C0 97 B9 E9 9B   FA 04 D4 14 AD 98 06 58  ...............X
#     00D0: 85 BD 70 FF 7E 99 1A D2   76 2A CE 5B A9 2B 3E FE  ..p.....v*.[.+>.
#     00E0: 93 E6 A7 07 18 14 34 CB   64 E3 10 AB F4 AD 2A 36  ......4.d.....*6
#     00F0: BD F2 9A 69 E6 A5 55 27   97 6F CF 0B 04 AD 25 3B  ...i..U'.o....%;
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.641 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BF A6 30 FD D3 9C 8E E8   E4 E3 1E BA B6 B3 82 37  ..0............7
#     0010: 0B 7F E7 87 6C 46 2E 7E   93 E8 32 46 96 05 F5 0B  ....lF....2F....
#     0020: 27 0F CF E7 BB 53 45 2F   19 CD 5F D3 EC 7A 09 8E  '....SE/.._..z..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.642 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:13.705 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F9 CE CE AE E8 53 92 7A B7 93 03 A1 31 9C 29 9F 08 27 C8 4D 75 B2 BD 32 9F 1D 15 A8 79 EE AC D2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 09:01:14.003 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 09:01:14.004 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 09:01:14.960; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 09:01:14.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 09:01:15.346; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 09:01:15.349; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 09:01:15.349; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-9SeGRp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:15.382 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 CD 2B DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:48.000 UTC",
#     "not  after"         : "2024-01-08 09:00:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 25 3B 8C 97 71 36 DE   D8 C4 43 B6 54 CB 04 91  .%;..q6...C.T...
#         0010: 8B AF F8 53                                        ...S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:15.387 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 03 80 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:40.000 UTC",
#     "not  after"         : "2024-01-08 09:00:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:15.403 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:15.635 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.635 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:15.637 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:15.637 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.655 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.655 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:15.657 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D4 FD 39 57 5F 3F 02 3B 90 24 B8 4B A2 3E D0 1E A5 F7 18 DA A3 93 81 EE 8A 50 F1 6A BF D9 51 CD",
#   "session id"          : "A7 81 EF 77 7A 34 2E 57 45 90 F9 29 73 97 1F 9B 8F 99 CF 1F E6 50 E1 E5 CB 7E FA 2E 46 53 5D FB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 80 0F C2 62 C6 EF 58 6F   9F 7F 11 91 87 77 34 45  ...b..Xo.....w4E
#             0010: 1F AD 93 EE 9B 0F B0 D9   99 BE 9F E2 34 EE DE 61  ............4..a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.782 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "34 27 34 3A BA 0E D1 C3 D9 B6 2B BB D7 DF 4E 41 6C 18 7B 62 A4 A9 B0 E6 29 76 50 A7 64 60 BF B8",
#   "session id"          : "A7 81 EF 77 7A 34 2E 57 45 90 F9 29 73 97 1F 9B 8F 99 CF 1F E6 50 E1 E5 CB 7E FA 2E 46 53 5D FB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 98 8F 50 BC 20 89 96   90 73 68 89 87 89 DB 2C  ...P. ...sh....,
#           0010: 2D 66 D9 0A 01 66 A0 EA   FA 86 EB B9 1B 2B 84 38  -f...f.......+.8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.782 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.783 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.783 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.784 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.785 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.786 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.787 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.795 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.797 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.798 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.802 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.802 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.802 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.803 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.805 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.805 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.805 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.806 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.806 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.807 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.810 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 A6 80 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:44.000 UTC",
#       "not  after"         : "2024-01-08 09:00:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 B6 70 54 7E 4D DF BF   B8 C9 F2 F0 26 D3 38 AF  ..pT.M......&.8.
#           0010: 64 05 AF 2C                                        d..,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.810 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:15.871 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:15.872 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:15.872 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:01:15.872 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.890 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 D8 6D 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 09:00:42.000 UTC",
#     "not  after"         : "2024-01-08 09:00:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#         0010: E9 AE EA F3                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#         0010: F9 31 AD 04                                        .1..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.894 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 85 14 06 77 A2 1E 38   E1 15 76 32 87 D6 8A ED  E...w..8..v2....
#     0010: CD 1D 06 49 32 BA 4E 5B   E2 5F A4 08 79 41 69 CC  ...I2.N[._..yAi.
#     0020: AA 3C F5 93 62 7D 76 45   2F 60 5B BA 4A 9C 71 72  .<..b.vE/`[.J.qr
#     0030: 1D 13 77 5B F6 1B 6B 93   37 BF F3 B0 7C 31 02 9D  ..w[..k.7....1..
#     0040: 96 AE 67 F0 9E 47 D3 CC   58 8E C3 20 48 BA 42 70  ..g..G..X.. H.Bp
#     0050: 47 9A D7 91 BF A0 DA 90   77 CF E4 C6 4A E7 64 54  G.......w...J.dT
#     0060: 10 2A 4E A8 FB 22 D9 48   FF F1 A3 E1 E7 E2 88 16  .*N..".H........
#     0070: 17 73 C4 64 B3 EA 54 86   21 65 9B BE 78 EB 7D C2  .s.d..T.!e..x...
#     0080: D6 2D 6F A1 56 78 2C 2E   E3 B4 5E DC 4A D0 63 A7  .-o.Vx,...^.J.c.
#     0090: 06 92 61 3A 38 E9 A7 DF   3A 7B 3E 24 E6 4A 64 9A  ..a:8...:.>$.Jd.
#     00A0: F2 18 59 75 84 C5 84 9F   A0 73 DF A0 55 E4 6E 32  ..Yu.....s..U.n2
#     00B0: 5F CC E6 5B EA A0 EB 70   40 34 A0 9D BC C3 7D 79  _..[...p@4.....y
#     00C0: DD DB 48 D4 DD 91 28 5B   49 34 E1 20 3B 09 DA 06  ..H...([I4. ;...
#     00D0: 00 09 9D FF F9 EE 99 48   84 0C 7A F1 40 B0 29 3B  .......H..z.@.);
#     00E0: 0D EE 8E C4 D2 AE 78 F2   37 84 C8 4E 8D 0D 0F E0  ......x.7..N....
#     00F0: D0 6B 76 E0 70 53 05 0B   30 E8 02 B3 17 44 15 37  .kv.pS..0....D.7
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.896 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 47 50 71 45 23 07 C9   B9 50 43 47 51 16 1A 6F  6GPqE#...PCGQ..o
#     0010: 6E E3 43 F6 C1 7B 42 9B   BB EF 14 27 3B 9D DD 19  n.C...B....';...
#     0020: 23 B0 BD 83 67 17 DA F8   51 03 4C E9 8C EE 22 B6  #...g...Q.L...".
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.898 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:15.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:15.900 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 09:01:15.900 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:15.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.901 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.903 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 CD 2B DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:48.000 UTC",
#       "not  after"         : "2024-01-08 09:00:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 25 3B 8C 97 71 36 DE   D8 C4 43 B6 54 CB 04 91  .%;..q6...C.T...
#           0010: 8B AF F8 53                                        ...S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 D8 6D 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:42.000 UTC",
#       "not  after"         : "2024-01-08 09:00:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#           0010: E9 AE EA F3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.930 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 9B 35 E1 FE 1C F9 B4   4B 0B 64 FA 76 F6 2E E0  V.5.....K.d.v...
#     0010: 3C 87 64 8C 83 56 A5 1B   35 0B A9 50 B3 C1 BC 53  <.d..V..5..P...S
#     0020: 36 94 93 E2 3A 03 12 82   18 9B C2 2A 42 63 1C C0  6...:......*Bc..
#     0030: 0D E9 35 1A 67 56 39 A9   04 00 E6 12 F3 4C 23 B0  ..5.gV9......L#.
#     0040: F5 B3 2D 19 0B 05 A3 88   5F 74 26 78 05 E4 AF 79  ..-....._t&x...y
#     0050: 25 2C F0 9A 8F A5 3E 5F   72 31 D7 1D DE 84 C2 BE  %,....>_r1......
#     0060: 05 67 CC 7B BD 31 B9 54   B8 E1 2C 70 9D 87 81 68  .g...1.T..,p...h
#     0070: 03 3F 54 09 2E CF AD F8   42 68 4A ED B4 63 56 C8  .?T.....BhJ..cV.
#     0080: 82 AA 6B 27 E5 9C 69 D8   C7 5C EC 71 08 82 44 F8  ..k'..i..\.q..D.
#     0090: 37 B5 0E 0C 71 75 77 CE   54 24 E8 BA B1 CD 70 81  7...quw.T$....p.
#     00A0: B3 92 DA A4 0C C8 A3 81   EB F6 9B 6F BB CF D1 28  ...........o...(
#     00B0: D7 42 C3 38 98 8C 6B 3D   74 2A A7 A5 98 66 7D 8C  .B.8..k=t*...f..
#     00C0: 94 C2 35 67 06 63 E9 8F   08 75 11 18 7C B4 59 72  ..5g.c...u....Yr
#     00D0: C2 F2 CD 48 30 A2 E0 15   BD 0F F7 53 31 95 7D F9  ...H0......S1...
#     00E0: C9 A4 35 AD E4 A8 75 ED   E1 86 D3 C0 49 57 82 AA  ..5...u.....IW..
#     00F0: 0F C9 11 47 29 E6 2C D9   17 22 E8 EB 6C 0F 7B 67  ...G).,.."..l..g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.931 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 87 CA 7E 20 59 BC 4A   4D 1E 68 46 B8 71 D8 9A  y... Y.JM.hF.q..
#     0010: 08 0B 5E 7D B6 A7 DF 12   17 62 55 76 93 84 48 E8  ..^......bUv..H.
#     0020: 00 9B 04 48 2F A5 C7 F2   65 F8 70 01 44 59 AD A1  ...H/...e.p.DY..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.932 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:15.980 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "47 8E 65 3E 3D 4D A0 4C D8 90 3D 9A F2 85 DA A3 D5 F2 EC 8B 81 DB 15 E9 CF 4B 2C F8 D6 9E 04 3F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 09:01:16.256 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 09:01:16.257 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 09:01:27.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:28.329 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 03 80 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:40.000 UTC",
#       "not  after"         : "2024-01-08 09:00:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#           0010: E9 AE EA F3                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 D8 6D 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 09:00:42.000 UTC",
#       "not  after"         : "2024-01-08 09:00:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 A0 82 E2 82 B9 35 3B   A2 90 4D CB 35 E9 5E DB  ......5;..M.5.^.
#           0010: E9 AE EA F3                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 89 B6 8B 5E 37 1C 4A   82 BA B1 34 1F 21 E5 73  ....^7.J...4.!.s
#           0010: F9 31 AD 04                                        .1..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 09:01:28.344 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:28.580 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:28.582 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 09:01:28.582 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.587 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.600 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 09:01:28.602 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D0 1E DC 1B 4B 1F 2D 23 34 BF AC C4 17 85 03 44 4F 09 55 63 9E A1 52 F7 F1 1C 67 A5 36 4E DF DF",
#     "session id"          : "A4 B8 7E 0A E8 F5 0E 59 21 79 5B F2 B3 C2 77 F7 4D 36 A0 1D E7 6D BF 35 69 1C D8 E6 BC 07 F4 63",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F5 5E A1 9B AA 2C B8 4F   41 94 CB 1F 2A F2 BA 07  .^...,.OA...*...
#               0010: 5A 22 AF 36 49 5E A1 CB   99 43 F1 72 90 01 94 07  Z".6I^...C.r....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "20 57 D6 34 AD 30 C6 6E 09 36 18 53 F4 0F E8 CD 05 13 3D C3 F1 2B F3 60 21 E2 E0 02 24 40 38 59",
#     "session id"          : "A4 B8 7E 0A E8 F5 0E 59 21 79 5B F2 B3 C2 77 F7 4D 36 A0 1D E7 6D BF 35 69 1C D8 E6 BC 07 F4 63",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 E1 DB 1A 17 59 E1 32   77 45 B8 55 FF EA B2 F4  5....Y.2wE.U....
#             0010: 2B 5F 14 91 10 B7 0B 70   28 10 AC 48 F8 67 00 45  +_.....p(..H.g.E
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.623 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.625 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.627 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.637 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.638 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.639 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.643 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.643 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.643 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.643 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.644 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.644 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.644 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:28.644 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:01:28.644 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 09:01:28.646 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 09:02:50.241 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:02:50.290 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:02:50.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:02:50.291 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 09:02:50.291 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45228/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28539ms
ok 65 stop command for single port in 30943ms
ok 66 status detects locally running solr in 14713ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2190ms
ok 69 copying files around in 6670ms
ok 70 upconfig in 2635ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 35s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m1s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5633 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5633/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42145/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 06:53:10.783; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 06:53:10.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 06:53:11.682; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 06:53:11.723; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23184ms
ok 61 start solr with client truststore and security manager in 24956ms
not ok 62 start solr with mTLS needed in 59521ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-NWRU9O/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42145.
#
# Started Solr server on port 42145 (pid=198133). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42146.
#
# Started Solr server on port 42146 (pid=198589). Happy searching!
#
# INFO  - 2023-10-10 06:54:35.359; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 06:54:35.364; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 06:54:35.736; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 06:54:35.739; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 06:54:35.739; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:35.771 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 21 E4 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:11.000 UTC",
#     "not  after"         : "2024-01-08 06:54:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 5A 48 27 E5 9D 1E 3C   FC 7C 99 49 2C 43 6E 62  .ZH'...<...I,Cnb
#         0010: 55 E4 7F 84                                        U...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:35.775 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 85 0C 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:02.000 UTC",
#     "not  after"         : "2024-01-08 06:54:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:35.790 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:35.875 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:35.876 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:35.876 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:35.876 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:36.024 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.024 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:36.027 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:36.027 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.034 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.047 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:36.049 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2F 21 4C 45 4C C8 55 1F A9 67 DF A3 27 BA 48 2C D2 D3 31 CB 28 73 70 E6 37 DB B8 9B E0 E9 22 4D",
#   "session id"          : "49 2D 6C 5C C3 1D 13 12 27 FD 80 E1 9E A7 62 C3 2C 52 FB 2C 9A 7D D0 EA 1A EA 5E 6E D1 CE 44 8F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 BF BC 4F 0B B0 06 2B   84 0B 3F B2 7F 05 5D F2  ...O...+..?...].
#             0010: 16 B0 CB 96 5C E8 E4 1C   5A 91 ED 97 B6 CC 10 6E  ....\...Z......n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.169 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "80 2A 57 81 DC D1 25 0A 9B 3E D5 77 2F AC E6 F0 F7 01 1B 1C 78 F5 A3 C5 3D 53 1E 93 17 41 AD 0C",
#   "session id"          : "49 2D 6C 5C C3 1D 13 12 27 FD 80 E1 9E A7 62 C3 2C 52 FB 2C 9A 7D D0 EA 1A EA 5E 6E D1 CE 44 8F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E1 74 3F F0 30 2A 2E B7   D8 FD 13 A8 FE E3 75 5D  .t?.0*........u]
#           0010: 78 97 0B C6 E8 19 88 C9   9F 20 B9 60 73 2F 75 66  x........ .`s/uf
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.170 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.170 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.172 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.174 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.174 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.174 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.175 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.176 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.176 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.176 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.183 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.185 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.186 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.189 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.191 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.192 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.193 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.193 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.193 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.194 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.195 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.195 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.198 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B 56 63 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:07.000 UTC",
#       "not  after"         : "2024-01-08 06:54:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 45 95 91 53 72 00 60   21 4B BC E2 01 A8 D0 D6  @E..Sr.`!K......
#           0010: 7F 99 05 F9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.198 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.276 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.280 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 B6 38 08 7D CD 49 D8   03 59 6D 2D 35 A0 57 59  ..8...I..Ym-5.WY
#     0010: E1 52 4A B5 14 E3 9B B8   FA 68 5E D8 EA CB 15 60  .RJ......h^....`
#     0020: 51 1A CC B0 19 7A F9 90   03 86 45 1C C5 80 0A 12  Q....z....E.....
#     0030: C7 B6 50 1A 71 44 40 02   41 68 0B DB F3 3E 30 FF  ..P.qD@.Ah...>0.
#     0040: 59 BB E0 AD A0 1C DF 9B   07 BD 82 66 1F 2B 9B AB  Y..........f.+..
#     0050: B2 96 77 36 75 92 15 3B   1C D1 B7 E1 92 C8 9D 5C  ..w6u..;.......\
#     0060: 39 80 64 11 23 FE DB 7E   17 98 74 23 08 81 9D 26  9.d.#.....t#...&
#     0070: 22 7F B4 E2 F8 18 EB B2   91 43 BD 9A 9A 9C 61 BA  "........C....a.
#     0080: 8E 60 DB D3 59 1B F1 C8   0C 0E 1B 7C A1 6A CD B5  .`..Y........j..
#     0090: 3A EA 29 62 5D 72 0D 24   62 D0 05 53 DC EB BF E3  :.)b]r.$b..S....
#     00A0: 20 1B 53 14 FD B0 77 4B   C4 35 B7 0A 64 30 3E 51   .S...wK.5..d0>Q
#     00B0: D7 89 D0 D1 A7 BE BA 1A   86 14 94 46 48 1F 79 20  ...........FH.y
#     00C0: CE 31 6C 14 74 25 8A B9   85 43 1E EF 04 CC 14 CE  .1l.t%...C......
#     00D0: DE 7F 3D E5 0F A9 94 7B   A4 4A 48 5D F5 0E AF E9  ..=......JH]....
#     00E0: F8 09 72 EE 73 BE 33 CB   D9 6A 0A AC BD B7 E1 76  ..r.s.3..j.....v
#     00F0: 42 08 15 B5 36 96 EF 73   FD ED 0D B1 58 68 6C 28  B...6..s....Xhl(
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.282 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 B0 EA 31 C3 B7 12 A6   2C 6B 38 46 72 EE 95 92  ...1....,k8Fr...
#     0010: 16 D8 98 02 9D A1 AC 92   D0 32 9A 62 3C 60 5E 97  .........2.b<`^.
#     0020: 67 3D 35 B6 63 C8 28 78   21 31 BE 4D 20 3C FA F1  g=5.c.(x!1.M <..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.284 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:36.285 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.285 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:36.286 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.286 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:36.286 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:36.286 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.287 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.289 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 21 E4 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:11.000 UTC",
#       "not  after"         : "2024-01-08 06:54:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 5A 48 27 E5 9D 1E 3C   FC 7C 99 49 2C 43 6E 62  .ZH'...<...I,Cnb
#           0010: 55 E4 7F 84                                        U...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 D9 EF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:04.000 UTC",
#       "not  after"         : "2024-01-08 06:54:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#           0010: A7 1E 7C E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.315 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 C4 C4 4D 27 33 FC F1   18 AD 65 92 A4 E5 EA 5E  ...M'3....e....^
#     0010: 9A 93 1A FC 18 3F A6 19   AD 9E 21 44 8A 6C 0B D0  .....?....!D.l..
#     0020: 77 4E AC 5A 2B 0A AB B8   45 79 F6 D8 B4 9F 69 B2  wN.Z+...Ey....i.
#     0030: 24 F5 6D 1B FA F9 99 0D   E3 F5 7E 96 F0 45 9C F4  $.m..........E..
#     0040: 85 90 9E 92 EF AB 7D 69   CA 9E 2E E7 80 22 F7 D9  .......i....."..
#     0050: 08 AD 81 15 CE FD BF 5E   7A 14 D1 87 2A 22 27 FC  .......^z...*"'.
#     0060: 96 54 1F AD A3 50 C8 BB   7C 0C 25 7D B0 50 6E 03  .T...P....%..Pn.
#     0070: 15 60 AC C2 F9 2B F7 BF   29 C5 0A 55 87 94 2A 79  .`...+..)..U..*y
#     0080: 70 4C B5 A6 04 95 F7 8E   CF 30 DD D8 CA D5 51 5B  pL.......0....Q[
#     0090: 99 E4 F2 0C 5E 95 AF 58   B1 BB BE 5B 28 8D 4F 36  ....^..X...[(.O6
#     00A0: 93 78 7E 80 D1 1A 57 B6   AF 85 69 19 6A 14 11 C3  .x....W...i.j...
#     00B0: 88 1C F3 1A FC A2 A4 BD   D6 93 57 D2 17 3B 1E B3  ..........W..;..
#     00C0: 58 20 8E 75 23 42 A6 20   BE 7E 22 5A B4 7E 95 2C  X .u#B. .."Z...,
#     00D0: 8B AA 7E BC BD 93 53 75   02 97 C7 CB F0 A9 79 3B  ......Su......y;
#     00E0: 5E D9 5E 93 A9 26 9C 6A   D0 56 4F 24 71 4D 6D F9  ^.^..&.j.VO$qMm.
#     00F0: CA 3D 5F 19 99 34 69 56   F7 00 D2 26 CD E0 27 F8  .=_..4iV...&..'.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.316 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 7F E4 C1 C7 BB 7C E3   E4 18 7D B3 24 CA DA 34  ............$..4
#     0010: 6B 4C 2D EE 62 02 7F 57   19 58 CB 9A 98 4B FD E2  kL-.b..W.X...K..
#     0020: 37 1E C0 90 A5 8B 0F 84   6D 37 DE 4F 09 7B 21 50  7.......m7.O..!P
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.317 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:36.363 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "93 12 2A 31 E7 96 52 7A EF 03 C2 65 BB 24 0A F1 29 B1 BB 5C EA 1F 0C 04 91 40 2D D7 F7 31 9B 39",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 06:54:36.635 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 06:54:36.636 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 06:54:37.574; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 06:54:37.579; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 06:54:37.959; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 06:54:37.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 06:54:37.963; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NWRU9O/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:37.996 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 21 E4 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:11.000 UTC",
#     "not  after"         : "2024-01-08 06:54:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 5A 48 27 E5 9D 1E 3C   FC 7C 99 49 2C 43 6E 62  .ZH'...<...I,Cnb
#         0010: 55 E4 7F 84                                        U...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:38.002 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 85 0C 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:02.000 UTC",
#     "not  after"         : "2024-01-08 06:54:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:38.017 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:38.337 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:38.337 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:38.337 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:38.338 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:38.486 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:38.488 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:38.489 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.495 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.507 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:38.510 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3B A4 9A E8 5C AF DA 3C 82 85 FA 52 CF 2C 32 3F 79 37 44 14 8C 5C CA C5 3A 60 FE E4 CD 11 83 02",
#   "session id"          : "9C 46 79 B3 E4 F1 FC 27 8A AF C4 54 21 54 A3 17 59 7C 02 92 4D B8 B7 29 F6 63 F2 DD 7C 79 1C 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DB 11 43 0B 92 81 A5 C0   2E 00 71 BC F0 7A C8 56  ..C.......q..z.V
#             0010: 6A FD 23 6C E5 2B 0F 41   A0 D7 FB D7 E3 61 FC 78  j.#l.+.A.....a.x
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.612 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FB BD E4 08 3C 68 94 34 62 E3 AC 73 D7 D1 AE 26 36 04 F4 E4 B6 BD 9F 1D 07 E8 BF B7 44 8B BA 07",
#   "session id"          : "9C 46 79 B3 E4 F1 FC 27 8A AF C4 54 21 54 A3 17 59 7C 02 92 4D B8 B7 29 F6 63 F2 DD 7C 79 1C 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9A E9 B9 67 E7 9F CF 3E   CC 5E 1C EF D1 A6 47 81  ...g...>.^....G.
#           0010: BD 14 69 F8 3C D2 2A 62   6C D3 02 32 50 9A 47 0A  ..i.<.*bl..2P.G.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.613 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.613 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.614 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.614 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.614 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.615 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.617 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.617 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.617 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.618 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.619 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.619 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.627 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.628 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.629 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.633 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.634 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.634 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.635 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.636 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.637 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.637 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.637 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.639 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.640 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.640 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.644 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B 56 63 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:07.000 UTC",
#       "not  after"         : "2024-01-08 06:54:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 40 45 95 91 53 72 00 60   21 4B BC E2 01 A8 D0 D6  @E..Sr.`!K......
#           0010: 7F 99 05 F9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.644 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.744 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 D9 EF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 06:54:04.000 UTC",
#     "not  after"         : "2024-01-08 06:54:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#         0010: A7 1E 7C E4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#         0010: CE 63 12 48                                        .c.H
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.748 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A7 50 0B FA F7 C6 C8 5F   21 D9 09 74 22 34 33 0B  .P....._!..t"43.
#     0010: 3B EE BE 02 64 D4 6D 68   EE 5E 65 5F 90 E8 3E DE  ;...d.mh.^e_..>.
#     0020: 0B B7 91 7B 4D 44 01 EE   30 61 3E F9 FE 59 26 5C  ....MD..0a>..Y&\
#     0030: 03 19 76 F0 8B BE 70 4B   A9 E7 94 CE E4 24 DF 3C  ..v...pK.....$.<
#     0040: 2D 26 5C 9A 93 C4 DF 4A   E3 D8 29 72 A2 BE E3 D8  -&\....J..)r....
#     0050: 85 4E D6 E2 B0 AA 17 24   E0 AC E9 FA 74 B9 1A 3D  .N.....$....t..=
#     0060: B1 92 5E 85 8E 7F F5 14   36 EC 09 22 32 B7 8D 3B  ..^.....6.."2..;
#     0070: 4E 7D B7 C1 79 8F 7E 35   A5 45 B4 D1 D6 D1 03 87  N...y..5.E......
#     0080: 98 D2 A0 81 E3 9D C5 2C   56 74 D6 F9 5C 58 E7 80  .......,Vt..\X..
#     0090: BE E1 E3 53 84 E7 C8 1D   21 71 00 1B 85 E6 78 24  ...S....!q....x$
#     00A0: 03 B1 AD 9E 9D 87 58 15   CB 91 17 4D D1 8F B0 54  ......X....M...T
#     00B0: FD 5F 22 E3 AB CA 22 B5   0E B3 F9 FB FD 08 E0 4D  ._"..."........M
#     00C0: EB 5A 86 DA 7E 90 BF 3F   FC AF BB 72 35 CE 1A 0F  .Z.....?...r5...
#     00D0: A8 48 56 DE AE 8E CD A1   1D 42 0B D1 39 A4 99 37  .HV......B..9..7
#     00E0: 3B 15 49 45 B5 20 E5 F7   3E 8E BF 5E B1 C8 A9 91  ;.IE. ..>..^....
#     00F0: 0F A8 D2 1D 37 BA 14 DB   A9 95 2D 7A 5C E0 5E E0  ....7.....-z\.^.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.750 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 B5 C6 5A CC 15 EC DF   F8 C8 FF B4 64 F1 09 D3  ...Z........d...
#     0010: A1 06 72 80 18 28 E5 70   8D 66 8F 1E 9C 51 BA E7  ..r..(.p.f...Q..
#     0020: BD A8 90 C0 63 CB E9 AD   17 33 80 18 B5 EE 7E 6F  ....c....3.....o
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.753 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:38.754 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.754 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:38.755 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.755 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 06:54:38.755 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:38.755 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.756 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.758 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 21 E4 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:11.000 UTC",
#       "not  after"         : "2024-01-08 06:54:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 5A 48 27 E5 9D 1E 3C   FC 7C 99 49 2C 43 6E 62  .ZH'...<...I,Cnb
#           0010: 55 E4 7F 84                                        U...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 D9 EF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:04.000 UTC",
#       "not  after"         : "2024-01-08 06:54:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#           0010: A7 1E 7C E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.785 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 82 45 CF 7D 34 D6 8C 77   28 49 EE BD 81 4B 5D AF  .E..4..w(I...K].
#     0010: FC 37 6C 06 34 89 D5 EA   A1 47 D9 DE 31 41 B5 F9  .7l.4....G..1A..
#     0020: 1A 5F DF 3E 1C BC 79 27   DA 88 46 61 1D D6 AE 57  ._.>..y'..Fa...W
#     0030: 35 5E 0B CB 30 AE E0 7F   61 D2 96 96 C9 72 B2 F3  5^..0...a....r..
#     0040: 96 46 EB CA 4A 7F F8 BF   17 C4 C8 E7 DD 45 5C 1F  .F..J........E\.
#     0050: E8 9D EA 27 E1 C2 4A 7A   B1 80 6C BC 57 FA 16 5E  ...'..Jz..l.W..^
#     0060: 3B 47 69 5E 2F D5 53 8C   1B 92 1B 09 9E 9B FC 47  ;Gi^/.S........G
#     0070: 20 04 83 C0 98 AD F5 A9   0E 4F F3 DA 64 A2 4C D6   ........O..d.L.
#     0080: CD D9 89 19 04 0C D3 88   BE FE AD 98 9B 78 E9 A7  .............x..
#     0090: 5D 77 77 6D D3 FD D3 50   A6 FF 10 4B CB EF 90 7B  ]wwm...P...K....
#     00A0: 8B 10 57 88 CE B8 44 C9   FD 99 A7 0E E0 C7 7B 3F  ..W...D........?
#     00B0: 6D D3 77 5B 07 13 A4 75   78 E2 88 B7 D4 5A 49 19  m.w[...ux....ZI.
#     00C0: E9 ED EB 19 A8 37 0F F4   B1 9B A4 30 B0 52 30 06  .....7.....0.R0.
#     00D0: 40 7F 16 C9 91 20 EF 12   48 A9 67 2A 3C 85 80 BF  @.... ..H.g*<...
#     00E0: CA BB 36 66 54 43 1C D2   96 4D 90 17 39 AD 5F 4D  ..6fTC...M..9._M
#     00F0: 5F 10 5A 66 26 65 F4 2E   08 42 81 2B 70 ED 3F 09  _.Zf&e...B.+p.?.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.786 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 33 05 74 76 D5 50 97 F6   25 D5 E1 FD 89 A7 21 BF  3.tv.P..%.....!.
#     0010: E6 9A A9 91 CC 15 95 02   90 59 83 62 AE A9 46 57  .........Y.b..FW
#     0020: C5 FF 3E 00 77 15 DF D2   B9 C5 30 66 63 7E 0E 24  ..>.w.....0fc..$
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.787 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:38.841 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1E 4B 8E FC 13 A5 49 79 C7 10 67 2C C8 41 18 29 95 02 DA BB 0F 97 45 AC D6 DC 0F 96 01 DD 7E 79",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 06:54:39.133 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 06:54:39.134 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 06:54:50.006; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:50.355 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 85 0C 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:02.000 UTC",
#       "not  after"         : "2024-01-08 06:54:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#           0010: A7 1E 7C E4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 D9 EF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 06:54:04.000 UTC",
#       "not  after"         : "2024-01-08 06:54:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C A7 12 0B 51 8C 0E 85   8C B9 E4 43 80 F5 F7 C0  ....Q......C....
#           0010: A7 1E 7C E4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 95 EA 89 E3 A2 60 39   07 A4 DF 95 09 DA B9 EE  Y.....`9........
#           0010: CE 63 12 48                                        .c.H
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 06:54:50.371 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:50.806 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:50.806 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:50.806 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:54:50.806 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:50.899 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.900 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:50.902 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 06:54:50.902 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.908 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.920 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.921 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.921 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 06:54:50.924 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "78 05 FC E0 D5 2B 5E 29 7D 3F C9 A3 12 31 1F 9F C1 98 61 93 0E 7B 14 53 E9 A7 FF D8 9E 90 58 CC",
#     "session id"          : "EE BF 01 F6 74 29 08 A7 A9 79 74 40 AA 5D 30 24 3F 78 52 79 B9 70 33 A8 06 D5 76 98 EA B4 6E E8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3A EE 13 70 B8 B1 BE 16   F4 DB DF 7B F5 97 16 92  :..p............
#               0010: C0 54 FA 73 FA 8C BB B3   9C 56 40 46 3C 04 75 41  .T.s.....V@F<.uA
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.945 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "60 CB 09 D9 BD B2 90 45 C2 E6 1C C6 90 CD FF 58 DC 5C 48 25 C1 DD FD E8 DC 81 D4 D5 65 C4 5C EC",
#     "session id"          : "EE BF 01 F6 74 29 08 A7 A9 79 74 40 AA 5D 30 24 3F 78 52 79 B9 70 33 A8 06 D5 76 98 EA B4 6E E8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 12 D4 64 B6 6D 98 28 A8   9B FE B8 F2 E5 94 8C 65  ..d.m.(........e
#             0010: 1F 27 5E BE 8A 69 DE E4   38 84 97 8E 0E 48 4E 63  .'^..i..8....HNc
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.945 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.945 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.946 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.947 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.949 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.959 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.961 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.962 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.965 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.965 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:54:50.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 06:54:50.968 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 06:56:11.825 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:56:11.866 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:56:11.866 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:56:11.867 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 06:56:11.867 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42146/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28345ms
ok 65 stop command for single port in 30724ms
ok 66 status detects locally running solr in 14346ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2160ms
ok 69 copying files around in 6578ms
ok 70 upconfig in 2595ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1238ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 57s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m23s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5632 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5632/

All tests passed

Build Log:
[...truncated 1331 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44651/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 02:30:33.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 02:30:33.025; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 02:30:33.940; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 02:30:33.981; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22542ms
ok 61 start solr with client truststore and security manager in 25151ms
not ok 62 start solr with mTLS needed in 59324ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-jfYuFf/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44651.
#
# Started Solr server on port 44651 (pid=199708). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44652.
#
# Started Solr server on port 44652 (pid=200140). Happy searching!
#
# INFO  - 2023-10-10 02:31:56.860; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 02:31:56.865; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 02:31:57.229; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@49d3c823(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 02:31:57.232; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 02:31:57.232; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@23aa363a(ca,h=[localhost],a=[],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:57.264 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 3E 40 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:33.000 UTC",
#     "not  after"         : "2024-01-08 02:31:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 46 81 6F 51 54 0C EF   91 B4 DD CF 50 12 BB 67  .F.oQT......P..g
#         0010: B0 82 EC A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:57.268 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 9A C1 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:24.000 UTC",
#     "not  after"         : "2024-01-08 02:31:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:57.282 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:31:57.368 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:31:57.368 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:31:57.368 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:31:57.369 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:31:57.504 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:31:57.506 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:31:57.506 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.522 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.523 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:31:57.525 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB 38 3C DD A2 14 3D B2 05 7F BD 38 9C 40 DE 87 62 9D B6 D7 E4 AD A7 69 2F 8A AA 20 F9 5C 87 7B",
#   "session id"          : "80 11 B5 41 71 DF 22 40 45 49 E6 FC B5 2C A1 24 CF E5 30 1B FA 1E D9 F7 3E 95 7F DA 15 FA 98 A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A0 93 16 65 4C 49 65 35   92 96 9D 40 ED E1 3C 28  ...eLIe5...@..<(
#             0010: DB 81 3A 0E 64 24 49 8C   AB 5D 00 F7 67 C1 38 11  ..:.d$I..]..g.8.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.643 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D A9 CB F0 B8 69 8F AD 13 29 8D A2 8C 43 25 7F 3B 1A 8F B3 EF 03 A9 AC C0 CE 86 88 6E 19 08 9C",
#   "session id"          : "80 11 B5 41 71 DF 22 40 45 49 E6 FC B5 2C A1 24 CF E5 30 1B FA 1E D9 F7 3E 95 7F DA 15 FA 98 A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 45 E6 86 EC A2 25 28 CA   C0 0C F6 1F C3 4F A0 9E  E....%(......O..
#           0010: B7 93 77 50 BF 88 D9 8B   EE 12 8F 7D 42 DB 0E 51  ..wP........B..Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.643 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.643 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.644 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.645 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.647 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.647 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.648 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.649 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.649 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.649 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.649 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.656 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.657 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.658 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.662 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.662 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.662 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.663 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.665 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.665 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.665 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.666 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.666 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.667 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.667 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.670 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 70 6D 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:29.000 UTC",
#       "not  after"         : "2024-01-08 02:31:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 64 8C 9E 6B 43 9A 03 09   F3 2D F4 03 5E B6 E0 38  d..kC....-..^..8
#           0010: 78 43 09 08                                        xC..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.670 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.748 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.751 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A D9 B0 58 5A C9 25 53   71 0E 71 15 E0 F4 BF 37  ...XZ.%Sq.q....7
#     0010: 8A 8C 31 5F EE D8 60 66   1D 1F B0 26 87 AC 76 AA  ..1_..`f...&..v.
#     0020: C8 72 A4 FB 08 D2 A8 C4   1B 1F A6 99 B0 78 05 FC  .r...........x..
#     0030: D3 88 32 EC 51 53 86 F9   92 C8 B8 B7 EF 1F 1B C4  ..2.QS..........
#     0040: 0F 1B 97 42 F9 21 A3 46   1E AB 4A 6F 6F 89 6E CD  ...B.!.F..Joo.n.
#     0050: 03 74 FF 65 86 3B DF 9C   BB D8 5D 0D AE 07 70 BC  .t.e.;....]...p.
#     0060: 30 D6 5F 23 5B 8B 89 00   10 21 F8 95 AC AF B1 7D  0._#[....!......
#     0070: 8E 69 FD B2 01 F6 A6 0B   05 58 6F BD 14 EE E9 9F  .i.......Xo.....
#     0080: 95 F9 42 BF 3C F6 51 20   4E 33 80 25 F3 AB 32 E7  ..B.<.Q N3.%..2.
#     0090: 07 57 F0 2E 7F 96 BE CC   EE 87 22 2D 23 EB 45 A5  .W........"-#.E.
#     00A0: 75 97 0F C5 0C 84 E0 29   58 A8 22 5F 82 E1 72 47  u......)X."_..rG
#     00B0: 85 E5 EC 23 29 35 E3 88   24 7F 85 C8 69 8F DD 50  ...#)5..$...i..P
#     00C0: C5 12 9F AF 5D 3D 0C 86   64 74 51 F4 5E 02 59 D2  ....]=..dtQ.^.Y.
#     00D0: A7 7B FB CF D6 1E DB FC   A4 4C 34 17 20 39 58 DD  .........L4. 9X.
#     00E0: 12 80 12 CD 39 85 95 6E   EA C5 B5 B9 34 04 70 EC  ....9..n....4.p.
#     00F0: DD B3 A9 62 F4 89 11 A9   C9 6B 9D 8B B5 5F 76 CF  ...b.....k..._v.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.753 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3F CB B5 9F FB 4F F5 53   51 B3 67 91 01 78 CA 71  ?....O.SQ.g..x.q
#     0010: 79 E5 2B 0F FB 0D 17 58   C5 08 E1 EC 58 81 2D 0C  y.+....X....X.-.
#     0020: 1A 58 22 37 AE BE 37 63   BA 9F C9 13 C1 36 6D 11  .X"7..7c.....6m.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.756 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:31:57.757 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.757 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:31:57.757 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.757 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:31:57.757 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:31:57.758 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.758 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.761 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 3E 40 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:33.000 UTC",
#       "not  after"         : "2024-01-08 02:31:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 46 81 6F 51 54 0C EF   91 B4 DD CF 50 12 BB 67  .F.oQT......P..g
#           0010: B0 82 EC A7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 2D 02 1E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:26.000 UTC",
#       "not  after"         : "2024-01-08 02:31:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#           0010: 2E 67 E4 F5                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.787 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F 91 7E 37 5E C0 0E B9   E0 C7 49 08 C4 F2 27 3E  O..7^.....I...'>
#     0010: C4 04 98 E6 84 92 51 6A   DC 87 03 7F 3A 2F 24 77  ......Qj....:/$w
#     0020: 89 84 E5 08 69 15 19 50   BF 18 F2 1B BD 45 E9 59  ....i..P.....E.Y
#     0030: 3A 48 DB 9F FC 7B CB 23   1D C7 96 9F E5 08 E1 A6  :H.....#........
#     0040: 2E C2 93 03 27 60 EE ED   B7 F7 12 96 79 48 C1 43  ....'`......yH.C
#     0050: CA BC 3C C3 76 89 25 AD   2C D8 EB CA 3D 09 15 6C  ..<.v.%.,...=..l
#     0060: 40 FD 94 80 D1 62 3C 40   D6 04 6A 5F FD 21 79 EA  @....b<@..j_.!y.
#     0070: D5 7F D1 58 7F 94 E1 BE   8C 8B A4 30 BE 1B 14 74  ...X.......0...t
#     0080: 70 50 E3 9F 1E 06 BB A1   6E 55 56 2C C0 2E CF A4  pP......nUV,....
#     0090: 9A 49 27 7F 75 E0 93 6B   0B E7 C0 17 34 53 37 C3  .I'.u..k....4S7.
#     00A0: A8 2A 3E BF 3E 87 4F 8F   7B 12 FB 30 50 79 4B 9E  .*>.>.O....0PyK.
#     00B0: F1 09 EF 24 09 54 22 01   90 87 FB A2 57 27 85 B2  ...$.T".....W'..
#     00C0: 9A 7C BF 6A 1D 55 B2 FA   D5 8F 0E 37 E6 1F 94 13  ...j.U.....7....
#     00D0: BF 35 57 62 F1 15 BF EA   96 21 38 AE CC 98 40 8F  .5Wb.....!8...@.
#     00E0: 57 39 EB 52 60 85 6C 7E   C0 A5 2B 33 42 B8 9D CD  W9.R`.l...+3B...
#     00F0: A3 30 BD 86 00 31 34 79   AB 60 EA D4 E9 2F 83 3C  .0...14y.`.../.<
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.788 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 9C C6 62 EF 7F CB DF   1F 7B EA A0 17 86 8B EA  ...b............
#     0010: 42 5E AC 3A EC AE 5A 1F   3E 64 92 D5 AE 71 7E 70  B^.:..Z.>d...q.p
#     0020: CA 5E 3C 46 2F 72 04 F8   5C 54 60 96 93 C4 53 17  .^<F/r..\T`...S.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.788 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:31:57.834 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3F 35 1B BE 9B AE CF 8F CF DA EA 56 46 52 C2 75 A1 5E 5E 61 6A CD 4E 99 3C F8 43 37 E8 20 00 68",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 02:31:58.161 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 02:31:58.162 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 02:31:59.115; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 02:31:59.120; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 02:31:59.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 02:31:59.502; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 02:31:59.502; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-jfYuFf/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:59.838 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6A 3E 40 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:33.000 UTC",
#     "not  after"         : "2024-01-08 02:31:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 46 81 6F 51 54 0C EF   91 B4 DD CF 50 12 BB 67  .F.oQT......P..g
#         0010: B0 82 EC A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:59.842 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "30 9A C1 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:24.000 UTC",
#     "not  after"         : "2024-01-08 02:31:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 02:31:59.857 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:00.072 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.073 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:00.075 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:00.075 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.081 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.093 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.094 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.094 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:00.096 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD 06 45 F5 AC 36 C2 57 D4 02 38 35 20 7B 65 6F C8 FF 45 D3 33 43 9A 69 D1 C2 4A 6A EF 31 28 4C",
#   "session id"          : "6B 76 CF E0 F3 36 66 B1 AF EA 55 94 21 33 14 6C 29 44 80 FB 96 6C 3B EB 43 0F 31 8B A6 69 72 7E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 95 BA 89 A7 CE 79 0C 3F   95 94 55 2C 55 91 24 58  .....y.?..U,U.$X
#             0010: 0B DD B7 C5 66 F6 D9 8E   3B 45 14 1A 3D 33 57 0C  ....f...;E..=3W.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.200 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "36 CB 7A 6D 12 8F A9 F0 DB 76 98 92 B9 60 A4 0F 65 17 31 5A 40 6A 46 6C DA 23 14 D5 FC F7 7F 59",
#   "session id"          : "6B 76 CF E0 F3 36 66 B1 AF EA 55 94 21 33 14 6C 29 44 80 FB 96 6C 3B EB 43 0F 31 8B A6 69 72 7E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 BD EE DA B6 BD 22 23   56 6B AB CB DA 6B 3E 39  h....."#Vk...k>9
#           0010: 13 4E 07 34 2B 3C 19 5F   7E CF 5B 4E 30 EA EF 02  .N.4+<._..[N0...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.200 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.201 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.202 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.202 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.202 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.202 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.202 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.203 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.203 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.203 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.204 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.205 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.205 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.213 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.215 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.216 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.220 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.220 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.220 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.220 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.220 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.221 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.221 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.221 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.221 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.223 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.223 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.223 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.224 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.224 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.225 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.225 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.228 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 70 6D 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:29.000 UTC",
#       "not  after"         : "2024-01-08 02:31:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 64 8C 9E 6B 43 9A 03 09   F3 2D F4 03 5E B6 E0 38  d..kC....-..^..8
#           0010: 78 43 09 08                                        xC..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.228 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:00.291 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:00.293 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:00.293 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:00.293 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.330 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 2D 02 1E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 02:31:26.000 UTC",
#     "not  after"         : "2024-01-08 02:31:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#         0010: 2E 67 E4 F5                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#         0010: F0 4E AE F5                                        .N..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.334 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 84 41 28 8E 40 FD D6 74   64 2C B0 6D 32 08 68 24  .A(.@..td,.m2.h$
#     0010: 79 C4 31 D4 DA A9 96 1D   F6 79 6A 0D EC 90 46 3D  y.1......yj...F=
#     0020: 79 84 CB 58 14 8C 99 C5   7A 8E E8 F4 D9 47 35 E2  y..X....z....G5.
#     0030: 8E 67 E0 44 84 DB 2E 2C   F9 B6 0B 45 EA 07 81 F9  .g.D...,...E....
#     0040: F9 BE 4E 45 80 F1 22 5E   88 53 87 2D D2 4E 72 31  ..NE.."^.S.-.Nr1
#     0050: 26 44 FC 04 31 B0 74 35   2D 3D 41 C6 C7 EB E0 DF  &D..1.t5-=A.....
#     0060: D6 A3 34 FD 78 3B 39 97   D8 C4 B3 A2 9D A6 12 5F  ..4.x;9........_
#     0070: E4 0B 77 1C FB 36 B1 2B   FB 6D BD 69 9A F9 57 57  ..w..6.+.m.i..WW
#     0080: 21 4A F8 CD A5 DF BF 47   9D 03 8C 67 B3 92 BF 77  !J.....G...g...w
#     0090: CB A3 CC CF AD 2B 65 85   EB 9C 51 16 3C 00 D6 54  .....+e...Q.<..T
#     00A0: 06 8E AD F2 79 96 A5 2E   69 2F 42 88 1D F7 EF 03  ....y...i/B.....
#     00B0: FA AE 18 98 A7 7D 48 3B   25 D7 8B 94 79 79 30 CE  ......H;%...yy0.
#     00C0: 6B 97 7E A8 DE D3 03 9C   94 7B E4 EC BA DE 54 E7  k.............T.
#     00D0: 5F 13 6C DE 5E 83 4B 82   3B F4 E1 C3 6F 95 71 D7  _.l.^.K.;...o.q.
#     00E0: 71 DC 5C 11 43 41 50 2A   49 93 54 2A 34 11 F7 70  q.\.CAP*I.T*4..p
#     00F0: 58 6F 77 20 73 C8 21 13   94 DB 55 5E 69 23 19 D6  Xow s.!...U^i#..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.335 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC 06 91 7E CB 06 8A 3B   A5 86 49 2D 75 03 B0 E5  .......;..I-u...
#     0010: 64 70 17 FB 0A 57 40 3D   64 B0 59 07 24 EB DE 92  dp...W@=d.Y.$...
#     0020: 14 0E A4 55 15 36 8F F2   51 58 29 6E 03 4A 04 C1  ...U.6..QX)n.J..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.338 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:32:00.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.339 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:32:00.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.340 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 02:32:00.340 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:00.340 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.340 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.343 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6A 3E 40 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:33.000 UTC",
#       "not  after"         : "2024-01-08 02:31:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 46 81 6F 51 54 0C EF   91 B4 DD CF 50 12 BB 67  .F.oQT......P..g
#           0010: B0 82 EC A7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 2D 02 1E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:26.000 UTC",
#       "not  after"         : "2024-01-08 02:31:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#           0010: 2E 67 E4 F5                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.369 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D EE 11 81 A1 F1 07 BB   BC EB 16 00 BC 62 1B 08  ]............b..
#     0010: B7 99 83 62 40 37 43 DD   8B 5B BA 18 03 94 F0 88  ...b@7C..[......
#     0020: D7 7E BC E4 BC 52 C6 B8   1B 7C 2F 3E FD 21 88 B9  .....R..../>.!..
#     0030: BC 2F 54 AC 6E 11 EA 2D   62 93 06 95 22 E3 B6 53  ./T.n..-b..."..S
#     0040: 54 E8 4F FB 63 B5 7D 1E   EB B1 64 FC A6 AE C2 6A  T.O.c.....d....j
#     0050: DC AD C7 CB BC 13 EB FD   4A 77 DE A1 7D D1 FF 5A  ........Jw.....Z
#     0060: 4E 67 BD 93 3A 0D 54 C5   BA 1C 4B 70 38 BF 2E 5D  Ng..:.T...Kp8..]
#     0070: 10 81 4C 44 E2 39 7F EE   28 C1 1F 9D 78 C5 B9 2D  ..LD.9..(...x..-
#     0080: 91 55 F4 B2 D7 50 11 0B   96 CA 15 7D 3F 5C 11 1C  .U...P......?\..
#     0090: 90 0B AA 61 77 F1 0D CB   EC 99 DE 8B 39 1B 1E DB  ...aw.......9...
#     00A0: 13 13 55 A6 83 18 FA 99   19 72 D9 1B 55 0E 16 16  ..U......r..U...
#     00B0: 0A 64 3B 0D 8C 35 A7 B0   2F D2 79 CB 50 A5 76 CD  .d;..5../.y.P.v.
#     00C0: FC 86 43 68 D6 A6 83 80   AF 30 F0 5B E6 10 88 CF  ..Ch.....0.[....
#     00D0: 61 32 CA 2A 2D 91 C1 D6   58 75 BA D5 D7 A2 93 F6  a2.*-...Xu......
#     00E0: 94 45 BD 78 30 2D CB F4   D5 F8 D2 4A 1E F8 13 6C  .E.x0-.....J...l
#     00F0: 2C F5 4E 26 86 37 05 76   8D 7D 49 78 CE F7 3B 01  ,.N&.7.v..Ix..;.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.370 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 71 56 7D 6C 23 C8 10   C3 39 30 4F 41 4B 98 26  .qV.l#...90OAK.&
#     0010: 51 BC 77 01 D7 3E FD 86   96 65 B5 2F BA C4 A0 BA  Q.w..>...e./....
#     0020: 6C F7 21 07 B0 6D 57 22   A9 C3 A3 46 14 8F 2E 56  l.!..mW"...F...V
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.371 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:00.425 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "25 DF 75 2E 25 77 F6 F1 C6 DC AC 06 EC A7 0C D3 24 AC DC C5 AD 2B 41 5D E6 BA CA 27 59 82 BB 33",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 02:32:00.690 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 02:32:00.691 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 02:32:12.000; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 02:32:12.349 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 2D 02 1E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:26.000 UTC",
#       "not  after"         : "2024-01-08 02:31:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#           0010: 2E 67 E4 F5                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 24 B4 41 FF 39 88 59   50 9A 29 98 10 A1 B4 E9  .$.A.9.YP.).....
#           0010: F0 4E AE F5                                        .N..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "30 9A C1 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 02:31:24.000 UTC",
#       "not  after"         : "2024-01-08 02:31:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FD 6C FE 2C F0 07 2E 86   26 BD 42 9E 89 CA E1 0D  .l.,....&.B.....
#           0010: 2E 67 E4 F5                                        .g..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 02:32:12.366 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:12.696 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:12.697 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:12.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:32:12.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:12.833 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.833 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:12.835 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 02:32:12.836 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.842 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.854 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 02:32:12.857 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D0 25 25 B3 E8 CA B6 CC 42 79 B9 E4 DF 4F 02 14 E1 35 95 AA D3 42 BA 48 97 DF 4C 2B 86 42 DB C3",
#     "session id"          : "B0 D3 77 1C 37 95 98 87 1E BA 83 4D AF 7E 77 B2 17 3B C5 67 CE 92 BB 07 FE E0 58 DA 46 87 CB 56",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 47 D2 E8 73 6A 31 F7 F6   DD 40 CD CF DA A4 62 64  G..sj1...@....bd
#               0010: 24 30 53 17 5E 9F 0A 80   EC E3 D0 D0 57 66 2B 24  $0S.^.......Wf+$
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.886 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "54 A3 9D 9E 34 D7 8C A6 AD 5A 89 73 60 AC 6B 0E 37 B9 84 E2 72 B4 CE 10 F3 D3 77 D4 CA 81 4C C2",
#     "session id"          : "B0 D3 77 1C 37 95 98 87 1E BA 83 4D AF 7E 77 B2 17 3B C5 67 CE 92 BB 07 FE E0 58 DA 46 87 CB 56",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1C DE 04 3C 7E 70 BA 69   EE 5E B2 90 9B F1 0D 5D  ...<.p.i.^.....]
#             0010: 80 41 0F 1C BD A9 02 CC   30 23 19 52 41 A2 60 55  .A......0#.RA.`U
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.886 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.886 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.888 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.891 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.891 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.891 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:12.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:12.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.901 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.903 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.904 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.908 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.908 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.908 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.908 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.908 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.909 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.909 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:12.909 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:32:12.909 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 02:32:12.911 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 02:33:33.219 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:33:33.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:33:33.263 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:33:33.263 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 02:33:33.263 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44652/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28332ms
ok 65 stop command for single port in 30951ms
ok 66 status detects locally running solr in 14340ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2186ms
ok 69 copying files around in 6550ms
ok 70 upconfig in 2656ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 18s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m43.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5631 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5631/

All tests passed

Build Log:
[...truncated 1332 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36757/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-10 00:09:21.351; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 00:09:21.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-10 00:09:22.273; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-10 00:09:22.314; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23775ms
ok 61 start solr with client truststore and security manager in 25562ms
not ok 62 start solr with mTLS needed in 60514ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MpiNF5/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36757.
#
# Started Solr server on port 36757 (pid=201076). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36758.
#
# Started Solr server on port 36758 (pid=201504). Happy searching!
#
# INFO  - 2023-10-10 00:10:46.670; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 00:10:46.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 00:10:47.057; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 00:10:47.060; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 00:10:47.061; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:47.094 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 3D 2A E7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:22.000 UTC",
#     "not  after"         : "2024-01-08 24:10:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 31 29 57 34 2D E1 5B   BF 5D 45 E3 E3 BB 9C 29  f1)W4-.[.]E....)
#         0010: 8B D1 E7 70                                        ...p
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:47.099 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 FB BD 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:14.000 UTC",
#     "not  after"         : "2024-01-08 24:10:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:47.115 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:47.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:47.203 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:47.204 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:47.204 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:47.341 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:47.343 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:47.343 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.360 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.360 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.360 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:47.362 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 86 34 5A 5F E3 87 29 88 E0 73 46 64 87 B2 C1 42 77 0D F8 79 36 CC 98 50 E0 1D 27 59 81 99 55",
#   "session id"          : "5B B3 09 46 BD 60 E1 0C 73 BF 83 93 39 66 41 BE 0E 75 F2 22 3B CA E8 4D 84 58 FB 24 3B 23 B6 12",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 84 F3 21 5C 8B AE 9E 3C   E2 AD 5D 85 A1 8F 1D EC  ..!\...<..].....
#             0010: 59 B4 85 2D 42 C2 C3 65   23 8E 4E 44 C5 67 DF 0A  Y..-B..e#.ND.g..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.477 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 F7 AC DF B4 FD CA 2E 98 83 52 3D F5 6E C7 B1 8A AC CB 24 CE 5F D4 40 F1 8B E4 8C 37 F3 C5 27",
#   "session id"          : "5B B3 09 46 BD 60 E1 0C 73 BF 83 93 39 66 41 BE 0E 75 F2 22 3B CA E8 4D 84 58 FB 24 3B 23 B6 12",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 C4 3D 13 56 BE 75 97   D9 D0 AB DE 01 71 7F B6  w.=.V.u......q..
#           0010: 9A EF D1 B9 44 14 8E 51   57 0F C7 21 BA 75 01 51  ....D..QW..!.u.Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.477 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.477 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.478 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.479 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.481 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.481 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.481 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.482 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.490 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.492 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.493 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.496 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.497 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.497 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.497 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.497 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.499 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.500 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.500 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.500 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.501 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.502 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.504 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 CA B6 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:19.000 UTC",
#       "not  after"         : "2024-01-08 24:10:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C E6 18 F4 8A 42 75 1C   F7 DC 4F 66 DE 36 C1 5B  .....Bu...Of.6.[
#           0010: 2A E6 A0 B8                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.505 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.585 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.589 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 3E 91 5E DA 63 89 5F   06 89 E9 DF 24 9F F3 59  z>.^.c._....$..Y
#     0010: 17 44 E0 EB E1 41 0E 9F   EE 81 30 A0 E4 50 C3 F1  .D...A....0..P..
#     0020: 68 FC DB 2B FA F1 62 CC   21 2C 32 65 5B BC C4 BD  h..+..b.!,2e[...
#     0030: DF DB 4D 70 83 3A 33 AF   65 28 73 D5 D3 05 36 36  ..Mp.:3.e(s...66
#     0040: D2 F3 80 DD B0 03 01 C0   8E 96 B0 A2 B0 C9 DF 5F  ..............._
#     0050: 55 DC AF 58 8D B2 E9 AC   6C 8D 08 77 7B A6 68 94  U..X....l..w..h.
#     0060: A1 BE 6F DA 87 2C E7 0C   BD CB 2D 62 53 64 8C 70  ..o..,....-bSd.p
#     0070: A4 6C EB F9 0F BB 5B 43   9C E8 46 9E 47 F5 24 63  .l....[C..F.G.$c
#     0080: 80 31 60 03 17 27 A6 CC   81 DD D7 A1 B3 B1 8F 4A  .1`..'.........J
#     0090: B8 B2 A8 60 B7 B4 78 6C   22 3E B8 AD 72 A3 39 45  ...`..xl">..r.9E
#     00A0: 5C 1A 32 D8 9A 8D B5 C3   21 B1 F7 FD 6E FE F9 1B  \.2.....!...n...
#     00B0: AB 7B AB 3A 4D 68 A6 B0   89 28 A5 C2 76 8D 6E 77  ...:Mh...(..v.nw
#     00C0: 38 9F 05 B9 C3 26 46 E9   32 A6 7D 69 6D E4 8E 14  8....&F.2..im...
#     00D0: A4 61 5A C1 E0 EF 0E 59   57 25 6E F1 CF E0 24 3E  .aZ....YW%n...$>
#     00E0: 95 C7 7E 75 BB 0C 80 E7   56 2B 83 DC 33 50 72 4A  ...u....V+..3PrJ
#     00F0: B3 DA 77 8D B5 D5 16 B5   06 1F 9F 3E 99 35 2C A8  ..w........>.5,.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.591 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 2F 2D C4 43 03 AC 23   2E 0C A9 EC 38 B7 71 32  v/-.C..#....8.q2
#     0010: 22 E4 BD 03 37 3A 80 77   DB 21 85 58 F5 2E BE 75  "...7:.w.!.X...u
#     0020: 6F 15 9F F4 7C 87 0C F7   EA 06 3B C7 C1 B1 D3 E0  o.........;.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.593 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:47.594 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.594 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:47.594 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.595 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:47.595 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:47.595 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.595 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.598 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 3D 2A E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:22.000 UTC",
#       "not  after"         : "2024-01-08 24:10:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 31 29 57 34 2D E1 5B   BF 5D 45 E3 E3 BB 9C 29  f1)W4-.[.]E....)
#           0010: 8B D1 E7 70                                        ...p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 F3 94 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:16.000 UTC",
#       "not  after"         : "2024-01-08 24:10:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#           0010: 15 86 BE 17                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.622 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5C 97 0B 11 20 D3 6B BF   20 F2 7F C0 E3 B3 62 2D  \... .k. .....b-
#     0010: F2 11 7E EA 78 E4 F0 77   53 ED AF 5B F2 0B E1 77  ....x..wS..[...w
#     0020: 67 5F 4C 37 AF 23 E1 14   90 4B ED 66 E9 1E 21 E6  g_L7.#...K.f..!.
#     0030: BC E7 A7 12 87 37 B5 A6   D0 18 ED F9 F5 82 EB 0E  .....7..........
#     0040: AE 6A 9A 72 AA D3 7F DB   A6 F9 B7 1A DD 6B C5 9A  .j.r.........k..
#     0050: 84 7D 61 39 CE FF D0 F1   07 10 EA B0 1C 3E BF EB  ..a9.........>..
#     0060: 8D 2A 46 45 38 09 C8 40   07 CF 19 AF BB 1C 89 87  .*FE8..@........
#     0070: 00 C3 1E 38 6E FA FB 04   BF 19 AA 28 DE 45 90 BD  ...8n......(.E..
#     0080: F9 5F F1 E9 12 81 77 C6   FC 91 0B 7B 90 80 26 BB  ._....w.......&.
#     0090: 1D 17 0D BA 3E 48 07 F3   D6 3B 54 D5 D2 58 9B 36  ....>H...;T..X.6
#     00A0: B8 F9 34 DC 14 8B 72 A2   C2 B6 90 8A 4F 1A 3D C4  ..4...r.....O.=.
#     00B0: 94 ED CC CE 7E AD DB 30   8A AA 1A B3 84 E9 1D 31  .......0.......1
#     00C0: DB DF 08 C0 AF 9A 44 92   3B 81 39 14 5B 50 0C 60  ......D.;.9.[P.`
#     00D0: B1 24 D5 08 FA 72 ED 02   0C BB 51 83 1C EB 95 44  .$...r....Q....D
#     00E0: 99 F3 41 6F 10 27 73 8F   F8 AC 1D 06 DE 8B 85 E4  ..Ao.'s.........
#     00F0: BF 88 69 C5 53 9F D1 96   0E EB 98 E5 70 66 6C DE  ..i.S.......pfl.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.623 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A0 CE D6 54 18 27 18 03   E0 69 02 9E 93 21 5F 26  ...T.'...i...!_&
#     0010: 12 AE A0 2E 6E 8C 27 60   F7 27 46 6D AE 58 53 26  ....n.'`.'Fm.XS&
#     0020: BF F9 86 C6 40 8A 33 99   D9 61 77 4E BE 75 57 3E  ....@.3..awN.uW>
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.624 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:47.671 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "64 2E 4B E7 44 5B E0 2B FF EC 85 83 F3 F2 1F 9B 14 7D E3 1B 89 BE 39 46 7C 74 8C A8 08 7A BE 10",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 24:10:47.955 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 24:10:47.956 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 00:10:48.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 00:10:48.915; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 00:10:49.286; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 00:10:49.289; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 00:10:49.290; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MpiNF5/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:49.322 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 3D 2A E7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:22.000 UTC",
#     "not  after"         : "2024-01-08 24:10:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 31 29 57 34 2D E1 5B   BF 5D 45 E3 E3 BB 9C 29  f1)W4-.[.]E....)
#         0010: 8B D1 E7 70                                        ...p
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:49.327 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 FB BD 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:14.000 UTC",
#     "not  after"         : "2024-01-08 24:10:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 24:10:49.342 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:49.706 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:49.707 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:49.707 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:10:49.707 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:49.864 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.864 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:49.866 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:10:49.867 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.884 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.885 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.885 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:10:49.887 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "33 E9 88 36 E3 96 3B A4 0A 32 5F 4B 5F B9 4A 13 C7 5B 5A 19 F3 43 8D C6 0C 48 F5 B2 94 CD 5E 16",
#   "session id"          : "19 42 2E D2 2F 6C 90 A3 EA BA A0 5F 15 1C D4 95 91 19 43 9F BB 22 32 E6 6C E3 EE ED C2 95 FB 8D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 98 36 58 F0 15 9C 67 D3   77 29 AF FF 83 E6 EF 1B  .6X...g.w)......
#             0010: 47 D1 37 57 AB C7 2C B5   78 A5 89 D9 27 49 F8 14  G.7W..,.x...'I..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.992 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "15 07 A6 C5 9A A3 36 5B E2 9A 8E 1F 7C 78 DC 12 D0 77 90 62 C9 E4 47 8C C3 65 E4 C1 1E E7 33 93",
#   "session id"          : "19 42 2E D2 2F 6C 90 A3 EA BA A0 5F 15 1C D4 95 91 19 43 9F BB 22 32 E6 6C E3 EE ED C2 95 FB 8D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E5 E2 AB A6 55 E5 F7 2C   E6 58 19 D0 16 EF 74 BB  ....U..,.X....t.
#           0010: 44 1F 46 10 A4 84 3C 38   AF 2E 7B B3 8B 3A 6F 23  D.F...<8.....:o#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.992 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.993 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.995 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.997 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.997 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:49.998 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:49.999 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:49.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.006 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.007 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.008 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.012 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.012 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.012 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.013 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.015 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.015 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.015 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.016 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.016 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.017 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.020 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 CA B6 C7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:19.000 UTC",
#       "not  after"         : "2024-01-08 24:10:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C E6 18 F4 8A 42 75 1C   F7 DC 4F 66 DE 36 C1 5B  .....Bu...Of.6.[
#           0010: 2A E6 A0 B8                                        *...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.110 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 F3 94 AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 24:10:16.000 UTC",
#     "not  after"         : "2024-01-08 24:10:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#         0010: 15 86 BE 17                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#         0010: 65 79 8F C3                                        ey..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.114 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 ED A5 DA FE D7 5A 77   B2 9A 3C 75 9F 87 CF EF  x.....Zw..<u....
#     0010: 04 0B C8 EC E4 C3 46 20   D1 E9 0B BC 59 68 24 0F  ......F ....Yh$.
#     0020: DB 86 7E 66 20 1E 59 A6   DF A6 CA 9F F1 E8 8E 78  ...f .Y........x
#     0030: 59 2B A4 9D BA 2D 1F AB   F0 C1 FC EC E7 6D F2 EF  Y+...-.......m..
#     0040: D9 61 C2 13 56 DB C4 F6   AE 53 9D B2 46 BE 39 15  .a..V....S..F.9.
#     0050: 23 74 44 15 0B AD 0E 5B   29 2C FC 52 2E D9 59 DD  #tD....[),.R..Y.
#     0060: 52 F3 BB 24 44 A4 BB DE   EE 7B 07 93 C4 AA C5 27  R..$D..........'
#     0070: 80 A8 CD 4A EF 35 9F 66   FD B2 08 C2 C9 04 AA B9  ...J.5.f........
#     0080: A7 95 4D 62 F3 6F 89 E4   F3 DB F4 38 84 8D 44 21  ..Mb.o.....8..D!
#     0090: 2D 08 74 C4 9B 38 46 B3   5E BD B9 AE C4 4E AE D6  -.t..8F.^....N..
#     00A0: D8 A9 3D 76 DA D0 57 36   E0 86 19 55 27 2A 1B 7C  ..=v..W6...U'*..
#     00B0: 03 88 23 2D E2 28 0F 32   33 12 5C 1F 63 AE 35 FF  ..#-.(.23.\.c.5.
#     00C0: 32 A3 0F C6 5E 7E 2E B6   D8 ED C4 39 4C 63 6F 11  2...^......9Lco.
#     00D0: C7 5A CD 12 24 66 68 DC   4D 1D AE AE 5F 6B 97 66  .Z..$fh.M..._k.f
#     00E0: 61 07 90 A7 C8 75 7E A5   47 0C 36 E9 70 4A F3 0B  a....u..G.6.pJ..
#     00F0: 14 CC C1 84 BF 2B 93 65   8C 6E 04 76 06 B4 D6 C6  .....+.e.n.v....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.116 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 69 CD C2 79 10 2F FC   75 7D E1 36 3D 82 5C CE  .i..y./.u..6=.\.
#     0010: 7C 98 0A 91 25 46 B0 2C   AE CF 00 76 B7 BB 7F 84  ....%F.,...v....
#     0020: 03 87 8B 2E FC 93 E8 75   B1 2F 20 DA 1A 28 8C E9  .......u./ ..(..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:50.119 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.119 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:50.119 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.119 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-10 24:10:50.120 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:10:50.120 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.121 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.123 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 3D 2A E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:22.000 UTC",
#       "not  after"         : "2024-01-08 24:10:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 31 29 57 34 2D E1 5B   BF 5D 45 E3 E3 BB 9C 29  f1)W4-.[.]E....)
#           0010: 8B D1 E7 70                                        ...p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 F3 94 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:16.000 UTC",
#       "not  after"         : "2024-01-08 24:10:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#           0010: 15 86 BE 17                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.149 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 90 CE 4C 1D 83 4C F4   B3 9E 68 10 08 D4 85 88  )..L..L...h.....
#     0010: 91 52 75 25 CE 54 F4 29   13 EE 9C D7 45 58 3B F0  .Ru%.T.)....EX;.
#     0020: 4F DF B9 A8 45 78 CA 36   91 72 4E 5E 2C 3C A5 DD  O...Ex.6.rN^,<..
#     0030: 63 8A 3B 69 54 1D E8 63   95 9C 7F DB AF 76 63 0E  c.;iT..c.....vc.
#     0040: D0 BB 1C 9E A5 E4 92 38   0D 36 D2 20 72 5F 22 59  .......8.6. r_"Y
#     0050: AE 07 BF 25 F6 6B 87 9E   76 59 92 5A 29 9C 80 E0  ...%.k..vY.Z)...
#     0060: 35 0A D1 22 F0 01 0E 68   5A 94 D8 EB C0 23 36 56  5.."...hZ....#6V
#     0070: 8B 6A 3D D0 D3 BA 78 D4   68 2F 30 AD 86 1B B8 0B  .j=...x.h/0.....
#     0080: 3E 25 43 68 F5 71 D2 7C   4F D1 03 49 54 EF CA 42  >%Ch.q..O..IT..B
#     0090: A9 4E F3 F1 53 FE AD A7   82 19 2D 64 D4 AE 41 62  .N..S.....-d..Ab
#     00A0: 0D C4 D1 36 72 00 55 4E   E3 FB F1 C8 DB B5 3B 18  ...6r.UN......;.
#     00B0: 6F F4 45 BF 4B D4 26 24   80 41 84 DA 4C B4 DE E9  o.E.K.&$.A..L...
#     00C0: 25 D5 CA 7F F0 36 9D E8   A3 47 03 0F 56 AC 75 00  %....6...G..V.u.
#     00D0: 58 7F BA 90 DF 9B 9D 46   1C BD 55 B3 28 99 A2 E2  X......F..U.(...
#     00E0: F7 21 DF 33 14 5A A0 0B   31 14 52 3D B8 BD CA BD  .!.3.Z..1.R=....
#     00F0: 35 28 4B 80 77 BE 02 6F   71 6E CE 81 FA 2D 36 58  5(K.w..oqn...-6X
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.150 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C 29 29 25 02 92 C2 8F   99 49 E3 4A 9B 12 2B 20  l))%.....I.J..+
#     0010: 0D AB B3 C4 D2 A5 85 7D   0D F7 C8 1D FB 6B D7 62  .............k.b
#     0020: 56 B4 DF C3 E8 76 1E D0   7E 71 DD 0E 00 42 41 AB  V....v...q...BA.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.150 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:10:50.201 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A1 0A 32 2F C4 43 16 3F 7A 82 01 12 0D CA 4A B6 33 E5 0E 2F 2F 3D 58 0F 6C DB 0C AF 2B 9C 93 C7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 24:10:50.472 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 24:10:50.473 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-10 00:11:01.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 24:11:01.721 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 F3 94 AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:16.000 UTC",
#       "not  after"         : "2024-01-08 24:10:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#           0010: 15 86 BE 17                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 CD 6F 7B B0 A4 FB B1   37 72 D8 ED 40 05 E9 93  X.o.....7r..@...
#           0010: 65 79 8F C3                                        ey..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 FB BD 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 24:10:14.000 UTC",
#       "not  after"         : "2024-01-08 24:10:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B6 D5 84 47 AD 70 7A   AB A5 72 12 95 4E B6 9E  n...G.pz..r..N..
#           0010: 15 86 BE 17                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 24:11:01.736 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:11:01.967 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:11:01.969 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-10 24:11:01.970 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.976 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.988 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.988 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.988 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-10 24:11:01.991 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A9 38 96 29 56 99 CB C0 8A 4F CB 73 5E 4C F6 84 04 CF 31 0C C9 BB B8 56 6B 8D CA F9 F5 2F E3 95",
#     "session id"          : "B8 0B 85 38 F4 61 8A 60 E7 C1 4C 5B 11 56 B1 C4 3C 15 AD F5 CB 58 5B 10 9C 5B E9 C6 76 6E BC 5F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 47 A0 F0 F8 62 E7 31 EA   A6 F2 5C 46 56 E0 B5 8B  G...b.1...\FV...
#               0010: 1B 5D E3 DC D6 83 CD 34   2C C9 E7 C0 A5 F3 34 46  .].....4,.....4F
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.013 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D4 25 A6 C0 21 D6 74 43 27 92 3A 53 24 35 32 FB 16 DD 07 79 90 E1 C2 83 90 E8 0F 00 26 57 A5 82",
#     "session id"          : "B8 0B 85 38 F4 61 8A 60 E7 C1 4C 5B 11 56 B1 C4 3C 15 AD F5 CB 58 5B 10 9C 5B E9 C6 76 6E BC 5F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 54 29 D6 2A 4F 40 D6   8E C8 6B 17 98 2F 97 D0  $T).*O@...k../..
#             0010: 7D 9D F5 D0 56 70 13 19   1E 51 49 4F 2B 1F B8 71  ....Vp...QIO+..q
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.013 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.013 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.014 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.015 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.017 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:11:02.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:11:02.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.020 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.027 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.029 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.030 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.033 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:11:02.034 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-10 24:11:02.036 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-10 24:12:26.193 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:12:26.242 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:12:26.242 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:12:26.242 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 24:12:26.243 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36758/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28491ms
ok 65 stop command for single port in 31280ms
ok 66 status detects locally running solr in 14453ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2214ms
ok 69 copying files around in 6664ms
ok 70 upconfig in 2669ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 30s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m57s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5630 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5630/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([A4FF02D499947D39:910BE98F72484B67]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:212)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6336 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=A4FF02D499947D39 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 7m 13s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m41s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5629 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5629/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45603/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-09 13:25:07.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 13:25:07.067; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-09 13:25:08.266; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 13:25:08.309; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22730ms
ok 61 start solr with client truststore and security manager in 24530ms
not ok 62 start solr with mTLS needed in 60920ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-iSks8C/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45603.
#
# Started Solr server on port 45603 (pid=200999). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45604.
#
# Started Solr server on port 45604 (pid=201432). Happy searching!
#
# INFO  - 2023-10-09 13:26:30.693; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 13:26:30.699; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 13:26:31.064; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 13:26:31.067; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 13:26:31.068; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:31.103 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 9C 60 32",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:06.000 UTC",
#     "not  after"         : "2024-01-07 13:26:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 E2 A2 00 98 FC 1D 87   2F CD D8 DC 31 B1 70 A4  ......../...1.p.
#         0010: A4 61 64 FD                                        .ad.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:31.107 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 13 6E 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:25:58.000 UTC",
#     "not  after"         : "2024-01-07 13:25:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:31.123 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:31.499 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:31.500 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:31.500 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:31.500 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:31.645 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.645 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:31.647 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:31.647 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.654 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.665 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.665 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.665 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:31.668 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5A 3E E8 C6 86 1E D6 54 C3 34 FF 4B 85 74 AF 24 02 0F 32 1D EB 9E 56 27 D9 AD A9 38 C7 1C 80 73",
#   "session id"          : "6E 27 4B EA AD E3 54 F1 FE A3 9F 22 79 53 88 04 AA 80 33 CE 40 B0 F7 3C 55 8F 1A D1 00 73 6D 3D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 87 75 7B 1C 45 44 D0 34   67 4B 70 A2 B5 65 6F A3  .u..ED.4gKp..eo.
#             0010: 58 7E 9D 1F 5E 68 B7 5E   EE 87 78 8F 9C 7F 47 2A  X...^h.^..x...G*
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.785 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4D 5E 80 B2 C1 77 2C 38 4D A1 73 FB 28 DE 03 88 2F 08 B9 21 2E F0 6E A3 90 4B DC E0 1E F6 DD 4B",
#   "session id"          : "6E 27 4B EA AD E3 54 F1 FE A3 9F 22 79 53 88 04 AA 80 33 CE 40 B0 F7 3C 55 8F 1A D1 00 73 6D 3D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A1 18 EA 70 DE 47 C1 7D   31 09 1C 00 47 08 AC A3  ...p.G..1...G...
#           0010: 2C FC A1 B5 E6 B3 97 00   10 93 27 77 5B 25 AF 3F  ,.........'w[%.?
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.785 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.785 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.786 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.786 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.787 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.789 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.789 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.790 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.792 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.799 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.800 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.802 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.805 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.806 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.806 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.809 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.809 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.809 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.810 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.811 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.812 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.815 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A E1 F5 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:03.000 UTC",
#       "not  after"         : "2024-01-07 13:26:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 37 32 06 98 7D 73 95   34 CF 3F 32 2B AA BE D5  172...s.4.?2+...
#           0010: C7 B4 5D DA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.815 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.896 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.900 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 16 DD 25 C2 22 B0 E7   CD A5 CA AA BB F7 27 23  _..%."........'#
#     0010: 04 77 2A 9D F5 B5 3D EE   55 96 3F F4 1D 37 E8 2B  .w*...=.U.?..7.+
#     0020: D4 7C B8 33 B3 E6 F5 11   58 3A 78 E0 6F CA 8B B8  ...3....X:x.o...
#     0030: D1 C4 E7 BA 3D EF AE 88   70 65 F6 C1 0E BE 52 09  ....=...pe....R.
#     0040: 2D 47 7D BE 41 7C 3C 39   75 5E 0D A5 0A A4 0B CF  -G..A.<9u^......
#     0050: FD 31 A1 44 1C 00 F7 54   B3 47 BB 46 AD A6 1E 18  .1.D...T.G.F....
#     0060: 22 79 98 C8 37 BF EA E5   C8 D3 97 47 A4 CA 58 4B  "y..7......G..XK
#     0070: EB DC 47 DA 8E FE 63 3C   B0 0E 66 A9 5E CD 5C 05  ..G...c<..f.^.\.
#     0080: 42 05 96 B1 64 75 5B D7   C7 CD 5E 8F BE 0E 9D C3  B...du[...^.....
#     0090: BC 52 2A EB C3 48 85 F0   1D 61 A9 FF 49 E6 66 37  .R*..H...a..I.f7
#     00A0: 2C 3B A2 BC D3 5D 72 F9   72 6C DF 90 9F 32 F0 EB  ,;...]r.rl...2..
#     00B0: A6 53 A5 F6 8A 0B 64 AB   80 9E 2A C8 5C C8 9D 41  .S....d...*.\..A
#     00C0: F4 CE E6 A1 D8 E5 1B 1C   9D 7A B4 D7 38 91 0F C5  .........z..8...
#     00D0: 52 2C 83 7C 48 FB 0C 6E   67 11 3E 73 49 B2 FE EF  R,..H..ng.>sI...
#     00E0: 65 C1 73 FD 38 C8 DE 04   60 83 C6 D2 D6 6B 6F 59  e.s.8...`....koY
#     00F0: 9C A1 C2 A3 20 B6 0D E4   A5 8D D7 C2 50 FA 00 89  .... .......P...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.902 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F3 DC 9E 5E 5F 01 BD 60   72 2D C9 F7 A3 58 A0 68  ...^_..`r-...X.h
#     0010: 0B D6 C7 9B C5 F6 D0 D7   D2 8C 87 D1 90 4A 1B 1E  .............J..
#     0020: FF DC A9 8F 00 3D 61 03   06 A6 65 52 17 15 08 A2  .....=a...eR....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.904 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:31.905 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.906 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:31.906 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.906 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:31.906 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:31.907 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.907 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.909 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 9C 60 32",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:06.000 UTC",
#       "not  after"         : "2024-01-07 13:26:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 E2 A2 00 98 FC 1D 87   2F CD D8 DC 31 B1 70 A4  ......../...1.p.
#           0010: A4 61 64 FD                                        .ad.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 02 1C DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:00.000 UTC",
#       "not  after"         : "2024-01-07 13:26:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#           0010: 5E D8 C5 A8                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.935 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E A3 3B 6D A3 9A 0D B0   08 DA 72 DC E1 9E CB F3  ..;m......r.....
#     0010: ED 11 B6 DE FD 13 F9 51   40 22 E7 39 45 54 E7 28  .......Q@".9ET.(
#     0020: 9E D2 31 C4 57 EF 7C 13   7B C2 CE 10 42 BA 62 08  ..1.W.......B.b.
#     0030: 0E 9C 69 48 D4 63 CA 21   C5 D9 4A D1 E8 76 5E 82  ..iH.c.!..J..v^.
#     0040: 4A 5A AA ED 09 7A A7 EE   82 CF F0 46 5E 97 54 20  JZ...z.....F^.T
#     0050: 5F 97 D4 75 E1 02 75 00   0C 76 37 81 93 EB 66 A0  _..u..u..v7...f.
#     0060: 28 B8 E7 00 4E A7 86 CD   D9 56 2F F9 63 2E F4 DA  (...N....V/.c...
#     0070: 34 85 17 12 76 C4 EA 2F   A6 66 4A ED 49 75 37 86  4...v../.fJ.Iu7.
#     0080: 6E BE 2F 48 54 75 DB B6   54 30 96 12 59 BA 40 78  n./HTu..T0..Y.@x
#     0090: 06 D1 C8 85 73 DD 59 AE   34 75 C7 6B 0A 4D BC 20  ....s.Y.4u.k.M.
#     00A0: 04 42 22 CC 20 18 51 61   DF 84 A9 85 DB 6E 5B 8B  .B". .Qa.....n[.
#     00B0: 2B 96 D5 3B B2 0D 10 26   EA B4 98 64 AA A5 91 24  +..;...&...d...$
#     00C0: 6A 02 22 76 33 62 35 61   6B 36 67 68 AC C1 E9 3A  j."v3b5ak6gh...:
#     00D0: C4 97 C8 05 89 CE 01 81   52 05 1D B1 16 FA 5F 8F  ........R....._.
#     00E0: 45 E1 86 2E FF CE C0 A5   3E 07 0B DF 8A B6 6E 6D  E.......>.....nm
#     00F0: D3 D5 93 C1 E2 AE 8B DE   B0 4C 14 A5 CD 4E 34 2B  .........L...N4+
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.936 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 67 6E 08 70 0D C4 56 6B   3C 2E AF EE C6 BF 79 D5  gn.p..Vk<.....y.
#     0010: D9 2D A7 1D D4 BF DA 9B   71 C6 7A F0 E9 DD 86 E7  .-......q.z.....
#     0020: ED CF BB 44 60 40 5F C2   7E 1C 45 C7 3C A9 37 DA  ...D`@_...E.<.7.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.936 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:31.989 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "47 3B 13 C8 04 94 7D 1A F9 50 BF FC 2B 52 13 6B 0D 85 3B 3F E3 FE 55 C4 D6 6B 7C C5 01 F2 D0 72",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 13:26:32.281 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 13:26:32.283 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 13:26:33.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 13:26:33.207; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 13:26:33.571; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 13:26:33.574; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 13:26:33.574; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iSks8C/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:33.605 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 9C 60 32",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:06.000 UTC",
#     "not  after"         : "2024-01-07 13:26:06.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 E2 A2 00 98 FC 1D 87   2F CD D8 DC 31 B1 70 A4  ......../...1.p.
#         0010: A4 61 64 FD                                        .ad.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:33.610 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 13 6E 16",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:25:58.000 UTC",
#     "not  after"         : "2024-01-07 13:25:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:33.624 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:33.847 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.847 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:33.849 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:33.849 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.855 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.866 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:33.868 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 80 55 1D F5 B9 50 E8 69 ED 26 76 85 0F BA 2B C3 04 94 DD 5B 5C E7 4C 6F 18 D8 90 50 97 30 1F",
#   "session id"          : "A4 D3 CD 62 2D 89 B7 DA 15 FB 47 93 D1 FD A5 EF 83 B8 6E 17 CF 54 30 A6 BA A8 A2 F9 DF 12 BC C9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 92 C4 DD 8E 89 BC FC 62   FE 28 6D 2A 28 7A 3D 0C  .......b.(m*(z=.
#             0010: 1C D3 58 07 21 EB 81 DB   BC 89 38 96 2B C6 F6 14  ..X.!.....8.+...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.967 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "69 AF 4D 12 9B 41 A6 0A 87 88 EA AD 03 B2 67 9C DB 99 80 5B 6A 17 5B 18 0B 93 CC 73 5F C6 F0 3D",
#   "session id"          : "A4 D3 CD 62 2D 89 B7 DA 15 FB 47 93 D1 FD A5 EF 83 B8 6E 17 CF 54 30 A6 BA A8 A2 F9 DF 12 BC C9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 65 ED E2 BC 00 53 87 78   E8 6E CA 28 C8 6A BC 6C  e....S.x.n.(.j.l
#           0010: 52 64 08 2A 5B C7 F4 22   37 B4 A2 87 9A B0 3A 2E  Rd.*[.."7.....:.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.967 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.967 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.969 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.971 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.971 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.983 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.986 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.987 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:33.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:33.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.989 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.989 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.990 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.990 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.991 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.991 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:33.991 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.994 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A E1 F5 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:03.000 UTC",
#       "not  after"         : "2024-01-07 13:26:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 37 32 06 98 7D 73 95   34 CF 3F 32 2B AA BE D5  172...s.4.?2+...
#           0010: C7 B4 5D DA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:33.995 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:34.046 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:34.047 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:34.047 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:34.047 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.075 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 02 1C DD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 13:26:00.000 UTC",
#     "not  after"         : "2024-01-07 13:26:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#         0010: 5E D8 C5 A8                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#         0010: B0 06 CB EA                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.079 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 31 6C 72 E0 22 31 1C   EA 3A 7E 39 3C AD 23 BA  .1lr."1..:.9<.#.
#     0010: 59 C8 9A BA 8D F0 B2 EB   EC 96 C1 4E 30 7F 0E C8  Y..........N0...
#     0020: 7C C9 7B A3 BE C8 B1 C1   D5 36 75 35 86 BB C6 99  .........6u5....
#     0030: BE 03 DC AC 0A 65 F2 07   B3 27 15 21 23 ED 3D 03  .....e...'.!#.=.
#     0040: 9E 11 DA 82 2A 65 30 FC   EB 10 86 A7 94 0C C6 C5  ....*e0.........
#     0050: E6 7A 77 4F 32 1C 3B 97   DE E0 0D 01 F3 E9 1D 96  .zwO2.;.........
#     0060: 7B EB 3D ED CE 3E 6A 7B   B0 55 A8 FE 4F D4 30 33  ..=..>j..U..O.03
#     0070: 89 72 A1 3A 33 9C 54 1F   23 7F A3 A5 28 A1 26 B1  .r.:3.T.#...(.&.
#     0080: 17 C7 D7 C9 E4 DF 7C CC   EF 94 EC F3 49 B8 11 52  ............I..R
#     0090: D5 4D F0 5F C6 A1 70 0E   C4 AE B7 38 60 23 FE 6C  .M._..p....8`#.l
#     00A0: DD 42 06 0D 59 02 6A 22   20 10 77 28 19 2B 1A EF  .B..Y.j" .w(.+..
#     00B0: 0F 4D 39 10 A6 AC 3B B0   22 6B 39 97 28 BE 3D 32  .M9...;."k9.(.=2
#     00C0: 78 DD 3A 3C 69 02 E6 9F   39 9A 04 AE 4A 6C 06 8C  x.:<i...9...Jl..
#     00D0: 80 C0 06 3D 56 BF 93 52   4F C0 74 BD CB 4A E3 DC  ...=V..RO.t..J..
#     00E0: 10 FD BD D6 36 6E 87 B7   28 91 87 01 B5 92 AA 1A  ....6n..(.......
#     00F0: 77 4F 4E B6 21 8F C3 1E   4D 1A 0A 32 D2 DB 78 B3  wON.!...M..2..x.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.080 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 2E CE 04 43 E2 8F 9E   23 0D 31 1B 3F 24 C7 00  ....C...#.1.?$..
#     0010: 16 D6 FF 5E 97 E5 17 59   A6 87 7E ED 7B E8 38 91  ...^...Y......8.
#     0020: 9A 85 7F 2E 76 F7 D4 AE   3A DF D1 42 24 BA D6 DF  ....v...:..B$...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.083 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:34.084 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:34.084 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:34.084 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:34.084 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 13:26:34.084 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:34.085 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.085 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.087 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 9C 60 32",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:06.000 UTC",
#       "not  after"         : "2024-01-07 13:26:06.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 E2 A2 00 98 FC 1D 87   2F CD D8 DC 31 B1 70 A4  ......../...1.p.
#           0010: A4 61 64 FD                                        .ad.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 02 1C DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:00.000 UTC",
#       "not  after"         : "2024-01-07 13:26:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#           0010: 5E D8 C5 A8                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.114 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 50 19 3E 4A BB 2C C9   2A C0 75 30 74 C2 A3 BB  hP.>J.,.*.u0t...
#     0010: 5A 41 0A A7 E4 64 0F 8E   08 4E 8A 85 15 D6 F8 9D  ZA...d...N......
#     0020: 1B 28 13 83 1A 19 DA E5   6D 30 BB 2B 5D EF 37 CF  .(......m0.+].7.
#     0030: A0 A5 C9 81 72 C0 F3 F6   2C EE B2 66 F0 BA E6 2C  ....r...,..f...,
#     0040: 70 4F 78 B7 39 3F 92 5F   DB 4D E6 D9 6C 85 67 02  pOx.9?._.M..l.g.
#     0050: D4 AA 8B 6D 53 0C 59 AC   9F 61 C6 71 46 3D E0 1A  ...mS.Y..a.qF=..
#     0060: 63 49 22 0F D2 73 80 AD   8D E7 15 B7 97 6E B6 7A  cI"..s.......n.z
#     0070: B3 9F 27 AE 34 94 F1 AC   4C 62 1A 54 81 01 6E 9E  ..'.4...Lb.T..n.
#     0080: 3A E2 20 7B CA 6F A5 3C   89 36 D0 E5 6F 2E 38 FB  :. ..o.<.6..o.8.
#     0090: AC 4A 4B 79 25 07 7F 4F   77 94 32 ED D8 C1 52 1B  .JKy%..Ow.2...R.
#     00A0: E6 8B F9 2E BF 18 F9 5F   C9 5A 0E A1 EB 64 EC B7  ......._.Z...d..
#     00B0: 1E 36 FE 25 47 B1 58 C2   BF C7 1F 0A 85 79 F6 3E  .6.%G.X......y.>
#     00C0: C1 4F 10 2F 58 FD C3 A4   37 4E 20 89 F4 6B E3 90  .O./X...7N ..k..
#     00D0: 1C 0A 72 4E E8 92 67 06   F2 FC 83 CC F7 92 A7 EC  ..rN..g.........
#     00E0: 58 AB 5D 98 B0 89 86 C1   9C 8B C1 0E 67 57 B4 61  X.].........gW.a
#     00F0: 8B 3C 77 33 4C 36 5A CA   AA 2B 10 F5 A1 FD B7 34  .<w3L6Z..+.....4
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.115 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC 42 72 2C 0C 86 40 39   03 8A 3A 91 F8 B7 86 DD  .Br,..@9..:.....
#     0010: 01 3E B6 9B 2E 67 67 F3   26 A7 BC 9D 44 B4 46 4C  .>...gg.&...D.FL
#     0020: E4 F2 59 FD E2 D4 67 F6   83 BA 8E 4E 73 10 3C BD  ..Y...g....Ns.<.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.115 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:34.161 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "27 DE 66 7E 89 85 B8 52 16 4E 96 DB 33 23 69 76 98 32 2A 68 EF 1D D8 B8 01 38 39 A5 6D C5 FA 9C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 13:26:34.433 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 13:26:34.434 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 13:26:45.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:45.838 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 13 6E 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:25:58.000 UTC",
#       "not  after"         : "2024-01-07 13:25:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#           0010: 5E D8 C5 A8                                        ^...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 02 1C DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 13:26:00.000 UTC",
#       "not  after"         : "2024-01-07 13:26:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 57 2D A9 4F 9A 64 A8   51 7A 3F 41 13 1F 9F D1  #W-.O.d.Qz?A....
#           0010: 5E D8 C5 A8                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 E8 E8 D6 0D 6E 94 E7   1C 4E 59 88 16 49 2F 6B  #....n...NY..I/k
#           0010: B0 06 CB EA                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 13:26:45.854 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:46.254 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:46.255 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:46.256 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:26:46.256 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:46.337 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.337 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:46.339 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 13:26:46.339 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.344 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.356 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.356 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.356 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 13:26:46.359 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "FB 44 CC D5 8B 7F 22 03 79 47 34 DD A0 EC 2E A8 19 9E 4B 7B AE 65 BB 76 DA AB 0F 84 31 21 2C FA",
#     "session id"          : "3A 84 97 C8 17 07 67 3D 2C EC 66 FB 2F E2 A3 AD 87 EC 89 2E F2 AB 23 6F 5A 9A 91 65 1D F8 50 91",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F6 33 C1 42 48 7F 82 F3   BE D4 FC DA DD 03 6B AC  .3.BH.........k.
#               0010: BA 2A DE 72 7E 9C E8 23   DE 3E 35 8D D4 0D 30 27  .*.r...#.>5...0'
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.380 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "72 5F 4F AF B2 64 3D 46 64 12 EC 4F 32 48 97 69 F6 C5 DE BC 8D 12 B6 8E 92 24 71 74 B7 A0 50 68",
#     "session id"          : "3A 84 97 C8 17 07 67 3D 2C EC 66 FB 2F E2 A3 AD 87 EC 89 2E F2 AB 23 6F 5A 9A 91 65 1D F8 50 91",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 B1 CC A4 9B 7A 4F A8   A6 06 8E EE D9 60 CC 00  .....zO......`..
#             0010: 75 AC AD 74 78 CE 90 79   96 78 1B 41 F0 47 46 43  u..tx..y.x.A.GFC
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.380 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.380 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.381 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.381 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.381 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.382 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.382 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.382 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.382 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.382 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.384 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.384 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.385 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.385 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.385 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.385 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.386 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.393 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.394 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.396 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.399 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.399 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.399 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:26:46.400 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 13:26:46.402 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 13:28:08.901 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:28:08.942 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:28:08.942 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:28:08.942 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 13:28:08.942 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45604/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28353ms
ok 65 stop command for single port in 31112ms
ok 66 status detects locally running solr in 14604ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2155ms
ok 69 copying files around in 6506ms
ok 70 upconfig in 2571ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 24m 23s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m48s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5628 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5628/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35459/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-09 09:11:16.177; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 09:11:16.182; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-09 09:11:17.407; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 09:11:17.451; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22806ms
ok 61 start solr with client truststore and security manager in 25175ms
not ok 62 start solr with mTLS needed in 56915ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-CtKsVm/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35459.
#
# Started Solr server on port 35459 (pid=199043). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35460.
#
# Started Solr server on port 35460 (pid=199500). Happy searching!
#
# INFO  - 2023-10-09 09:12:40.493; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 09:12:40.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 09:12:40.872; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 09:12:40.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 09:12:40.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:40.907 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 B3 AF 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:16.000 UTC",
#     "not  after"         : "2024-01-07 09:12:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 86 73 62 83 EE 53 05   AB C8 F0 56 B1 2B 97 19  1.sb..S....V.+..
#         0010: 95 A1 2C 59                                        ..,Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:40.911 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 75 73 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:08.000 UTC",
#     "not  after"         : "2024-01-07 09:12:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:40.927 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:41.027 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:41.027 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:41.028 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:41.028 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:41.166 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.166 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:41.168 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:41.168 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.174 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.185 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.185 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.185 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:41.187 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "06 CE FB 77 6C 92 23 CD 9D B6 78 36 7E 05 D5 62 1B 96 15 28 8E E3 06 BB 3E 8D DD 87 7B EE 92 EE",
#   "session id"          : "7E 01 4F D4 48 3F 52 9A 49 86 1B AF AC 49 C7 7B B6 D0 69 11 8C AD E1 47 BA A8 DB 27 DC 06 74 E3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C5 96 EB F8 FF 9B 4A 58   52 B6 12 68 C2 54 FD A9  ......JXR..h.T..
#             0010: CC 6F BB 80 D0 76 16 44   2F 75 B4 30 8A 64 81 71  .o...v.D/u.0.d.q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.326 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3F 5A 60 B9 10 34 29 AA 59 B5 18 13 26 8D 79 F2 33 10 56 21 2B AC C0 11 8B CF 27 45 04 86 67 38",
#   "session id"          : "7E 01 4F D4 48 3F 52 9A 49 86 1B AF AC 49 C7 7B B6 D0 69 11 8C AD E1 47 BA A8 DB 27 DC 06 74 E3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 62 D0 32 2E 9E 46 DA 26   74 85 A2 AC 79 C3 15 8C  b.2..F.&t...y...
#           0010: 48 D0 8A 8A 53 9E 74 83   E6 15 B2 69 3A A3 F3 01  H...S.t....i:...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.327 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.327 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.328 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.328 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.329 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.331 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.332 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.332 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.333 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.342 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.344 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.345 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.349 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.349 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.349 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.349 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.349 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.350 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.350 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.350 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.352 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.352 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.352 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.353 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.354 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.355 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.355 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.359 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 5F CB 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:12.000 UTC",
#       "not  after"         : "2024-01-07 09:12:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 05 AA D3 9D B7 B6 5A   67 A2 A1 2B BB 91 C8 5E  .......Zg..+...^
#           0010: 7C 6F 46 E8                                        .oF.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.359 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.439 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.443 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 94 9E 15 9B 09 00 8F 0E   77 92 B7 A3 43 17 B1 4D  ........w...C..M
#     0010: C4 ED 76 AD 7C F4 ED 35   68 04 47 21 AF 60 F0 D4  ..v....5h.G!.`..
#     0020: 0D 28 0F C8 1D 25 4E 7F   B2 88 8A E7 EC B8 DD 07  .(...%N.........
#     0030: A1 8B F4 44 83 B3 9B 01   7D B9 0C A2 A2 6D 28 9F  ...D.........m(.
#     0040: 79 A2 A9 46 2F 41 F0 9A   AA 7B 4A 4F 53 77 68 C3  y..F/A....JOSwh.
#     0050: C2 F3 8C ED 67 5C A6 D3   A2 3F 7F 03 0F 50 AA 1C  ....g\...?...P..
#     0060: 9B C4 C9 3C EB 94 31 3A   03 FA E6 95 26 4B 36 E6  ...<..1:....&K6.
#     0070: 3C B0 38 10 EE 56 BC 0C   98 B9 BE 98 28 93 88 1B  <.8..V......(...
#     0080: 72 0A DC 69 72 6B 5D 7C   93 39 D3 2C D4 DF FE 6F  r..irk]..9.,...o
#     0090: 8B 73 94 95 69 D5 C0 5C   A1 FB 20 3A 3B 9A 3A 42  .s..i..\.. :;.:B
#     00A0: FC E1 FA 8C CF A0 30 8F   D5 5C 21 BB ED 09 C3 44  ......0..\!....D
#     00B0: B5 F2 F3 22 C5 2B 43 C2   68 A6 F5 ED 5A C4 10 0E  ...".+C.h...Z...
#     00C0: 26 6B D1 AC AF 6C F5 C2   62 EE 9C E4 6D 32 8D 84  &k...l..b...m2..
#     00D0: 92 7D B6 2B 72 FA 2E 5E   37 41 CD DC DC 4E 6F C4  ...+r..^7A...No.
#     00E0: 3A B1 43 4F AA 1F 42 C5   0D 1B 1D E8 06 07 10 55  :.CO..B........U
#     00F0: 17 2D 35 35 3E 38 50 1B   D5 C8 EF 41 03 74 B9 A3  .-55>8P....A.t..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.445 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 8E 54 58 68 B2 42 89   0A F3 A5 33 22 E3 A5 B8  O.TXh.B....3"...
#     0010: 2C E8 C4 DD D4 BC 73 B8   D8 62 B1 93 33 37 EA BD  ,.....s..b..37..
#     0020: C2 C4 58 B8 99 07 43 AD   46 11 91 45 28 3F 60 3E  ..X...C.F..E(?`>
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.448 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:41.449 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.449 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:41.449 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:41.450 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:41.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.451 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.455 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 B3 AF 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:16.000 UTC",
#       "not  after"         : "2024-01-07 09:12:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 86 73 62 83 EE 53 05   AB C8 F0 56 B1 2B 97 19  1.sb..S....V.+..
#           0010: 95 A1 2C 59                                        ..,Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B5 F8 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:10.000 UTC",
#       "not  after"         : "2024-01-07 09:12:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#           0010: DC C9 49 EB                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.481 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D CE F8 3F DC CE 47 5E   F3 65 2D 6F BC 9A F7 FD  ...?..G^.e-o....
#     0010: 4B 8A 2C 64 4B 6F 22 CE   B0 AC 85 E0 A9 CA A7 43  K.,dKo"........C
#     0020: 92 ED 77 8C 70 3D 28 15   8F B9 F4 7C 66 C4 98 9E  ..w.p=(.....f...
#     0030: 8D F4 BF 61 C9 4D 3B 03   45 7E 66 A8 BA 92 AF 8A  ...a.M;.E.f.....
#     0040: 0B 95 05 00 89 A4 3D EF   63 8E 58 D5 4F 30 BB A9  ......=.c.X.O0..
#     0050: 32 5A 7E 10 AD 7E FF B2   71 FB 92 23 22 9C 1D 7D  2Z......q..#"...
#     0060: DD 6E 42 CC 9D 03 CE CB   6A 92 EE ED E4 F3 75 63  .nB.....j.....uc
#     0070: 5F 99 F0 17 D5 D8 9E 2D   1F 6B A0 6A 38 11 F8 9F  _......-.k.j8...
#     0080: 77 C6 99 03 CE 81 D8 B4   5E 72 15 DE EC D2 8A 14  w.......^r......
#     0090: 5B 66 7E 50 43 F4 F1 12   EE F0 4E AF BD 22 92 DD  [f.PC.....N.."..
#     00A0: 92 2F EB A7 35 19 4E 31   61 DC 4F 6A F2 86 C7 B3  ./..5.N1a.Oj....
#     00B0: DC 48 EB F2 04 66 85 6D   83 78 60 B6 1F 83 55 4E  .H...f.m.x`...UN
#     00C0: 4E 69 9C F7 C3 E5 06 2E   7F 73 C8 37 FB B9 30 68  Ni.......s.7..0h
#     00D0: C2 D0 6E 2B 25 27 86 A4   81 09 86 97 C5 E7 DC AE  ..n+%'..........
#     00E0: 25 65 72 C3 27 FF E0 59   95 05 BC 16 ED 2A BB 0C  %er.'..Y.....*..
#     00F0: 42 08 47 B5 32 C1 57 EB   94 27 C5 A7 39 19 D1 F2  B.G.2.W..'..9...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.483 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BA 9A 64 4E 6E A7 DE B7   6A A4 B7 65 2C C4 61 7C  ..dNn...j..e,.a.
#     0010: C7 DE E9 66 2A C3 2B F7   F3 1C 87 D7 0C 86 AC 32  ...f*.+........2
#     0020: C4 7F 76 54 83 A2 7C AF   14 E0 EE 47 A1 1B 2B EC  ..vT.......G..+.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.483 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:41.540 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "00 C1 B7 7E E6 7B 13 FD 71 C3 AA 2A BC B5 67 00 33 0C 65 FE 42 7D 77 B0 5B 8E CA 16 4A AE 4F F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 09:12:41.843 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 09:12:41.844 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 09:12:42.762; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 09:12:42.767; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 09:12:43.130; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 09:12:43.133; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 09:12:43.134; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-CtKsVm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:43.165 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 B3 AF 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:16.000 UTC",
#     "not  after"         : "2024-01-07 09:12:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 86 73 62 83 EE 53 05   AB C8 F0 56 B1 2B 97 19  1.sb..S....V.+..
#         0010: 95 A1 2C 59                                        ..,Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:43.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 75 73 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:08.000 UTC",
#     "not  after"         : "2024-01-07 09:12:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:43.184 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:43.279 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:43.279 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:43.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:43.281 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:43.420 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.420 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:43.422 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:43.422 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.429 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.444 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:43.446 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D5 B9 08 79 6C 24 70 94 A8 EC 7E 44 57 57 E1 AA 21 8D 42 F6 A3 15 34 C6 5F B7 48 56 5A DB 4E 67",
#   "session id"          : "11 1D 68 D4 0B 5A DE 32 3F 70 18 17 32 D4 79 75 B8 42 30 62 9D 99 C7 D6 A0 A9 D8 40 05 43 B2 18",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BA 97 16 0A 15 B3 04 85   D8 6C 50 2B 9A 37 56 C5  .........lP+.7V.
#             0010: F3 D3 9B 4B DE 5C D4 D9   B3 C2 B4 BC D9 20 17 75  ...K.\....... .u
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.559 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D3 54 39 F7 51 27 1A 61 8F 9A 88 26 B1 98 01 AD DC FD D1 E1 39 40 57 5A 55 3D BE 17 25 FC 8F 83",
#   "session id"          : "11 1D 68 D4 0B 5A DE 32 3F 70 18 17 32 D4 79 75 B8 42 30 62 9D 99 C7 D6 A0 A9 D8 40 05 43 B2 18",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FE 65 4E C4 91 5F C4 CB   F6 38 E1 F7 D6 BD 6F E5  .eN.._...8....o.
#           0010: 21 8B BB 5F 51 74 EC DC   22 F0 47 A5 DF D7 50 2F  !.._Qt..".G...P/
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.559 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.560 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.560 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.561 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.562 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.562 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.563 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.572 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.574 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.575 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.579 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.580 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.580 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.581 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.582 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.582 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.582 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.583 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.583 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.584 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.586 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 5F CB 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:12.000 UTC",
#       "not  after"         : "2024-01-07 09:12:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 05 AA D3 9D B7 B6 5A   67 A2 A1 2B BB 91 C8 5E  .......Zg..+...^
#           0010: 7C 6F 46 E8                                        .oF.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.587 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.663 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C B5 F8 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 09:12:10.000 UTC",
#     "not  after"         : "2024-01-07 09:12:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#         0010: DC C9 49 EB                                        ..I.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#         0010: E1 64 C4 59                                        .d.Y
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.667 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F F5 52 2A 4E 15 00 07   86 EC 92 45 C0 3A 7C 57  ..R*N......E.:.W
#     0010: 61 E0 D2 2F 4A BC 86 43   48 AE 40 85 54 01 E6 22  a../J..CH.@.T.."
#     0020: A9 7D 1B 6A FC 2F 53 E6   FD 46 BC 8E 6B D5 72 1F  ...j./S..F..k.r.
#     0030: B6 87 9F CA 59 D2 40 F1   C1 0B 21 40 B9 B8 73 39  ....Y.@...!@..s9
#     0040: 1D 56 FB 47 DF 5B 14 3E   B2 8A B1 D4 C5 0F 76 D3  .V.G.[.>......v.
#     0050: A8 17 9E 64 37 D4 46 4B   E8 8F A4 57 A1 97 CE A4  ...d7.FK...W....
#     0060: 40 6E FE 6C D7 09 A9 A2   58 2E 0B A3 15 D6 4E 7F  @n.l....X.....N.
#     0070: 7F 21 27 B7 28 60 19 B5   62 93 84 31 E8 C2 63 AA  .!'.(`..b..1..c.
#     0080: 3B 67 FB 70 CE D3 71 AC   12 1A F3 BD 13 ED DC 00  ;g.p..q.........
#     0090: 68 AF CD BF 4B 06 90 13   1E 83 2C D6 10 BE 52 C5  h...K.....,...R.
#     00A0: 99 45 68 D0 06 80 96 98   A7 6A 72 ED 88 F8 DE B2  .Eh......jr.....
#     00B0: F9 F3 0D A1 76 DC B0 E2   15 A1 41 F9 B3 0E C6 46  ....v.....A....F
#     00C0: A3 7B BF 05 64 C3 42 BC   20 0D 65 22 E9 33 65 90  ....d.B. .e".3e.
#     00D0: 74 9A 9C 71 DA 51 A5 43   0E 4B FC E6 3F AC 90 B3  t..q.Q.C.K..?...
#     00E0: A5 32 D8 94 96 9A 66 92   AD FB 7D FB 4B B4 4D 87  .2....f.....K.M.
#     00F0: BA 6E D4 53 7A 4B 0D 04   42 8F A1 32 F2 9F 63 55  .n.SzK..B..2..cU
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.669 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD 71 6F B7 1D 4B 62 90   43 79 C2 67 9B 95 9D 3F  .qo..Kb.Cy.g...?
#     0010: 29 9D B0 63 E6 11 45 08   6D 24 CD 04 86 7E A6 6B  )..c..E.m$.....k
#     0020: 55 8B 6C 07 6D 87 E9 C1   23 C6 97 CF 05 5C AD 8F  U.l.m...#....\..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.671 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:43.672 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.672 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:43.672 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.672 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 09:12:43.673 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:43.673 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.673 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.676 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 B3 AF 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:16.000 UTC",
#       "not  after"         : "2024-01-07 09:12:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 86 73 62 83 EE 53 05   AB C8 F0 56 B1 2B 97 19  1.sb..S....V.+..
#           0010: 95 A1 2C 59                                        ..,Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B5 F8 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:10.000 UTC",
#       "not  after"         : "2024-01-07 09:12:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#           0010: DC C9 49 EB                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.702 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 CF D5 D8 A8 18 13 82   38 B4 CB 91 3B 2B 48 9C  ........8...;+H.
#     0010: 62 C1 09 52 C8 D3 6E C8   7C 4F CF 7B 88 E7 A8 23  b..R..n..O.....#
#     0020: 68 31 53 69 35 2C A7 76   AB D8 80 C1 AF 10 22 BE  h1Si5,.v......".
#     0030: 78 6A 1A 0E A7 6E B0 04   94 4C 1E B5 4E 97 D1 C8  xj...n...L..N...
#     0040: 27 5C 41 BE EA 49 BD 62   5E 41 34 2D B7 D4 3A A0  '\A..I.b^A4-..:.
#     0050: 6F 52 FE 8E 0B FF 53 A0   EA B1 32 87 1F F4 13 3F  oR....S...2....?
#     0060: 75 38 1A 12 EC D4 AB D0   10 AE AB BC 53 C5 F9 01  u8..........S...
#     0070: 23 D5 1A 4C E8 CC E5 DA   40 A1 FE C9 32 88 19 DA  #..L....@...2...
#     0080: 8C 20 7E 3F 70 1F 66 9F   AD 5E 98 7B 6C 5B FF E5  . .?p.f..^..l[..
#     0090: AF 8C AD 07 F4 B9 EE 73   E2 A8 F0 88 42 33 4E E0  .......s....B3N.
#     00A0: B2 26 C6 FD 8D F6 AB 08   86 50 BA E1 7B FF 2D BF  .&.......P....-.
#     00B0: 63 3F 50 C7 D4 03 9B 19   CF 38 BE 6A 91 AF 06 D6  c?P......8.j....
#     00C0: 64 94 0F 9E F0 42 D8 90   5D 04 93 0C 62 4A B3 FB  d....B..]...bJ..
#     00D0: 67 53 64 C1 AB 91 5F AF   33 4B F2 2D 7C 2A AF 92  gSd..._.3K.-.*..
#     00E0: 30 AB F6 1C EF 3F E8 F1   F5 D8 5E D5 5B 48 9C CA  0....?....^.[H..
#     00F0: D5 96 F6 4E ED 59 DF 37   B4 BF BB FF 83 08 66 35  ...N.Y.7......f5
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.703 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 09 27 34 61 95 4F 83   FA FC F6 8C 18 45 FB 95  ..'4a.O......E..
#     0010: C6 F1 AF B1 D1 0F 74 D2   9E C9 4B B3 5C 28 8A 93  ......t...K.\(..
#     0020: F0 BD FC 33 24 F3 97 E6   3C 00 B3 BA 6A 8D 74 B7  ...3$...<...j.t.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.704 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:43.761 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "30 C4 23 7A 0A EF 89 B3 EE AE 9C 3B FE 79 CE 57 68 60 D8 CE 49 C4 8C ED 84 76 37 6F EC 7C A5 05",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 09:12:44.051 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 09:12:44.052 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 09:12:55.183; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:55.523 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B5 F8 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:10.000 UTC",
#       "not  after"         : "2024-01-07 09:12:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#           0010: DC C9 49 EB                                        ..I.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 D0 A4 0F 13 45 3D C2   C0 A8 8F 9D 86 1B 73 5B  .....E=.......s[
#           0010: E1 64 C4 59                                        .d.Y
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 75 73 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 09:12:08.000 UTC",
#       "not  after"         : "2024-01-07 09:12:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 17 A6 32 1C 6E AC A8   C5 C6 3E AD 05 A6 80 6B  ...2.n....>....k
#           0010: DC C9 49 EB                                        ..I.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 09:12:55.539 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:55.675 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:55.675 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:55.675 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:12:55.675 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:55.814 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.814 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:55.816 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 09:12:55.817 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.835 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.836 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 09:12:55.839 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "10 E5 26 B9 CE 48 35 FF B6 2A 11 AC 18 8F 3C D8 C6 52 76 13 F0 56 0D 11 04 E3 EA 83 BD 1D AE 47",
#     "session id"          : "3B 37 FA 74 74 CB A8 53 6B 01 8C 9F EA 97 F8 3F 99 91 07 F7 DF F7 94 C1 AC 93 F2 C3 05 2F 00 2E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6C 34 93 23 9D B6 85 3A   AB D8 12 E4 FA 41 49 A1  l4.#...:.....AI.
#               0010: 8C 7C 5D CE 79 C4 04 0A   4E 3E DF AC 21 21 5E 52  ..].y...N>..!!^R
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.865 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5E 52 1F E4 77 4A FC E3 BC AA 19 63 F4 19 BC A4 25 F1 A4 1E 86 8A F5 D6 75 52 ED 0F 73 DE E6 2C",
#     "session id"          : "3B 37 FA 74 74 CB A8 53 6B 01 8C 9F EA 97 F8 3F 99 91 07 F7 DF F7 94 C1 AC 93 F2 C3 05 2F 00 2E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 31 7E 89 FD 3E D9 E4   B8 8A 48 26 50 3E 3B 41  .1...>....H&P>;A
#             0010: 74 1A 5A AE 64 9C 3B 7E   D7 5B D6 D7 87 AE 09 57  t.Z.d.;..[.....W
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.866 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.866 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.868 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:55.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:55.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.881 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.882 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.884 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.888 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.888 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.888 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.888 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.889 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.889 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:55.889 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:12:55.889 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 09:12:55.891 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 09:14:15.296 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:14:15.344 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:14:15.344 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:14:15.344 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 09:14:15.344 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35460/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28065ms
ok 65 stop command for single port in 31335ms
ok 66 status detects locally running solr in 14325ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2187ms
ok 69 copying files around in 6611ms
ok 70 upconfig in 2617ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1234ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1217ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 10s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5627 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5627/

All tests passed

Build Log:
[...truncated 1334 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45711/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-09 06:11:07.966; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 06:11:07.972; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-09 06:11:08.932; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 06:11:08.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22927ms
ok 61 start solr with client truststore and security manager in 25624ms
not ok 62 start solr with mTLS needed in 57415ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-t0k3kA/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45711.
#
# Started Solr server on port 45711 (pid=199725). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45712.
#
# Started Solr server on port 45712 (pid=200156). Happy searching!
#
# INFO  - 2023-10-09 06:12:32.626; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 06:12:32.631; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 06:12:32.999; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 06:12:33.002; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 06:12:33.002; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:33.035 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A4 12 DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:08.000 UTC",
#     "not  after"         : "2024-01-07 06:12:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 4F 3E FF 0F EE D0 F9   92 EB 18 5E 89 D5 64 ED  &O>........^..d.
#         0010: 21 34 EF DF                                        !4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:33.039 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A D8 97 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:00.000 UTC",
#     "not  after"         : "2024-01-07 06:12:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:33.054 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:33.294 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:33.296 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:33.297 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.303 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.315 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.315 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:33.318 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "84 43 FF 94 4D 59 41 43 3B C0 7D D2 55 4A FB 95 E3 5B 3F 1F 9C 44 49 B5 C7 54 55 88 8D 3D 7B 6B",
#   "session id"          : "19 E6 9F 17 EB A4 36 D1 02 74 D5 D1 FE C1 0D 31 81 98 B0 C4 7E DC 0F 71 AD 20 DB EA 93 E1 AD 60",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A 1C 02 65 E1 2F BD D4   1E 96 BB 43 5E FE FD 7E  Z..e./.....C^...
#             0010: B9 D7 C4 ED 7C 6E 5B 1C   0D 53 DC AF 29 07 FF 3D  .....n[..S..)..=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.449 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "42 E5 76 36 1B 19 F3 C9 DC F3 CA 93 F3 44 34 75 29 72 60 67 DF 44 FB 0C 74 8B 0E 6A 1F A7 C4 9B",
#   "session id"          : "19 E6 9F 17 EB A4 36 D1 02 74 D5 D1 FE C1 0D 31 81 98 B0 C4 7E DC 0F 71 AD 20 DB EA 93 E1 AD 60",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 62 60 52 83 CF 56 AA 9B   F5 EE 7A AF B9 48 5F 9D  b`R..V....z..H_.
#           0010: ED BD 9B 19 C9 DF 5E BB   86 2E DE 9C 48 54 43 35  ......^.....HTC5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.450 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.454 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.454 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.463 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.465 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.466 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.470 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.470 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.470 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.470 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.471 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.471 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.471 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.473 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.473 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.473 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.474 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.474 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.475 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.475 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.478 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 B0 2C 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:04.000 UTC",
#       "not  after"         : "2024-01-07 06:12:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 30 68 A1 70 D8 99 EB   7B 2C 06 0C 2D 75 12 30  <0h.p....,..-u.0
#           0010: F4 BA B0 45                                        ...E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.478 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:33.536 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:33.537 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:33.537 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:33.537 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.559 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.563 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 96 1D 85 2F F5 8A 80 7B   F3 F6 9F A3 64 46 2B 8C  .../........dF+.
#     0010: 23 9C 38 92 44 66 DA A1   C7 15 F2 A7 89 C1 AB 7B  #.8.Df..........
#     0020: 62 CB 84 74 51 B2 9F 79   EB 83 BA 46 51 3C 86 87  b..tQ..y...FQ<..
#     0030: 93 A4 A2 EA C2 8B CA 19   61 93 65 51 45 D7 58 88  ........a.eQE.X.
#     0040: C5 E4 64 19 F0 32 A6 5C   B8 D3 77 20 B5 2C 0A 0F  ..d..2.\..w .,..
#     0050: 32 1C CE 43 44 54 24 8A   57 C9 50 38 52 F7 14 91  2..CDT$.W.P8R...
#     0060: BD 52 12 E2 BB 5A 93 48   6E 0E 61 A2 93 D1 69 A0  .R...Z.Hn.a...i.
#     0070: CB E6 CE D7 B2 03 43 64   44 15 C8 DC 79 EB D6 8D  ......CdD...y...
#     0080: 02 05 92 26 5A 4C A8 D0   23 81 06 EA 6C 85 B5 D2  ...&ZL..#...l...
#     0090: 0A 58 0C C5 A7 D2 F2 1A   25 26 31 3D 36 51 6D BA  .X......%&1=6Qm.
#     00A0: 16 79 76 5C 1D FA A0 35   CF D3 67 09 C5 25 D3 B9  .yv\...5..g..%..
#     00B0: AD 75 EE 73 F9 70 CC 0B   95 0C 04 62 7B 39 A5 C2  .u.s.p.....b.9..
#     00C0: 25 58 6A 0C B4 17 03 93   22 B3 E2 9A 99 3C 85 08  %Xj....."....<..
#     00D0: 04 C6 30 62 C7 29 07 36   F9 7D 28 D0 54 91 36 F9  ..0b.).6..(.T.6.
#     00E0: 2C C2 90 2C 2D 0C E4 B4   0F 39 2F C6 9D 51 AB 84  ,..,-....9/..Q..
#     00F0: 26 86 B4 B6 B5 60 57 56   D7 CC 8B A3 A0 C7 0C 42  &....`WV.......B
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.565 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C 3A DE 02 C7 4B E3 B2   AD 94 89 5C A3 4B B4 8D  l:...K.....\.K..
#     0010: DD F2 B8 3B 4E 3D BD 3E   40 02 34 5D CD 26 12 E3  ...;N=.>@.4].&..
#     0020: B0 2C A9 AB 87 CB 95 E7   08 E2 34 37 E2 D5 4B FE  .,........47..K.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.567 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:33.568 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.568 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:33.568 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.569 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:33.569 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:33.569 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.570 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.572 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A4 12 DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:08.000 UTC",
#       "not  after"         : "2024-01-07 06:12:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 4F 3E FF 0F EE D0 F9   92 EB 18 5E 89 D5 64 ED  &O>........^..d.
#           0010: 21 34 EF DF                                        !4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 A5 7F A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:02.000 UTC",
#       "not  after"         : "2024-01-07 06:12:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#           0010: 5E 00 BB AB                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.599 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C DB 0B 12 DF 64 C2 F5   28 BA 00 70 36 3A 15 CC  <....d..(..p6:..
#     0010: CA A4 12 20 3F 79 D5 8D   0E A0 D0 BB 9B 3B 61 06  ... ?y.......;a.
#     0020: 9C 8C 6A 03 76 26 B0 CE   F4 34 5F 78 64 C1 13 95  ..j.v&...4_xd...
#     0030: 48 B8 4D 49 CC 3A EE 4E   AD 9E D5 ED B2 6C 03 13  H.MI.:.N.....l..
#     0040: A4 85 59 6E 8E 72 55 5F   14 60 B9 F5 27 3A 56 57  ..Yn.rU_.`..':VW
#     0050: CD 7E 2F 0C 09 00 ED 1C   2D B0 24 50 D0 C7 1B 14  ../.....-.$P....
#     0060: 8F CA 96 88 A9 16 D0 61   F6 98 38 DA 19 8A EC F9  .......a..8.....
#     0070: CB D7 BD C7 E8 12 FC F7   AD BC D4 47 39 6E DD ED  ...........G9n..
#     0080: F2 54 56 A4 64 7C 65 D9   65 1A 52 CD 2B BD 35 E9  .TV.d.e.e.R.+.5.
#     0090: 81 1B DD 17 7D 57 6D 91   E8 0A 28 87 8A 92 09 70  .....Wm...(....p
#     00A0: B7 95 F8 E3 BD 3D 4A D4   DF 08 C2 9B 0A 20 3B 79  .....=J...... ;y
#     00B0: 32 15 4A 64 62 7A 79 FB   46 DF 0A 03 78 BA 27 38  2.Jdbzy.F...x.'8
#     00C0: 42 B8 C1 40 CD EC 52 1C   AE EB 0F BD 57 28 75 71  B..@..R.....W(uq
#     00D0: CC F4 40 34 5B F5 74 71   17 6F 27 65 F7 67 7A 12  ..@4[.tq.o'e.gz.
#     00E0: 48 1C 92 49 50 37 55 44   05 1D A6 AC 76 EB BD 58  H..IP7UD....v..X
#     00F0: AD D1 9E 50 09 FA C2 6E   78 D7 87 AC CE 0A 9D 0D  ...P...nx.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.600 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 EB D5 87 2A 80 0F 16   B1 3D DF CD 53 C6 FF 80  ....*....=..S...
#     0010: 93 22 2A 46 73 06 DF 35   85 75 5A 0C 93 C7 E2 F0  ."*Fs..5.uZ.....
#     0020: 19 22 C7 02 08 CF C8 73   7E FD D0 85 E5 9F AB 8B  .".....s........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.601 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:33.650 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BD BC 45 42 0E 0A 3D 44 40 94 23 70 31 D1 59 32 30 30 BE 0B 38 90 F4 07 DF 1C E5 59 BF D7 CC F6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 06:12:33.968 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 06:12:33.970 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 06:12:34.932; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 06:12:34.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 06:12:35.331; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 06:12:35.333; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 06:12:35.334; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-t0k3kA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:35.366 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 A4 12 DF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:08.000 UTC",
#     "not  after"         : "2024-01-07 06:12:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 4F 3E FF 0F EE D0 F9   92 EB 18 5E 89 D5 64 ED  &O>........^..d.
#         0010: 21 34 EF DF                                        !4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:35.370 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A D8 97 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:00.000 UTC",
#     "not  after"         : "2024-01-07 06:12:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:35.385 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:35.476 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:35.477 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:35.477 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:35.477 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:35.631 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.631 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:35.633 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:35.633 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.639 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.651 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.652 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.652 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:35.654 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5D B1 D3 80 82 44 69 15 E0 4B 18 81 6C 0E B1 0D E8 A9 75 43 FB 4D 6F EF 56 04 E4 49 AF A2 39 08",
#   "session id"          : "31 F3 C8 98 33 16 64 09 CB 26 A2 F7 03 E7 D8 D2 6D 2C 73 8D D6 E1 45 5A 9A 97 75 BF 3E 7E BB 4D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 D1 69 08 B3 A3 59 E6   9B 7F 06 02 78 72 F0 0E  ..i...Y.....xr..
#             0010: 15 60 C0 6A C7 B7 86 0B   AD F4 F3 B2 19 DC E0 00  .`.j............
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.768 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "51 32 04 0C 0E 0A 29 2A 51 60 9A EC 5D 4B E6 5C 54 2D EA 02 D9 3B 5A 9D 1F 1D 98 B4 16 D5 14 C0",
#   "session id"          : "31 F3 C8 98 33 16 64 09 CB 26 A2 F7 03 E7 D8 D2 6D 2C 73 8D D6 E1 45 5A 9A 97 75 BF 3E 7E BB 4D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A7 56 BF 31 95 B8 00 D1   18 5A 25 51 7D C4 17 19  .V.1.....Z%Q....
#           0010: C4 0D 17 11 E4 AC 52 18   07 97 2A 04 5A 22 21 13  ......R...*.Z"!.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.768 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.768 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.771 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.782 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.784 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.785 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.789 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.789 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.790 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.792 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.792 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.793 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.793 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.794 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.794 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.797 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 B0 2C 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:04.000 UTC",
#       "not  after"         : "2024-01-07 06:12:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C 30 68 A1 70 D8 99 EB   7B 2C 06 0C 2D 75 12 30  <0h.p....,..-u.0
#           0010: F4 BA B0 45                                        ...E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.798 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.883 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 A5 7F A8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 06:12:02.000 UTC",
#     "not  after"         : "2024-01-07 06:12:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#         0010: 5E 00 BB AB                                        ^...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#         0010: 54 C2 D2 BB                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.887 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 49 05 ED 18 95 D5 38   9B 8D BE 3A DF E8 EC 5B  CI.....8...:...[
#     0010: ED E2 F0 5B CF A4 E8 40   29 DD E2 4B 7F 00 6D 63  ...[...@)..K..mc
#     0020: 61 6F 4D 95 02 21 94 8D   44 F8 3E D4 79 AA EC 79  aoM..!..D.>.y..y
#     0030: 6C 71 9F 90 06 DF 14 5C   BD 0C 80 CA 2A E7 68 79  lq.....\....*.hy
#     0040: B0 1D E9 2C FE 97 E3 E7   7B 0D 1F 52 34 BC E4 44  ...,.......R4..D
#     0050: 1E A3 92 83 81 66 06 38   25 AC 74 90 20 2E 27 5D  .....f.8%.t. .']
#     0060: 3B 27 FA 7C 1F 56 15 52   46 1E F5 2E 31 29 29 5B  ;'...V.RF...1))[
#     0070: B6 57 59 21 93 F3 7D 5F   12 F3 E4 2B 6B 8C 93 F3  .WY!..._...+k...
#     0080: 5C 72 2E CF F8 8C D5 76   C4 6E 51 EF 62 AE 7F 88  \r.....v.nQ.b...
#     0090: 4B 92 09 4B 5E AC 88 EF   7D 5F 43 1B A4 F6 14 DA  K..K^...._C.....
#     00A0: 00 72 B8 BC 0B 35 43 5E   3B D2 A3 BC 9D FF 00 BF  .r...5C^;.......
#     00B0: D5 6E 3E BA 07 22 EC 1A   6F 64 62 FF 1B B7 22 26  .n>.."..odb..."&
#     00C0: A9 04 5F 63 D7 4F 2E B9   E0 A4 B6 69 91 0F 95 1F  .._c.O.....i....
#     00D0: 32 59 01 0D 36 41 99 DB   00 FF BA B9 69 CE A8 8C  2Y..6A......i...
#     00E0: 82 6D A4 C7 4D 20 75 CF   83 03 0D 6A BF 1D AD 4E  .m..M u....j...N
#     00F0: 56 A4 55 AB 04 86 4C 06   A5 70 96 40 EC 6D 07 17  V.U...L..p.@.m..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.889 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0E 67 6E E9 66 62 E0 97   80 7F 48 B2 1E 46 50 FA  .gn.fb....H..FP.
#     0010: CE 22 4E 19 16 D6 7A 8D   4B 96 94 08 9C 3C 3F 79  ."N...z.K....<?y
#     0020: 47 59 67 C1 12 42 E3 58   D3 82 51 79 ED 3F AD AF  GYg..B.X..Qy.?..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.892 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:35.893 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.893 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:35.893 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.893 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 06:12:35.894 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:35.894 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.894 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.897 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 A4 12 DF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:08.000 UTC",
#       "not  after"         : "2024-01-07 06:12:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 4F 3E FF 0F EE D0 F9   92 EB 18 5E 89 D5 64 ED  &O>........^..d.
#           0010: 21 34 EF DF                                        !4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 A5 7F A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:02.000 UTC",
#       "not  after"         : "2024-01-07 06:12:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#           0010: 5E 00 BB AB                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.922 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 54 83 F0 95 1E DC 68   E0 FF A1 47 84 E8 AA DD  7T.....h...G....
#     0010: B5 5A B0 5F F6 DC 83 EE   39 D9 F7 1B 96 04 EB A2  .Z._....9.......
#     0020: BC 47 34 0C 00 A4 4B EC   C4 05 ED 18 92 77 36 B3  .G4...K......w6.
#     0030: C8 D1 17 0C D3 52 2B 09   0E A2 67 90 BC 0E 98 D7  .....R+...g.....
#     0040: FD D5 87 1F 92 B8 1D A8   58 52 59 1E B5 00 63 1A  ........XRY...c.
#     0050: F5 F1 EE 6C 15 2A FE 60   5F CF A9 3B BB F6 E8 84  ...l.*.`_..;....
#     0060: D8 60 41 71 12 A1 E2 39   4A 58 2D 11 DD B9 23 BF  .`Aq...9JX-...#.
#     0070: DC B9 DD 48 88 D4 F7 D3   E1 F2 5A B6 84 A3 F1 5C  ...H......Z....\
#     0080: 49 56 DC 08 99 09 A2 5D   52 AB BB AB 46 C9 12 98  IV.....]R...F...
#     0090: 94 3E 93 6F 3D 85 A1 9A   46 AC 88 08 26 01 41 5F  .>.o=...F...&.A_
#     00A0: 94 07 15 2E 0B 33 FC 27   8E 55 25 AE E6 4A CB 2E  .....3.'.U%..J..
#     00B0: E5 CA A5 AD 85 93 F3 41   7E E7 C9 18 F8 BE D1 6B  .......A.......k
#     00C0: 7C 5E C0 62 44 EB 42 79   DC F6 B2 82 4E A4 48 2D  .^.bD.By....N.H-
#     00D0: 73 B6 DC BF 21 CE 20 FE   04 F1 55 D9 6A AC 43 11  s...!. ...U.j.C.
#     00E0: F5 0D EB 19 AB F2 7E 4E   D4 23 70 54 9D B3 76 72  .......N.#pT..vr
#     00F0: DD C4 0D 6F F5 F0 03 85   93 1F 3D 2D 89 E0 33 52  ...o......=-..3R
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.923 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F5 E2 03 DD DA 8C C2 03   04 88 A4 85 33 44 A8 2D  ............3D.-
#     0010: D4 BE EB 8F 8B 3F 97 22   74 27 0D F9 FA 48 46 55  .....?."t'...HFU
#     0020: B1 0F 46 60 27 64 D4 7B   66 56 D2 83 41 5F 01 36  ..F`'d..fV..A_.6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.924 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:35.975 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E4 48 9A 1B 43 EF 4C 23 F1 84 86 EE F6 71 7E F1 CA BA 43 E8 9A 70 CF A6 E1 B7 43 9B 0C D2 7E AB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 06:12:36.276 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 06:12:36.277 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 06:12:48.091; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:48.408 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A D8 97 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:00.000 UTC",
#       "not  after"         : "2024-01-07 06:12:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#           0010: 5E 00 BB AB                                        ^...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 A5 7F A8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 06:12:02.000 UTC",
#       "not  after"         : "2024-01-07 06:12:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 73 7E 93 9E 59 DF 38   37 DD 5F 7B D9 4B 81 36  .s...Y.87._..K.6
#           0010: 5E 00 BB AB                                        ^...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 39 E4 76 B1 05 4C D6   16 23 56 57 F5 42 69 7C  .9.v..L..#VW.Bi.
#           0010: 54 C2 D2 BB                                        T...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 06:12:48.427 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:48.604 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:48.607 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:48.608 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:12:48.608 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:48.686 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.687 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:48.688 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 06:12:48.689 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.708 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 06:12:48.711 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AF 51 D5 44 8A AA 0D 0F 22 20 8E 10 FF 6C A0 EF 47 4C 42 F4 6C D6 47 DE CD 57 71 8D 19 6F 4E BA",
#     "session id"          : "0F AB B9 F5 B6 E9 B3 1B 1A D2 E4 16 01 9B DD BA FC 25 D5 BE FB 4B 8B BA FA CA 82 28 7F A0 FD ED",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AE 99 61 75 A6 97 49 90   11 0B BB DE 72 68 34 5F  ..au..I.....rh4_
#               0010: 61 BF BE E3 B6 C6 5D B2   07 35 2C 7B BC 49 1C 54  a.....]..5,..I.T
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.739 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C5 5E 3E 25 CE 8E FC F0 0D C2 E1 9D E7 50 6F 1D 9D 14 9C C8 5F E9 4A AE E2 FC D1 78 6E 6A CB 58",
#     "session id"          : "0F AB B9 F5 B6 E9 B3 1B 1A D2 E4 16 01 9B DD BA FC 25 D5 BE FB 4B 8B BA FA CA 82 28 7F A0 FD ED",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 51 03 F4 72 F2 2F D7 1D   97 53 CF 3D F5 13 0B 61  Q..r./...S.=...a
#             0010: 51 B1 AE C5 38 58 44 2A   14 FF A2 6A 94 3C 89 5B  Q...8XD*...j.<.[
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.739 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.739 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.740 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.740 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.741 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.744 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.744 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.744 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:48.745 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:48.746 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.746 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.753 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.755 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.756 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.760 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.760 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.760 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.760 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.760 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:48.761 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:12:48.761 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 06:12:48.762 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 06:14:09.079 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:14:09.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:14:09.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:14:09.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 06:14:09.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45712/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28221ms
ok 65 stop command for single port in 31627ms
ok 66 status detects locally running solr in 14468ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2196ms
ok 69 copying files around in 6661ms
ok 70 upconfig in 2668ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1231ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 54s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m21.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5626 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5626/

All tests passed

Build Log:
[...truncated 1318 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46457/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-09 02:12:21.342; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 02:12:21.347; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-09 02:12:22.231; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 02:12:22.274; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22619ms
ok 61 start solr with client truststore and security manager in 25475ms
not ok 62 start solr with mTLS needed in 55889ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-yvfbFm/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46457.
#
# Started Solr server on port 46457 (pid=197864). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46458.
#
# Started Solr server on port 46458 (pid=198320). Happy searching!
#
# INFO  - 2023-10-09 02:13:45.135; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 02:13:45.141; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 02:13:45.501; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 02:13:45.504; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 02:13:45.505; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:45.536 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "52 5E EA 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:21.000 UTC",
#     "not  after"         : "2024-01-07 02:13:21.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 27 2D D7 F1 94 69 C1   6E 87 AA 93 87 C4 55 86  .'-...i.n.....U.
#         0010: D7 CC F3 C1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:45.540 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 95 6A F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:13.000 UTC",
#     "not  after"         : "2024-01-07 02:13:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:45.554 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:45.640 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:45.641 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:45.641 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:45.641 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:45.780 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.780 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:45.782 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:45.782 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.787 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.799 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:45.802 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CB C2 A4 FD 9C 29 7B 3D 6C 24 B2 CB 6F 11 2F F8 9F 3C 71 F6 E4 D5 85 27 46 D0 54 22 CB 88 6B 91",
#   "session id"          : "86 42 2B 5D CC 95 96 8A DC 3E 19 6E F4 DA 4A 0B D1 2E AE 88 86 B4 C3 74 C4 59 78 BF 3C 26 F0 9E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 54 C3 BC 1F 2F 8E 6C   71 ED 21 45 0D 50 0E DB  mT.../.lq.!E.P..
#             0010: 4A CE CB 5C 69 25 3E 35   BB 56 73 F9 55 5B 82 69  J..\i%>5.Vs.U[.i
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "43 DF 99 E3 24 15 CE AA 36 13 5C 50 2F 03 42 FE 31 A1 C3 0A 44 E4 49 1A BE CA C4 36 7B 07 F5 CB",
#   "session id"          : "86 42 2B 5D CC 95 96 8A DC 3E 19 6E F4 DA 4A 0B D1 2E AE 88 86 B4 C3 74 C4 59 78 BF 3C 26 F0 9E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5D 46 E2 6B BC 99 88 DD   F2 DE 4F 1E E6 40 81 AB  ]F.k......O..@..
#           0010: 4B 18 E2 D1 0C 30 86 04   55 01 35 CA 0F B5 70 75  K....0..U.5...pu
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.926 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.926 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.929 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.931 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.939 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.941 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.942 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.946 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.946 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.946 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.946 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.947 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.947 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.947 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:45.947 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:45.947 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.949 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.949 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.949 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.950 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.950 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.951 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:45.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.954 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 3F A2 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:17.000 UTC",
#       "not  after"         : "2024-01-07 02:13:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 48 28 DC BB 26 B7 94   DF BF EF A5 39 B7 77 B3  .H(..&......9.w.
#           0010: 6A C2 59 50                                        j.YP
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:45.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.035 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.038 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 1F 10 47 4D DE 3B 6C   4A 1B 85 06 BD F6 B6 75  ^..GM.;lJ......u
#     0010: 26 60 51 FE 81 17 CF 44   BE E7 A3 5B 1D A4 1D F1  &`Q....D...[....
#     0020: 94 3E 3B B4 8C D6 6F A9   FE 7D 8F EC 59 96 7C 25  .>;...o.....Y..%
#     0030: A0 BF E0 1C EC F5 36 DE   F4 07 66 93 AE 7B 8B F8  ......6...f.....
#     0040: EE 2A 02 F8 5B 69 B8 4C   67 5E C0 3F C7 09 18 C0  .*..[i.Lg^.?....
#     0050: 8F B1 B1 CD 8C AB 50 33   64 C3 D4 D7 51 7F EE E4  ......P3d...Q...
#     0060: 85 22 13 89 BE 02 0D 40   8F C2 92 D3 B0 86 B8 81  .".....@........
#     0070: CA CF 84 F5 9C 58 71 4A   55 95 53 4E 50 6F 1E 23  .....XqJU.SNPo.#
#     0080: C6 A8 0D 79 81 64 4A FE   92 0E 2D 04 45 29 AE 64  ...y.dJ...-.E).d
#     0090: E6 4A 78 A9 D1 8B 02 3F   47 84 7F 10 C1 65 62 FE  .Jx....?G....eb.
#     00A0: 13 F5 32 78 51 3C 4E F0   B0 73 53 E5 C1 52 20 7E  ..2xQ<N..sS..R .
#     00B0: D2 D0 3D 11 2C 60 BA 28   71 D9 23 88 98 54 81 2D  ..=.,`.(q.#..T.-
#     00C0: 32 28 6D 77 59 D6 EC 00   13 00 B2 CF AA F0 94 07  2(mwY...........
#     00D0: DB 7C AC 25 C8 B9 BB A0   D5 C0 04 18 70 46 5C 8C  ...%........pF\.
#     00E0: CC 41 87 64 40 53 03 7A   5C B5 F0 C6 4C BF E3 55  .A.d@S.z\...L..U
#     00F0: E6 FE A6 28 76 2D C6 C7   D0 80 C2 68 20 16 57 31  ...(v-.....h .W1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.040 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8D 54 7D 23 BD 03 B0 09   E0 3A 1F 54 50 4F FE B3  .T.#.....:.TPO..
#     0010: F5 02 77 F5 79 80 01 18   D2 D6 17 B3 4E AC FC E9  ..w.y.......N...
#     0020: C1 AD 0F 89 15 09 F9 E7   AF 75 3B 80 A8 31 DE 2D  .........u;..1.-
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.042 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:46.043 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:46.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:46.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:46.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:46.044 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:46.044 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.045 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.047 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 5E EA 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:21.000 UTC",
#       "not  after"         : "2024-01-07 02:13:21.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 27 2D D7 F1 94 69 C1   6E 87 AA 93 87 C4 55 86  .'-...i.n.....U.
#           0010: D7 CC F3 C1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D1 3D F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:15.000 UTC",
#       "not  after"         : "2024-01-07 02:13:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#           0010: 33 8A 4F 98                                        3.O.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.074 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 E7 CE F7 0F 1D F7 53   3D 3F 2A E7 BC AE 2A D9  V......S=?*...*.
#     0010: 9B 60 94 32 2C 1E D0 C6   DE D0 C3 B0 CC F1 05 21  .`.2,..........!
#     0020: D0 1C FC 12 F2 9C 2A F5   50 00 4F B2 48 BB 56 42  ......*.P.O.H.VB
#     0030: 9C 80 6E 54 C4 A1 AC 81   52 20 84 90 90 0D EA 8F  ..nT....R ......
#     0040: 44 C8 4D EC FF 86 AF 69   96 00 9E 66 F8 14 FD F2  D.M....i...f....
#     0050: 38 4F CE 33 AA 2D 17 9A   4B 71 DC 02 DC 82 EB F3  8O.3.-..Kq......
#     0060: E8 FB D6 7B 5D 06 5B CA   7F CB 2A 6B C7 33 F7 81  ....].[...*k.3..
#     0070: 9B 9F A3 A8 04 24 A0 96   1F E5 4A 7C B8 7A CB 9C  .....$....J..z..
#     0080: FF 6D 96 F5 E5 86 B7 03   B5 E4 0A 2F 51 A3 5E F5  .m........./Q.^.
#     0090: 80 57 AC 5C 8E B5 9C 6A   C5 4D EA 70 AD 96 FA A3  .W.\...j.M.p....
#     00A0: 20 E6 EF FE 58 1E B6 EF   B4 E1 3F 0C BE CB 38 2F   ...X.....?...8/
#     00B0: AE 2A 03 01 47 E2 EB 1E   3B D2 DD 1D 05 38 1E 99  .*..G...;....8..
#     00C0: AA AC F4 0B 0B CE 3C FD   B3 78 07 53 3D D3 73 FA  ......<..x.S=.s.
#     00D0: A9 B3 06 C3 2D 50 E6 19   06 51 50 46 B8 10 5E 69  ....-P...QPF..^i
#     00E0: DD 73 AD BF E8 DE 63 1D   87 2D 97 1B 4D 36 51 CF  .s....c..-..M6Q.
#     00F0: 12 D8 17 99 E8 AA 2F 9D   C1 CD C9 57 1B 19 E9 77  ....../....W...w
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.075 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 73 A9 E5 4D 9C 4C 43 AD   32 F9 85 2F EC BE 27 E8  s..M.LC.2../..'.
#     0010: 38 9B 88 12 F5 89 5E 09   82 AE 31 2B 95 A2 69 D3  8.....^...1+..i.
#     0020: D5 B5 2B 76 17 E6 F0 C0   73 AA C2 DF 4C EE 67 68  ..+v....s...L.gh
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.076 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:46.126 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "82 48 F2 44 B6 F6 63 5E C0 DD AE 88 47 F5 3E 4D AF D5 14 95 D3 C1 D0 3A 96 41 92 0E 07 18 8C C4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 02:13:46.422 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 02:13:46.423 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 02:13:47.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 02:13:47.358; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 02:13:47.723; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@66fdec9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@23aa363a[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 02:13:47.725; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1cdc4c27(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@23aa363a[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 02:13:47.726; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(ca,h=[localhost],a=[],w=[]) for Client@23aa363a[provider=null,keyStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-yvfbFm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:47.757 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "52 5E EA 00",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:21.000 UTC",
#     "not  after"         : "2024-01-07 02:13:21.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 27 2D D7 F1 94 69 C1   6E 87 AA 93 87 C4 55 86  .'-...i.n.....U.
#         0010: D7 CC F3 C1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:47.761 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "33 95 6A F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:13.000 UTC",
#     "not  after"         : "2024-01-07 02:13:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:47.775 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:47.869 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:47.877 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:47.878 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:13:47.878 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:48.023 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:48.025 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:13:48.025 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.030 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.042 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.043 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:13:48.045 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E7 74 8B 9A 2D 4D B5 58 1E B8 C4 58 91 AE F1 1E 77 0C 4A 15 EF F6 2B AC 7B DC 6B BA 61 F3 5A 00",
#   "session id"          : "B6 A9 92 89 FC 44 4D CD 4A 1B 15 C6 BC 6D 2D 5F 51 F6 E4 C3 0D 74 CF FE B8 A5 52 0F 07 88 72 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B1 C3 CE 9D 8A AC 76 88   80 CA A0 80 0A 9D 7F 01  ......v.........
#             0010: 59 BC 6A EC 16 2E 9C 0D   FF 5D E6 B4 E9 BC ED 6B  Y.j......].....k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.147 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2D 79 C5 2D 89 44 68 E1 55 13 D8 9F F8 38 FA 42 D2 9B 66 FE 63 25 17 48 B1 AE 89 B1 E5 8F 8C 24",
#   "session id"          : "B6 A9 92 89 FC 44 4D CD 4A 1B 15 C6 BC 6D 2D 5F 51 F6 E4 C3 0D 74 CF FE B8 A5 52 0F 07 88 72 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6F AB 47 4E E1 00 05 93   3C 6B 85 97 B4 29 75 58  o.GN....<k...)uX
#           0010: CC 50 69 74 37 DF 06 66   B4 DD 45 04 CA B8 54 6A  .Pit7..f..E...Tj
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.150 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.152 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.152 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.161 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.162 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.163 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.167 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.167 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.167 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.168 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.168 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.169 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.170 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.170 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.170 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.171 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.172 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.172 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.174 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 3F A2 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:17.000 UTC",
#       "not  after"         : "2024-01-07 02:13:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 48 28 DC BB 26 B7 94   DF BF EF A5 39 B7 77 B3  .H(..&......9.w.
#           0010: 6A C2 59 50                                        j.YP
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.175 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.251 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C D1 3D F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 02:13:15.000 UTC",
#     "not  after"         : "2024-01-07 02:13:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#         0010: 33 8A 4F 98                                        3.O.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#         0010: 94 BA 1E 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.255 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 D1 DD 88 04 25 74 EE   84 D1 E7 38 17 D3 6B E0  .....%t....8..k.
#     0010: 3B E0 3F ED 6C D6 1F 69   29 DB 80 AD A3 A5 00 57  ;.?.l..i)......W
#     0020: 6C FD DE 11 70 99 62 AA   89 53 F3 4E FB 12 AB E3  l...p.b..S.N....
#     0030: F3 91 79 9F 62 2B 3D 35   80 13 01 52 11 73 38 14  ..y.b+=5...R.s8.
#     0040: 1C 4A FC EF AC 5B 84 2C   33 39 E8 DE 9D 25 53 96  .J...[.,39...%S.
#     0050: B0 7A E9 BB F4 CB 74 58   10 12 3B B0 FA 8F E5 35  .z....tX..;....5
#     0060: 6B B0 8B BD 65 29 55 BF   1A 6C B5 83 6E 67 4B DE  k...e)U..l..ngK.
#     0070: 13 E7 14 D2 68 91 8E F5   92 A1 E8 50 DC 50 7E 2C  ....h......P.P.,
#     0080: C4 8D 38 00 C2 F0 7A 03   37 15 A5 C1 14 01 5D BC  ..8...z.7.....].
#     0090: 15 11 1D 9E 6F 51 E1 8A   34 87 88 FA 50 20 1D 44  ....oQ..4...P .D
#     00A0: B6 A3 90 D5 2F 73 13 BA   4A 58 9E 9F 87 BC 95 A4  ..../s..JX......
#     00B0: AF 99 35 2F 2D 50 8D 41   51 1F 77 7C C9 4E 5C AA  ..5/-P.AQ.w..N\.
#     00C0: 50 E2 FC 57 6E DC 9C BF   1F 11 87 33 25 51 3D E1  P..Wn......3%Q=.
#     00D0: E2 83 96 94 3C 20 12 BC   88 0C F5 36 3C 9E B2 0A  ....< .....6<...
#     00E0: 5E 92 11 D1 C2 91 BC CD   1F 4C 1B 0E 1E C1 95 A5  ^........L......
#     00F0: 1E 43 D8 08 BB 6C B3 55   33 BD FC E3 09 93 A5 E6  .C...l.U3.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.256 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 7C 36 F7 5C 47 06 BB   77 26 6E BD 57 43 BB F1  ..6.\G..w&n.WC..
#     0010: 38 9D A7 33 69 76 8E 83   AB 96 D1 07 28 19 14 A0  8..3iv......(...
#     0020: BF 82 BD 0F C8 15 1C 7F   CC 61 45 8E 5E 2F A8 71  .........aE.^/.q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.259 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:48.260 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.260 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:48.260 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.260 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 02:13:48.260 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:13:48.261 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.261 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.263 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 5E EA 00",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:21.000 UTC",
#       "not  after"         : "2024-01-07 02:13:21.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 27 2D D7 F1 94 69 C1   6E 87 AA 93 87 C4 55 86  .'-...i.n.....U.
#           0010: D7 CC F3 C1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D1 3D F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:15.000 UTC",
#       "not  after"         : "2024-01-07 02:13:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#           0010: 33 8A 4F 98                                        3.O.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.290 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 AF 00 40 BD B4 9A F5   74 7A FE E5 CC 1B DA EE  ...@....tz......
#     0010: 09 82 F5 68 DB C1 68 58   16 DE 39 ED CC E4 33 2B  ...h..hX..9...3+
#     0020: 9E A0 D9 CE 8A D4 D0 81   80 75 D8 30 BB 42 7F 04  .........u.0.B..
#     0030: 41 59 B8 CD 6C E1 34 76   A5 A2 E3 97 CC F9 C1 E9  AY..l.4v........
#     0040: AF 65 5B DA D7 EC DD 4E   66 AB 65 6E A4 72 0D FA  .e[....Nf.en.r..
#     0050: 33 2A 2B D1 64 EB 7D 17   DE 31 4C D6 28 59 2A E0  3*+.d....1L.(Y*.
#     0060: EE F2 D7 01 4A 23 33 3C   55 E2 AE 27 5F 9E E2 D9  ....J#3<U..'_...
#     0070: BB 0C 58 C8 2D 7B E4 DF   AC 90 B6 3C A7 F8 C9 D5  ..X.-......<....
#     0080: B0 9A 6C 91 B5 87 BE 6A   01 51 D7 1C 34 93 B0 1D  ..l....j.Q..4...
#     0090: E2 6A A7 88 C1 22 1D 63   77 27 97 77 7B 1C BE D7  .j...".cw'.w....
#     00A0: 3D 88 94 68 28 0B EB 3F   89 D3 6C 47 C7 70 85 10  =..h(..?..lG.p..
#     00B0: F6 EC E3 BF 38 E1 60 82   29 29 80 67 C4 C5 A2 DD  ....8.`.)).g....
#     00C0: 6E FE C1 97 EF 1A 43 51   75 83 98 62 D6 6E D1 55  n.....CQu..b.n.U
#     00D0: 41 8F 19 D2 D0 EF 46 C4   8C F1 72 B7 14 E6 40 86  A.....F...r...@.
#     00E0: FC 3A B6 B1 41 D4 1C 1B   06 D0 1C 90 69 B6 69 6C  .:..A.......i.il
#     00F0: 08 AE F3 34 A6 6C AC 4E   7F 31 72 72 AC 86 D6 17  ...4.l.N.1rr....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.291 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 62 E4 8F 72 98 D3 DE CB   5F E3 2C C7 CD 7F 7E 7A  b..r...._.,....z
#     0010: 35 0D 29 5F BC 44 76 DD   02 76 82 9C 21 5E BB 96  5.)_.Dv..v..!^..
#     0020: 42 CD 98 D8 2C 7F 8C 87   23 A8 88 57 D4 36 08 6A  B...,...#..W.6.j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.291 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:13:48.339 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CE 88 72 BD 69 31 6D 1E 1C D6 78 56 AF 01 64 A0 42 59 23 23 59 0A 29 81 7B CE C1 88 C1 DD 70 4E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 02:13:48.676 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 02:13:48.677 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 02:13:59.566; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:59.883 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "33 95 6A F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:13.000 UTC",
#       "not  after"         : "2024-01-07 02:13:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#           0010: 33 8A 4F 98                                        3.O.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C D1 3D F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 02:13:15.000 UTC",
#       "not  after"         : "2024-01-07 02:13:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 75 4B D5 C5 13 DF D2   0F 4F 34 47 9B 49 BE B9  -uK......O4G.I..
#           0010: 33 8A 4F 98                                        3.O.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF C2 E0 D5 9C AB 34 B3   CC 22 A7 B9 88 7F 19 64  ......4..".....d
#           0010: 94 BA 1E 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 02:13:59.898 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:14:00.122 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.122 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:14:00.124 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 02:14:00.124 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.141 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 02:14:00.143 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "BD 96 C3 77 CA 64 93 91 5D 05 0E AE 56 75 41 04 B6 85 79 BC 42 64 A6 B0 6C 6C 1B 17 56 03 A4 C3",
#     "session id"          : "EC 1A DC F0 7D DD 94 0B 89 43 C1 03 A6 61 6B 80 2D 2E 2B 09 1E 0A FF 40 42 12 5E A7 A5 12 0F 4B",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AA FD 05 06 C1 10 E4 02   E2 69 A9 0D 23 5E 0D F3  .........i..#^..
#               0010: 22 A7 3F 45 EF D7 0B 7B   25 3C E4 34 DA A5 EB 54  ".?E....%<.4...T
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.163 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1B 8B 28 52 54 26 CC 5F C3 FB 5C F9 35 1A 71 57 F9 97 C4 51 1F EF B7 0B 2E AA 69 1B 3B F6 4F AE",
#     "session id"          : "EC 1A DC F0 7D DD 94 0B 89 43 C1 03 A6 61 6B 80 2D 2E 2B 09 1E 0A FF 40 42 12 5E A7 A5 12 0F 4B",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 95 CE 71 05 91 EE 85 28   EB F3 20 9F 3C F0 5B 35  ..q....(.. .<.[5
#             0010: 2F B1 67 27 04 72 B7 21   00 59 80 6B C7 D4 00 6F  /.g'.r.!.Y.k...o
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.163 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.163 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.164 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.165 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.167 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.167 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.168 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.169 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:14:00.169 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:14:00.169 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.169 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.169 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.176 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.177 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.178 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.182 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.182 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.182 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.182 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.183 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:14:00.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:14:00.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 02:14:00.184 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 02:15:18.908 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:15:18.944 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:15:18.944 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:15:18.944 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 02:15:18.945 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46458/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28370ms
ok 65 stop command for single port in 30803ms
ok 66 status detects locally running solr in 14627ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2191ms
ok 69 copying files around in 6606ms
ok 70 upconfig in 2709ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1241ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 14s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m40s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5625 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5625/

All tests passed

Build Log:
[...truncated 1330 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43175/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-09 00:01:38.952; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 00:01:38.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-09 00:01:39.857; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 00:01:39.898; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22406ms
ok 61 start solr with client truststore and security manager in 25773ms
not ok 62 start solr with mTLS needed in 56062ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vBaG4o/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43175.
#
# Started Solr server on port 43175 (pid=200650). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43176.
#
# Started Solr server on port 43176 (pid=201102). Happy searching!
#
# INFO  - 2023-10-09 00:03:02.925; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 00:03:02.930; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 00:03:03.286; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 00:03:03.289; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 00:03:03.289; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:03.320 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 C6 01 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:39.000 UTC",
#     "not  after"         : "2024-01-07 24:02:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 E3 46 E7 6E CA 12 8D   D4 98 8E 10 C7 69 11 DC  $.F.n........i..
#         0010: D0 89 25 BE                                        ..%.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:03.325 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 40 1E E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:31.000 UTC",
#     "not  after"         : "2024-01-07 24:02:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:03.339 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:03.564 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:03.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:03.566 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.583 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.583 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.583 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:03.585 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0D 37 89 48 94 66 CD CF 48 86 02 61 06 94 F1 6D F7 50 D4 33 B4 81 11 FE 98 9C 5F 61 BF 26 CD 1D",
#   "session id"          : "75 32 68 4A A1 01 A5 9B A6 02 DD 92 F5 B0 65 97 43 B8 84 0A 59 A8 5B CA 5B F4 B2 C3 32 FF 41 A1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DD 19 C5 58 36 2E F5 72   44 44 62 08 72 6E C8 17  ...X6..rDDb.rn..
#             0010: 73 37 06 70 73 30 9F 8D   09 8B 4F 25 3B 9A 76 2D  s7.ps0....O%;.v-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.708 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6D 1E F1 9D FF ED 21 39 DF FE 14 C6 B8 10 03 D1 D5 80 76 BE 74 24 8F D4 88 AE 9A 60 E7 0D 3E 39",
#   "session id"          : "75 32 68 4A A1 01 A5 9B A6 02 DD 92 F5 B0 65 97 43 B8 84 0A 59 A8 5B CA 5B F4 B2 C3 32 FF 41 A1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: ED 67 D1 B6 5E DF D2 B5   CC 1E BD 72 D6 59 F9 55  .g..^......r.Y.U
#           0010: E3 01 EB 59 AB E6 99 6B   B1 B3 EC 99 13 98 84 06  ...Y...k........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.708 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.708 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.709 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.710 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.711 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.712 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.712 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.713 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.714 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.722 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.723 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.724 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.728 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.728 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.728 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.729 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.731 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.732 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.733 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.733 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.736 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 58 4D 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:35.000 UTC",
#       "not  after"         : "2024-01-07 24:02:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 21 F3 E7 70 14 EA D9   7C 7D DD 59 08 4F 87 EE  :!..p......Y.O..
#           0010: 6D 44 43 97                                        mDC.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.737 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:03.789 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:03.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:03.789 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:03.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.816 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.819 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 57 DD A8 42 8F 3D 8B   94 6D 5A E6 98 16 86 74  .W..B.=..mZ....t
#     0010: 00 17 3E A5 66 93 A1 9A   6C 55 5C 3D C7 AE EA F3  ..>.f...lU\=....
#     0020: FC BE F6 C8 16 74 B1 52   48 D1 E7 1D 40 D2 E5 18  .....t.RH...@...
#     0030: 36 92 89 23 DF E8 75 27   86 15 05 E3 DE E4 D9 17  6..#..u'........
#     0040: D8 EB F4 F3 6E 50 5B AE   C0 A2 7E D2 3C 00 B4 CF  ....nP[.....<...
#     0050: FF CA 42 F4 29 CA 43 82   17 77 12 82 12 54 64 D3  ..B.).C..w...Td.
#     0060: BB D5 B3 10 F1 C9 33 27   A3 B3 F6 34 84 86 74 F8  ......3'...4..t.
#     0070: E5 22 EA C2 04 6D 36 A2   F3 2F 08 10 C7 CC 05 3B  ."...m6../.....;
#     0080: D7 01 CE FC 4B C1 70 FE   24 D7 54 86 1D EF EB E5  ....K.p.$.T.....
#     0090: 57 4A 6D F6 EC A1 AB 12   4F 97 B5 15 02 6C FB 42  WJm.....O....l.B
#     00A0: FD 10 0E 7E 33 5C E7 81   56 82 41 2D B6 2E 2F 60  ....3\..V.A-../`
#     00B0: 54 7C F5 FE 1A 8D F5 F1   09 9D 64 D4 B9 6B 3D 77  T.........d..k=w
#     00C0: A0 A7 D9 3A 26 CB 86 42   8D 89 83 6F 85 4F 6F D4  ...:&..B...o.Oo.
#     00D0: 3C 98 46 33 06 AD 0F F6   AE 7E A2 C2 C9 37 30 08  <.F3.........70.
#     00E0: 53 11 9A 1C 1B B0 C3 8D   CA 2F 34 BC 0B 76 9C 65  S......../4..v.e
#     00F0: 82 BD 0E 7A DD A5 0E 73   40 EF 37 1F E3 64 2A FC  ...z...s@.7..d*.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.821 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 B5 EA D3 43 4B 6F A9   D0 AE 0C 15 6B 58 4D 4C  ....CKo.....kXML
#     0010: EE 55 6A 4E 5E E7 2D 76   17 B4 D5 65 47 10 AE 3D  .UjN^.-v...eG..=
#     0020: 54 73 B0 8F 2F 50 3D C7   A2 20 03 AD 0E 2F DD E1  Ts../P=.. .../..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:03.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.824 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:03.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:03.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:03.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.825 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.828 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 C6 01 9E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:39.000 UTC",
#       "not  after"         : "2024-01-07 24:02:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 E3 46 E7 6E CA 12 8D   D4 98 8E 10 C7 69 11 DC  $.F.n........i..
#           0010: D0 89 25 BE                                        ..%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 45 53 B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:33.000 UTC",
#       "not  after"         : "2024-01-07 24:02:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#           0010: BD 3D EB 6F                                        .=.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.854 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 10 08 63 09 2C C2 CC   4C 59 44 1D 69 5C 2B A2  p..c.,..LYD.i\+.
#     0010: 76 01 DF 2E D3 36 3E E2   27 D2 FD 06 CC F4 29 19  v....6>.'.....).
#     0020: BE FE 1B 8E 8C 0F E9 6B   BB 48 17 58 D7 25 90 B7  .......k.H.X.%..
#     0030: BE 95 57 30 5D D5 20 03   D0 B2 87 2A 09 98 D5 4D  ..W0]. ....*...M
#     0040: CB 42 35 EA 4C BB 88 62   9B 0D 75 44 10 18 E1 DE  .B5.L..b..uD....
#     0050: A5 C1 E1 8D D8 15 93 4D   C5 D9 3A 20 0B 49 2C E6  .......M..: .I,.
#     0060: 95 F2 DA D1 BD 99 67 8B   C3 24 63 9C 2F BB 38 12  ......g..$c./.8.
#     0070: C2 A1 EE 6B 5E B5 E2 D0   BA 92 98 66 3D D1 D1 70  ...k^......f=..p
#     0080: 2C 00 6F 4D AB C6 68 D9   D8 9D D7 36 49 AC EB BB  ,.oM..h....6I...
#     0090: 4B 06 04 53 EB DA EB 06   5A E8 11 14 9C 82 7B F3  K..S....Z.......
#     00A0: FB 89 74 6C EF 9D 7F 02   13 26 21 9E C9 A2 77 E1  ..tl.....&!...w.
#     00B0: 3E A3 24 61 71 09 EE 70   E9 12 37 2B 21 E5 71 DA  >.$aq..p..7+!.q.
#     00C0: 9A 4D C6 E2 88 0D BA 08   1D F3 D9 02 67 54 1F 49  .M..........gT.I
#     00D0: 94 80 14 14 31 88 FE D3   39 93 20 A7 96 37 8F 9C  ....1...9. ..7..
#     00E0: 90 D6 EB 13 F8 52 FF 1F   1E 79 EA 9B EA 87 DD 2D  .....R...y.....-
#     00F0: 6D FB 6D 26 C1 6A EA FA   E3 1E 99 02 5B 8E 36 ED  m.m&.j......[.6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.855 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 24 EE 5D C7 89 A9 D6 98   4E E8 05 C2 0A 74 9C 85  $.].....N....t..
#     0010: 36 99 7D 4C 9F 6B C0 E9   14 6E 1C 94 EE C3 75 1A  6..L.k...n....u.
#     0020: E9 81 0E 6C 1C 71 B1 21   78 FC 4D 69 CB 49 A0 A7  ...l.q.!x.Mi.I..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.856 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:03.904 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "55 41 6C 0F E4 9E 70 3F 6A 50 B9 C2 08 F5 B7 B9 20 63 C0 17 8D EE 11 53 F7 E5 48 4A ED F7 BF D7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 24:03:04.197 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 24:03:04.199 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 00:03:05.133; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 00:03:05.138; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 00:03:05.510; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@49d3c823(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 00:03:05.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 00:03:05.513; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@23aa363a(ca,h=[localhost],a=[],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vBaG4o/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:05.545 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "35 C6 01 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:39.000 UTC",
#     "not  after"         : "2024-01-07 24:02:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 E3 46 E7 6E CA 12 8D   D4 98 8E 10 C7 69 11 DC  $.F.n........i..
#         0010: D0 89 25 BE                                        ..%.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:05.549 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 40 1E E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:31.000 UTC",
#     "not  after"         : "2024-01-07 24:02:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:05.563 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:05.651 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:05.651 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:05.651 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:03:05.652 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:05.790 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.791 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:05.792 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:05.793 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.798 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.809 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.810 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:05.812 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "18 D2 99 A4 88 B3 0F 26 D7 12 FF EA 7C D1 6E 69 66 72 B2 E0 07 70 01 B2 DF 2E 01 0A 03 72 55 66",
#   "session id"          : "9B B9 C9 53 84 22 A2 1E A0 2E BD 2C 70 EA 05 58 72 82 49 72 75 8B 83 F8 23 79 12 02 58 8E 07 08",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AA 30 8E 0E 16 9F 5D 66   2A 08 90 9E 3D C5 A1 25  .0....]f*...=..%
#             0010: 32 E9 DA 5F 97 F5 98 17   A7 A4 9D 3B 80 63 95 4F  2.._.......;.c.O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.922 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 B0 3D C0 77 99 E7 DA 81 1D 93 08 1D 30 14 2A 25 B0 59 92 1A 00 A5 11 DA 33 9B ED DF 05 BC 74",
#   "session id"          : "9B B9 C9 53 84 22 A2 1E A0 2E BD 2C 70 EA 05 58 72 82 49 72 75 8B 83 F8 23 79 12 02 58 8E 07 08",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: ED EF 9F B1 B7 C5 B0 BB   B1 A3 D5 DB CF CB 26 98  ..............&.
#           0010: 14 C8 B1 82 F1 0F 8F 86   82 3E 52 98 C8 E3 F8 75  .........>R....u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.922 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.923 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.924 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.925 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.926 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.935 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.937 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.938 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.941 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:05.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:05.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.945 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.945 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.945 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.946 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.947 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:05.947 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.950 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 58 4D 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:35.000 UTC",
#       "not  after"         : "2024-01-07 24:02:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 21 F3 E7 70 14 EA D9   7C 7D DD 59 08 4F 87 EE  :!..p......Y.O..
#           0010: 6D 44 43 97                                        mDC.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:05.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.030 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 45 53 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 24:02:33.000 UTC",
#     "not  after"         : "2024-01-07 24:02:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#         0010: BD 3D EB 6F                                        .=.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#         0010: 3D 32 28 8D                                        =2(.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.034 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E 20 B8 CD 93 11 B7 A8   9B 07 21 44 48 22 AC 35  N ........!DH".5
#     0010: E3 06 44 35 18 9E 00 F7   04 FD F9 46 E1 1D 6F 5C  ..D5.......F..o\
#     0020: 40 0F DE 16 67 18 57 89   B5 6A 11 26 50 3C AB 22  @...g.W..j.&P<."
#     0030: E2 7B CC CD 12 28 1D 1B   C8 1A 45 64 EC 90 C2 A9  .....(....Ed....
#     0040: C2 19 E3 5F EC D7 34 A2   F8 F6 92 CC 87 DF 32 0F  ..._..4.......2.
#     0050: BA 1A AC CD 81 92 53 F1   24 0A 68 C3 85 4A 12 E0  ......S.$.h..J..
#     0060: A1 41 22 A2 3E CA 25 2A   B9 5E 43 C3 57 9A 66 AD  .A".>.%*.^C.W.f.
#     0070: DD 51 55 50 59 6C 26 9A   C0 0B E3 F1 86 2A 12 0D  .QUPYl&......*..
#     0080: EB 58 31 BB D9 10 27 A5   A5 8B 89 33 B9 66 78 7D  .X1...'....3.fx.
#     0090: 39 3C 93 A9 F9 97 40 2B   EC 7A B0 62 7A 58 78 39  9<....@+.z.bzXx9
#     00A0: 2B E8 9C 26 FE 02 60 4D   A3 6A 53 24 FC BC 6D 18  +..&..`M.jS$..m.
#     00B0: AF 82 3D 19 A6 70 DF 6B   33 C7 EF 32 7A 7C BB BF  ..=..p.k3..2z...
#     00C0: 50 8B AC 1D 0E 41 D9 8E   1B D4 74 D5 9E 23 49 3D  P....A....t..#I=
#     00D0: 04 2C 82 27 82 C1 02 EF   64 79 31 15 F3 F5 63 86  .,.'....dy1...c.
#     00E0: 64 44 A9 D8 36 07 6A 53   B2 FF A0 91 A0 BB 81 52  dD..6.jS.......R
#     00F0: 7C 4F A6 A6 23 5D BA 26   9A B3 25 0A 98 56 5A 7B  .O..#].&..%..VZ.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.036 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D E1 15 1E 41 BD D0 B7   10 7C 01 3D CB BD 83 64  ....A......=...d
#     0010: 45 E5 A0 F1 12 42 FA CE   A1 8D CD E5 7B A4 5C 62  E....B........\b
#     0020: 42 4F AD B0 23 E4 9D B8   B4 29 F6 14 7F 06 D7 D8  BO..#....)......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.038 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:06.039 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:06.039 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:06.039 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:06.039 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-09 24:03:06.040 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:06.040 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.040 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.043 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 C6 01 9E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:39.000 UTC",
#       "not  after"         : "2024-01-07 24:02:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 E3 46 E7 6E CA 12 8D   D4 98 8E 10 C7 69 11 DC  $.F.n........i..
#           0010: D0 89 25 BE                                        ..%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 45 53 B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:33.000 UTC",
#       "not  after"         : "2024-01-07 24:02:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#           0010: BD 3D EB 6F                                        .=.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.067 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 4A F2 63 AB 6E 9A C2   01 17 6C 63 EE 04 90 21  .J.c.n....lc...!
#     0010: AB F0 8C A3 A5 4E 4E D4   E1 04 38 C3 C2 4B 51 A4  .....NN...8..KQ.
#     0020: 8E 5B E6 DF B8 FE 3D 62   B6 A4 42 75 DE 18 59 CA  .[....=b..Bu..Y.
#     0030: EB FD F2 95 DE 94 23 71   B8 95 30 FE 92 32 17 18  ......#q..0..2..
#     0040: 68 A1 30 30 33 05 D2 7A   7A 76 F4 56 73 37 52 77  h.003..zzv.Vs7Rw
#     0050: D0 A4 3F EE 84 70 12 AB   76 B4 EA B6 39 11 5D 01  ..?..p..v...9.].
#     0060: C2 95 B6 14 55 BE 81 4A   21 3B C7 4B 6C C9 2A D9  ....U..J!;.Kl.*.
#     0070: 4B 1D 78 35 0D 52 66 12   C5 AF 4D ED 86 D4 CD 68  K.x5.Rf...M....h
#     0080: 5C DB DE 29 03 B8 8A F1   ED FC A5 46 A5 61 E9 79  \..).......F.a.y
#     0090: 93 FD E0 96 B8 C6 7D C9   F1 2A D9 63 D5 C8 1C 0A  .........*.c....
#     00A0: 5A F8 E8 B6 36 84 72 4F   9A C7 74 A2 CC EA 73 E7  Z...6.rO..t...s.
#     00B0: E6 80 AF 40 42 F9 FE CC   FA A4 F4 8A 80 F1 3D 1E  ...@B.........=.
#     00C0: 05 BA 70 2B 4B FF A5 0C   25 8C 28 61 B6 16 D7 FE  ..p+K...%.(a....
#     00D0: CD 72 3B 33 53 11 8C F7   BC C3 98 00 71 89 28 27  .r;3S.......q.('
#     00E0: 35 98 49 2D 70 37 28 25   57 17 62 7B 4F 8A 8C 47  5.I-p7(%W.b.O..G
#     00F0: A5 DC 3C 84 FA 69 DA AE   17 EB AD BE 40 C3 EA 50  ..<..i......@..P
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.069 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 97 E9 10 2C 71 25 0A 5D   0B 64 3B A3 54 69 3F B0  ...,q%.].d;.Ti?.
#     0010: 39 5C 07 07 DA 93 C2 43   A2 16 9C 0B 07 1A 80 EB  9\.....C........
#     0020: 8B E8 C3 D6 D9 FD 16 A0   9E B0 3A 79 26 D4 5C 21  ..........:y&.\!
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.069 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:06.117 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1D 41 38 CD C8 7C 66 2C CF 15 5D 8C F0 D0 EE B5 B1 73 A3 E9 21 E0 8B FA 55 45 63 57 CC B3 E1 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 24:03:06.369 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 24:03:06.370 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 00:03:17.444; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:17.775 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 45 53 B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:33.000 UTC",
#       "not  after"         : "2024-01-07 24:02:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#           0010: BD 3D EB 6F                                        .=.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 CB AF ED 1E 2E 7B 19   AD 57 2D 5C 51 18 5F 80  .........W-\Q._.
#           0010: 3D 32 28 8D                                        =2(.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 40 1E E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 24:02:31.000 UTC",
#       "not  after"         : "2024-01-07 24:02:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 5C BB 66 54 0A 9C 0D   38 C0 66 96 69 EB 9F 3E  "\.fT...8.f.i..>
#           0010: BD 3D EB 6F                                        .=.o
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 24:03:17.790 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:18.023 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:18.025 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-09 24:03:18.025 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.030 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.042 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.042 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-09 24:03:18.044 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "1B AC EA 48 D7 69 8D 16 BF 91 E0 E2 00 FD 78 50 47 C3 71 BF E5 EE 43 E9 E1 A9 BE 19 32 54 F0 46",
#     "session id"          : "BA B2 12 75 2C 79 11 D1 0D 30 17 0B 8B C6 99 A9 45 49 B2 CF 11 74 57 9C EF 77 AA 54 BD 58 1C 6C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 27 2D EB BB CA D1 96 BD   5D 01 5A 63 48 D6 C4 74  '-......].ZcH..t
#               0010: A9 21 8B F8 21 7A C6 29   84 47 9D 27 8F 8B 40 43  .!..!z.).G.'..@C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.064 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8E ED 08 F1 B4 CE 45 FE D5 3C E5 EB 2A FD B9 9A 7D 30 32 66 DD 6A 0D 33 70 01 D7 FE 03 0F 38 33",
#     "session id"          : "BA B2 12 75 2C 79 11 D1 0D 30 17 0B 8B C6 99 A9 45 49 B2 CF 11 74 57 9C EF 77 AA 54 BD 58 1C 6C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 19 FC 21 0D 04 19 D8 B1   B1 07 FD F5 E9 C8 94 DB  ..!.............
#             0010: F2 11 66 0D 16 19 1C B2   63 4B 0A 5E B3 34 77 50  ..f.....cK.^.4wP
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.064 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.064 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.068 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:18.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:18.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.077 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.078 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.079 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.083 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.083 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.083 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.083 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.084 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:18.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:03:18.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-09 24:03:18.085 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rs

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-09 24:04:36.550 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:04:36.586 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:04:36.586 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:04:36.587 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 24:04:36.588 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43176/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28169ms
ok 65 stop command for single port in 31021ms
ok 66 status detects locally running solr in 14639ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2181ms
ok 69 copying files around in 6616ms
ok 70 upconfig in 2631ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 34s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m59s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5624 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5624/

No tests ran.

Build Log:
[...truncated 1283 lines...]
FATAL: command execution failed
java.io.EOFException
	at java.base/java.io.ObjectInputStream$PeekInputStream.readFully(ObjectInputStream.java:2911)
	at java.base/java.io.ObjectInputStream$BlockDataInputStream.readShort(ObjectInputStream.java:3406)
	at java.base/java.io.ObjectInputStream.readStreamHeader(ObjectInputStream.java:932)
	at java.base/java.io.ObjectInputStream.<init>(ObjectInputStream.java:375)
	at hudson.remoting.ObjectInputStreamEx.<init>(ObjectInputStreamEx.java:49)
	at hudson.remoting.Command.readFrom(Command.java:142)
	at hudson.remoting.Command.readFrom(Command.java:128)
	at hudson.remoting.AbstractSynchronousByteArrayCommandTransport.read(AbstractSynchronousByteArrayCommandTransport.java:35)
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:61)
Caused: java.io.IOException: Unexpected termination of the channel
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:75)
Caused: java.io.IOException: Backing channel 'lucene-solr-1' is disconnected.
	at hudson.remoting.RemoteInvocationHandler.channelOrFail(RemoteInvocationHandler.java:215)
	at hudson.remoting.RemoteInvocationHandler.invoke(RemoteInvocationHandler.java:285)
	at com.sun.proxy.$Proxy125.isAlive(Unknown Source)
	at hudson.Launcher$RemoteLauncher$ProcImpl.isAlive(Launcher.java:1215)
	at hudson.Launcher$RemoteLauncher$ProcImpl.join(Launcher.java:1207)
	at hudson.tasks.CommandInterpreter.join(CommandInterpreter.java:195)
	at hudson.tasks.CommandInterpreter.perform(CommandInterpreter.java:145)
	at hudson.tasks.CommandInterpreter.perform(CommandInterpreter.java:92)
	at hudson.tasks.BuildStepMonitor$1.perform(BuildStepMonitor.java:20)
	at hudson.model.AbstractBuild$AbstractBuildExecution.perform(AbstractBuild.java:818)
	at hudson.model.Build$BuildExecution.build(Build.java:199)
	at hudson.model.Build$BuildExecution.doRun(Build.java:164)
	at hudson.model.AbstractBuild$AbstractBuildExecution.run(AbstractBuild.java:526)
	at hudson.model.Run.execute(Run.java:1900)
	at hudson.model.FreeStyleBuild.run(FreeStyleBuild.java:44)
	at hudson.model.ResourceController.execute(ResourceController.java:101)
	at hudson.model.Executor.run(Executor.java:442)
FATAL: Unable to delete script file /tmp/jenkins13563850120843438411.sh
java.io.EOFException
	at java.base/java.io.ObjectInputStream$PeekInputStream.readFully(ObjectInputStream.java:2911)
	at java.base/java.io.ObjectInputStream$BlockDataInputStream.readShort(ObjectInputStream.java:3406)
	at java.base/java.io.ObjectInputStream.readStreamHeader(ObjectInputStream.java:932)
	at java.base/java.io.ObjectInputStream.<init>(ObjectInputStream.java:375)
	at hudson.remoting.ObjectInputStreamEx.<init>(ObjectInputStreamEx.java:49)
	at hudson.remoting.Command.readFrom(Command.java:142)
	at hudson.remoting.Command.readFrom(Command.java:128)
	at hudson.remoting.AbstractSynchronousByteArrayCommandTransport.read(AbstractSynchronousByteArrayCommandTransport.java:35)
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:61)
Caused: java.io.IOException: Unexpected termination of the channel
	at hudson.remoting.SynchronousCommandTransport$ReaderThread.run(SynchronousCommandTransport.java:75)
Caused: hudson.remoting.ChannelClosedException: Channel "hudson.remoting.Channel@33fa4125:lucene-solr-1": Remote call on lucene-solr-1 failed. The channel is closing down or has closed down
	at hudson.remoting.Channel.call(Channel.java:993)
	at hudson.FilePath.act(FilePath.java:1192)
	at hudson.FilePath.act(FilePath.java:1181)
	at hudson.FilePath.delete(FilePath.java:1728)
	at hudson.tasks.CommandInterpreter.perform(CommandInterpreter.java:163)
	at hudson.tasks.CommandInterpreter.perform(CommandInterpreter.java:92)
	at hudson.tasks.BuildStepMonitor$1.perform(BuildStepMonitor.java:20)
	at hudson.model.AbstractBuild$AbstractBuildExecution.perform(AbstractBuild.java:818)
	at hudson.model.Build$BuildExecution.build(Build.java:199)
	at hudson.model.Build$BuildExecution.doRun(Build.java:164)
	at hudson.model.AbstractBuild$AbstractBuildExecution.run(AbstractBuild.java:526)
	at hudson.model.Run.execute(Run.java:1900)
	at hudson.model.FreeStyleBuild.run(FreeStyleBuild.java:44)
	at hudson.model.ResourceController.execute(ResourceController.java:101)
	at hudson.model.Executor.run(Executor.java:442)
Build step 'Execute shell' marked build as failure
ERROR: Step ‘Archive the artifacts’ failed: no workspace for Solr/Solr-Check-9.x #5624
ERROR: Step ‘Publish JUnit test result report’ failed: no workspace for Solr/Solr-Check-9.x #5624
ERROR: lucene-solr-1 is offline; cannot locate jdk_11_latest
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
ERROR: lucene-solr-1 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-1 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-1 is offline; cannot locate jdk_11_latest
ERROR: lucene-solr-1 is offline; cannot locate jdk_11_latest

[JENKINS] Solr » Solr-Check-9.x - Build # 5623 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5623/

All tests passed

Build Log:
[...truncated 1331 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43615/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-08 13:35:30.710; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-08 13:35:30.715; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-08 13:35:31.617; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-08 13:35:31.658; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23023ms
ok 61 start solr with client truststore and security manager in 25003ms
not ok 62 start solr with mTLS needed in 57118ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-1kDIRI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43615.
#
# Started Solr server on port 43615 (pid=198842). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43616.
#
# Started Solr server on port 43616 (pid=199297). Happy searching!
#
# INFO  - 2023-10-08 13:36:54.752; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-08 13:36:54.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-08 13:36:55.127; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-08 13:36:55.130; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-08 13:36:55.130; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:55.162 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 2D 9E EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:30.000 UTC",
#     "not  after"         : "2024-01-06 13:36:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 38 5B 08 25 1B 40 5D   DA FC FD 39 5C C1 6A DA  .8[.%.@]...9\.j.
#         0010: A7 07 56 89                                        ..V.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:55.166 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 56 A7 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:22.000 UTC",
#     "not  after"         : "2024-01-06 13:36:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:55.181 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:55.268 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:55.269 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:55.269 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:55.270 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:55.405 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:55.407 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:55.408 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.413 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.426 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.426 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:55.428 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0C 92 DE 81 7B 9C FE CA 36 83 A7 F9 F4 1A 1B 14 EF 74 94 1A 9D FC F0 25 8E EA A9 D4 21 A5 1E 8A",
#   "session id"          : "73 29 CC D4 90 A7 98 E2 A2 12 52 C1 CE D4 CE FA E2 5D CA 53 AC 11 39 99 13 B9 B9 FF 9D CD 3E 16",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 A7 45 12 D6 2C 8D B1   DC 53 37 7B 48 11 C5 26  ..E..,...S7.H..&
#             0010: 1A 0E 93 F6 E9 1F D7 69   95 D5 13 E8 B5 E3 2C 06  .......i......,.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.541 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D8 8A 9F C9 D0 B6 02 5C EA 10 2A 97 7A DE 93 4D C7 D7 FF 5D 3F A9 F8 FA 0D EE BF 89 2E 46 F2 40",
#   "session id"          : "73 29 CC D4 90 A7 98 E2 A2 12 52 C1 CE D4 CE FA E2 5D CA 53 AC 11 39 99 13 B9 B9 FF 9D CD 3E 16",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4F AA BA C3 AE 3F 38 4D   9D CF AE B7 54 76 F4 4A  O....?8M....Tv.J
#           0010: 94 63 EC B6 DC 43 FD 0C   E8 45 3F 68 BD 9A A9 5D  .c...C...E?h...]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.542 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.542 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.544 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.546 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.546 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.546 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.547 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.555 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.556 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.557 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.561 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.561 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.561 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.564 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.564 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.564 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.565 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.565 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.566 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.566 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.569 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D E6 AC CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:27.000 UTC",
#       "not  after"         : "2024-01-06 13:36:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 13 78 E9 CE 60 83 9B B6   39 AF 0B 3C 1A 5A F5 EA  .x..`...9..<.Z..
#           0010: AE 20 6B C8                                        . k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.569 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.645 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.649 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 59 01 2F 5B B9 07 92 0C   88 E2 06 B8 3B 67 44 2A  Y./[........;gD*
#     0010: 5A 1F 90 62 CE 09 72 C3   61 0C 93 85 81 BD EB C9  Z..b..r.a.......
#     0020: A5 33 E8 60 C9 01 BF E4   C3 CF 0A 68 30 60 37 64  .3.`.......h0`7d
#     0030: 39 45 7F DB 1F AF B6 00   DF 98 16 43 E5 1A CB 61  9E.........C...a
#     0040: B5 C3 9A 20 C3 39 BD 5A   30 B3 E5 42 BB 99 F2 48  ... .9.Z0..B...H
#     0050: 11 D1 F8 28 8C 44 B1 D6   A8 EB 25 21 19 31 76 4B  ...(.D....%!.1vK
#     0060: 43 CE 7F 65 34 50 17 60   6C 3D 5D B5 96 4A DD D5  C..e4P.`l=]..J..
#     0070: 0B 51 EA 6E D7 56 2A 4E   DE CC 62 FF 0F 54 66 58  .Q.n.V*N..b..TfX
#     0080: 7C C6 54 A1 7E 0E 74 5A   94 28 90 F1 4F E2 3E 9E  ..T...tZ.(..O.>.
#     0090: CD FD 15 FE EE A6 8B 0A   12 64 1E AA 40 CE 77 93  .........d..@.w.
#     00A0: 14 10 38 8D 6F 67 D3 19   96 9E 9B 2A E2 07 15 5E  ..8.og.....*...^
#     00B0: 09 FB 9F 58 E2 38 F7 D2   A6 FD 6D CB 91 F8 C1 F6  ...X.8....m.....
#     00C0: 60 DC 99 F7 99 B8 B4 2D   C9 26 3B EA 2F 16 E7 57  `......-.&;./..W
#     00D0: 53 17 DA 2C 70 D8 B5 13   32 23 89 AC B3 61 37 C3  S..,p...2#...a7.
#     00E0: 7F 3C 33 83 D2 7A C4 3F   80 B4 FD E2 62 AB 60 4F  .<3..z.?....b.`O
#     00F0: DE 2E 02 A0 BA 1F FE C4   1F B8 D9 F1 4F 6C D9 82  ............Ol..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.650 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E AA BD 4E E6 B9 9A CA   5A 74 B3 7E D5 7A E1 E7  ...N....Zt...z..
#     0010: 98 B0 96 E1 3B 37 3D C9   56 8C AB 7C E4 93 8C 7D  ....;7=.V.......
#     0020: F9 2D 01 CA 6D BE 49 79   6B 94 67 20 6B 74 E8 45  .-..m.Iyk.g kt.E
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.653 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:55.654 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.654 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:55.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:55.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:55.656 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.656 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.658 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 2D 9E EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:30.000 UTC",
#       "not  after"         : "2024-01-06 13:36:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 38 5B 08 25 1B 40 5D   DA FC FD 39 5C C1 6A DA  .8[.%.@]...9\.j.
#           0010: A7 07 56 89                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 49 EC 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:24.000 UTC",
#       "not  after"         : "2024-01-06 13:36:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#           0010: A1 F7 F7 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.685 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 F6 E6 60 24 3F 78 4E   A1 5C 24 6B 04 BD 61 F4  g..`$?xN.\$k..a.
#     0010: A3 BF 8D 29 EA CE 4D B0   F1 B8 AC F0 DB 3C FB 21  ...)..M......<.!
#     0020: F7 C6 7C 67 76 B8 5D CB   61 B6 84 6D 49 82 A5 65  ...gv.].a..mI..e
#     0030: BA 78 6E 8B EF AA 86 1D   E9 42 8F 8D 65 6B 59 CF  .xn......B..ekY.
#     0040: E0 5D B0 05 89 29 FE E8   CE FC 15 4E C4 BB AD AB  .]...).....N....
#     0050: D9 5D A2 CB 8C 85 70 E0   CE 64 50 25 7D 3C 9E D0  .]....p..dP%.<..
#     0060: 7F B3 CD 17 06 86 92 15   41 DE C1 5F 79 A9 20 FC  ........A.._y. .
#     0070: 52 80 0F EE 86 B7 6A B2   D3 AC 8E F4 EB 5D 1E AE  R.....j......]..
#     0080: 0C 0D 42 44 34 C4 16 6C   D4 E7 51 3B 5D 7D 3D AD  ..BD4..l..Q;].=.
#     0090: 8A 8C 82 CC 17 9C 8E 0C   5E 66 A1 21 46 0F 4D F8  ........^f.!F.M.
#     00A0: FB 88 23 05 A7 9A F7 4C   D4 20 7E 9E 7B 31 8E DC  ..#....L. ...1..
#     00B0: A0 59 68 3F 9A 3F B4 D3   41 D4 23 1E 81 AE E2 08  .Yh?.?..A.#.....
#     00C0: 1D 8E 9F 8E 77 BD E4 E9   C5 37 7B 3B B4 18 B7 4D  ....w....7.;...M
#     00D0: 54 75 2A 99 C4 FF D2 6F   12 84 EE B8 CE 03 57 4D  Tu*....o......WM
#     00E0: A5 84 06 15 AA E1 02 65   5E E6 70 C6 20 31 A2 A3  .......e^.p. 1..
#     00F0: DD F3 9D 2B EF 3C 74 9C   88 C5 A3 97 52 19 43 5E  ...+.<t.....R.C^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.686 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D C5 A6 3C 30 44 0F D6   70 D8 98 A3 63 D4 D0 90  ...<0D..p...c...
#     0010: 8B 82 26 1C 20 74 5D 5A   1E 9B 52 56 F7 D0 1A 26  ..&. t]Z..RV...&
#     0020: EA F8 19 7F C9 53 09 EC   C5 8E 5C 93 51 4C 33 B4  .....S....\.QL3.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.686 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:55.733 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DB 2A B1 29 D6 CB 61 0C 0B 2E 78 24 4F 6B 2F 2E 00 BA A3 CB DB 0E D1 25 29 E7 76 EF EA 7E AC 08",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-08 13:36:56.007 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-08 13:36:56.008 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-08 13:36:56.980; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-08 13:36:56.986; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-08 13:36:57.372; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@cd1d761(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-08 13:36:57.375; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-08 13:36:57.375; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a640157(ca,h=[localhost],a=[],w=[]) for Client@604c5de8[provider=null,keyStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1kDIRI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:57.408 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "42 2D 9E EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:30.000 UTC",
#     "not  after"         : "2024-01-06 13:36:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 38 5B 08 25 1B 40 5D   DA FC FD 39 5C C1 6A DA  .8[.%.@]...9\.j.
#         0010: A7 07 56 89                                        ..V.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:57.413 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 56 A7 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:22.000 UTC",
#     "not  after"         : "2024-01-06 13:36:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-08 13:36:57.428 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:57.797 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:57.798 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:57.798 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:36:57.799 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:57.960 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:57.962 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:36:57.963 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.980 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.981 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.981 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:36:57.984 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "75 5C 61 BC 69 90 FA 64 26 30 DE 2A 48 29 B1 C9 4A 98 39 75 6A C1 29 F4 6D FC 54 B5 41 16 D7 1D",
#   "session id"          : "14 0F EF 7F C3 4F 75 C9 24 77 6B 03 5C A2 5A 30 29 B7 54 FE 09 73 65 B5 FF 8A 95 15 65 ED ED 11",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 1C 49 EE 5B 1F 8D C9   75 F1 01 CC F6 A4 3B 77  ..I.[...u.....;w
#             0010: 33 FF 7B 9D 64 B7 30 DA   36 51 F6 36 D0 4C 71 02  3...d.0.6Q.6.Lq.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.094 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EF 76 28 A8 E5 B2 33 08 17 A9 BC 8B F8 09 EC 4B AB 38 57 BF 20 A6 D4 01 65 0A 14 1D 9E 0B 2D 8C",
#   "session id"          : "14 0F EF 7F C3 4F 75 C9 24 77 6B 03 5C A2 5A 30 29 B7 54 FE 09 73 65 B5 FF 8A 95 15 65 ED ED 11",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CA B2 82 33 36 07 1B BB   BC F6 70 9C A6 98 A9 C6  ...36.....p.....
#           0010: E8 9A 43 24 E9 C9 E6 33   C9 21 BE 0D 9B 0B 0C 48  ..C$...3.!.....H
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.095 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.095 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.098 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.100 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.100 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.100 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.101 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.102 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.102 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.110 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.111 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.113 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.116 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.117 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.117 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.117 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.120 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.120 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.121 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.122 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.123 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.127 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D E6 AC CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:27.000 UTC",
#       "not  after"         : "2024-01-06 13:36:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 13 78 E9 CE 60 83 9B B6   39 AF 0B 3C 1A 5A F5 EA  .x..`...9..<.Z..
#           0010: AE 20 6B C8                                        . k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.127 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.222 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 49 EC 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-08 13:36:24.000 UTC",
#     "not  after"         : "2024-01-06 13:36:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#         0010: A1 F7 F7 7E                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#         0010: F1 D8 54 31                                        ..T1
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.226 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F 3C 1E E2 7D C1 34 A4   95 33 FC 9E 2E B6 99 93  O<....4..3......
#     0010: 04 0C DE 67 E6 E9 F0 21   A1 48 A3 60 D6 0C 6F AA  ...g...!.H.`..o.
#     0020: 75 2A 45 8D AA 4F 43 C0   01 6C 4D AE 9E 0B FF CB  u*E..OC..lM.....
#     0030: 40 C2 38 18 06 63 2F 23   CD 9B AE C0 82 C1 60 74  @.8..c/#......`t
#     0040: AD A9 72 1F 02 88 80 B6   9E EF EB 01 07 2C 78 81  ..r..........,x.
#     0050: 1C 99 50 3F 5D 7B 8A 0A   E5 79 DA 58 DC BE 17 85  ..P?]....y.X....
#     0060: 84 14 2C 33 DB EB 65 D2   09 37 2E FB 92 CF F3 4D  ..,3..e..7.....M
#     0070: 84 9C C8 AD 54 29 D2 96   91 3D CD 7B 70 09 F3 EA  ....T)...=..p...
#     0080: 7E E9 3A CE 22 7D 43 14   B3 D7 CA 4D 98 D7 C8 94  ..:.".C....M....
#     0090: 2D 70 94 BE 37 84 EB 4B   72 D5 BD DC 6C 64 2D C0  -p..7..Kr...ld-.
#     00A0: 9E 02 D1 2C 8B 1C A9 7D   1C FA C2 A7 C2 F8 D1 C5  ...,............
#     00B0: 7B 1D EB 48 17 E8 C3 C0   82 5A 30 51 D5 B2 1D 5C  ...H.....Z0Q...\
#     00C0: 10 B1 DD 68 EA 45 E6 62   69 AB D7 00 92 B7 51 ED  ...h.E.bi.....Q.
#     00D0: 1C FC CB 4F FB BB 09 88   D4 02 75 D3 37 25 09 CD  ...O......u.7%..
#     00E0: 11 82 2B 77 5C 7C 35 F3   EE 18 09 91 13 BA F9 4B  ..+w\.5........K
#     00F0: D4 48 B3 6C 5B 17 33 5F   56 EC BF 5E 3D 78 48 D7  .H.l[.3_V..^=xH.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.229 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 24 E6 6C 7E AE 67 98 E4   12 ED A9 91 50 10 A4 4A  $.l..g......P..J
#     0010: A8 48 A6 5C 46 C5 6B D3   68 9F FC 7B 75 E9 08 E7  .H.\F.k.h...u...
#     0020: 4B A0 14 1F 31 96 35 39   F8 A5 DB 2F B6 14 63 A0  K...1.59.../..c.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.231 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:58.232 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.232 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:58.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.233 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-08 13:36:58.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:36:58.233 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.234 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.237 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "42 2D 9E EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:30.000 UTC",
#       "not  after"         : "2024-01-06 13:36:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 38 5B 08 25 1B 40 5D   DA FC FD 39 5C C1 6A DA  .8[.%.@]...9\.j.
#           0010: A7 07 56 89                                        ..V.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 49 EC 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:24.000 UTC",
#       "not  after"         : "2024-01-06 13:36:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#           0010: A1 F7 F7 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.265 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 62 E2 5B D0 4F C1 73   F9 D4 AF 1E AC 7F DC 3C  Wb.[.O.s.......<
#     0010: 7D 30 C1 B9 FF 03 6F 46   0E 66 B7 DC 89 CD 5B D7  .0....oF.f....[.
#     0020: B5 68 F0 6A 1C AF D9 8F   5E 40 BF 82 B0 A3 21 D7  .h.j....^@....!.
#     0030: A1 1F 28 F5 FD 82 B8 2A   37 99 E4 5E A8 A1 2D DB  ..(....*7..^..-.
#     0040: CE 8F 97 B3 34 2F B4 37   B7 FB 98 D8 96 36 8D 13  ....4/.7.....6..
#     0050: 18 4E 1C D0 A0 03 56 FF   21 60 75 D1 20 36 DE 76  .N....V.!`u. 6.v
#     0060: 9B 0D B5 AC 37 58 40 8B   D2 7C FD 82 47 78 5F 47  ....7X@.....Gx_G
#     0070: AC 58 95 A2 6A 64 C1 B5   F4 C2 F3 18 FD 1C EE 3C  .X..jd.........<
#     0080: 0F 28 1D 8A BF BC 24 4A   C9 1D E9 70 C1 A8 49 11  .(....$J...p..I.
#     0090: A1 0E B1 FC 64 5F DE 0F   DB 79 82 A6 9D 93 DD 9C  ....d_...y......
#     00A0: 1B 7B E6 AE 29 D3 4B 78   FC EA 94 D3 1C 13 CF AA  ....).Kx........
#     00B0: 94 45 41 F6 6F 94 9A 40   89 4E 69 08 E3 D7 66 DC  .EA.o..@.Ni...f.
#     00C0: 27 EC 03 50 88 BA 0B 6A   26 78 86 AF B1 F9 E1 70  '..P...j&x.....p
#     00D0: 3D 38 50 66 BC BA 59 AF   11 48 E1 A5 B2 E7 EF BD  =8Pf..Y..H......
#     00E0: EA 6E 23 F3 77 8D CD 34   96 03 99 9D EF 40 FB B5  .n#.w..4.....@..
#     00F0: 03 E6 85 FA E2 69 86 FF   71 B2 63 A9 60 DA 6A 31  .....i..q.c.`.j1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.266 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FC 28 A6 D9 04 A3 27 3E   2E EB E8 59 DF 87 6A A2  .(....'>...Y..j.
#     0010: 66 B7 53 F5 BE 75 81 45   AF 93 FA D4 00 02 79 6C  f.S..u.E......yl
#     0020: B4 70 0C 12 3D C9 54 EE   F9 4E F8 59 E0 8B BC 02  .p..=.T..N.Y....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.267 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:36:58.354 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "68 DE 3A 69 19 BA 3B 71 49 0C 11 E1 A9 29 F3 3C FF 18 DA 98 66 10 FF BA A5 6F 2D E6 C8 E5 13 3D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-08 13:36:58.637 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-08 13:36:58.639 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-08 13:37:09.717; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-08 13:37:10.063 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 56 A7 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:22.000 UTC",
#       "not  after"         : "2024-01-06 13:36:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#           0010: A1 F7 F7 7E                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 49 EC 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-08 13:36:24.000 UTC",
#       "not  after"         : "2024-01-06 13:36:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E7 A5 DF 4A 9B 43 40 C3   5C E3 B3 8D FA 61 50 43  ...J.C@.\....aPC
#           0010: A1 F7 F7 7E                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 3F ED 5E AF 6A C1 7E   6D B0 F6 73 8A F7 91 DA  F?.^.j..m..s....
#           0010: F1 D8 54 31                                        ..T1
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-08 13:37:10.080 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:37:10.521 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:37:10.521 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:37:10.521 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:37:10.521 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:37:10.600 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:37:10.603 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-08 13:37:10.603 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.610 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.622 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.622 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.622 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-08 13:37:10.625 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B0 77 A0 CF 5A 3A 6F 9F A9 D8 18 80 85 55 2D FE B1 F3 6D 6A C2 76 A0 C5 50 2D E8 85 26 F0 7B 24",
#     "session id"          : "40 C6 98 12 0C D2 A1 31 1E E4 9F 32 B0 9A EB 43 E0 B7 2A FA DB D7 E9 39 00 97 B5 06 6E 9E A4 ED",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F0 C3 E0 5C B9 63 D8 89   16 C0 8A 7C 6E 92 A1 21  ...\.c......n..!
#               0010: 76 13 C0 8D E2 12 A2 4A   AD 74 6F 3D 68 CA 7B 22  v......J.to=h.."
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.646 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1B 0E F1 7C FB 5B E5 0F D4 58 92 F6 5B E0 97 9A 97 CD BF 54 D7 1A A6 B1 BF 54 E0 4A 1D C8 C8 BC",
#     "session id"          : "40 C6 98 12 0C D2 A1 31 1E E4 9F 32 B0 9A EB 43 E0 B7 2A FA DB D7 E9 39 00 97 B5 06 6E 9E A4 ED",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C5 6C ED 2A 59 78 D1 29   07 01 0D A2 92 F5 35 26  .l.*Yx.)......5&
#             0010: 63 08 D3 DF F4 B3 B7 21   34 A1 D0 28 6E F5 5B 7B  c......!4..(n.[.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.646 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.646 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.647 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.648 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.649 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.651 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.663 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.664 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.667 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:37:10.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:37:10.669 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-08 13:37:10.670 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-08 13:38:29.658 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:38:29.714 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:38:29.715 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:38:29.715 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-08 13:38:29.715 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43616/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28392ms
ok 65 stop command for single port in 31976ms
ok 66 status detects locally running solr in 14356ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2175ms
ok 69 copying files around in 6682ms
ok 70 upconfig in 2638ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 5s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m28s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5622 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5622/

No tests ran.

Build Log:
[...truncated 536 lines...]
BUILD FAILED in 1m 5s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m29s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5621 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5621/

No tests ran.

Build Log:
[...truncated 537 lines...]
BUILD FAILED in 1m 6s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m33s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5620 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5620/

No tests ran.

Build Log:
[...truncated 478 lines...]
BUILD FAILED in 1m 10s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m39.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5619 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5619/

No tests ran.

Build Log:
[...truncated 475 lines...]
BUILD FAILED in 1m 10s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m39.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5618 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5618/

No tests ran.

Build Log:
[...truncated 472 lines...]
BUILD FAILED in 1m 6s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m34.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5617 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5617/

No tests ran.

Build Log:
[...truncated 475 lines...]
BUILD FAILED in 1m 8s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m35s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5616 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5616/

No tests ran.

Build Log:
[...truncated 473 lines...]
BUILD FAILED in 1m 20s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m59.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5615 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5615/

No tests ran.

Build Log:
[...truncated 478 lines...]
BUILD FAILED in 1m 9s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m39.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5614 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5614/

No tests ran.

Build Log:
[...truncated 477 lines...]
BUILD FAILED in 1m 9s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5613 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5613/

No tests ran.

Build Log:
[...truncated 474 lines...]
BUILD FAILED in 1m 8s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m34.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5612 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5612/

No tests ran.

Build Log:
[...truncated 475 lines...]
BUILD FAILED in 1m 9s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m38s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5611 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5611/

No tests ran.

Build Log:
[...truncated 473 lines...]
BUILD FAILED in 1m 10s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m40.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5610 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5610/

No tests ran.

Build Log:
[...truncated 472 lines...]
BUILD FAILED in 1m 5s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5609 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5609/

No tests ran.

Build Log:
[...truncated 469 lines...]
BUILD FAILED in 1m 5s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m32.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5608 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5608/

No tests ran.

Build Log:
[...truncated 474 lines...]
BUILD FAILED in 1m 6s
200 actionable tasks: 184 executed, 16 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 1m29s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
ERROR: Step ‘Publish JUnit test result report’ failed: No test report files were found. Configuration error?
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5607 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5607/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32891/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-04 15:39:31.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 15:39:31.429; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-04 15:39:32.485; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-04 15:39:32.526; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23910ms
ok 61 start solr with client truststore and security manager in 26588ms
not ok 62 start solr with mTLS needed in 64152ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZisTo7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32891.
#
# Started Solr server on port 32891 (pid=199123). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32892.
#
# Started Solr server on port 32892 (pid=199574). Happy searching!
#
# INFO  - 2023-10-04 15:40:59.644; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 15:40:59.649; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 15:41:00.042; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 15:41:00.045; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 15:41:00.046; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:00.081 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 6C EE 5A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:35.000 UTC",
#     "not  after"         : "2024-01-02 15:40:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 BB 7A 45 90 50 62 64   24 FF C5 62 DB 39 64 D0  ..zE.Pbd$..b.9d.
#         0010: DA CB 05 B1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:00.086 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 97 AB CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:26.000 UTC",
#     "not  after"         : "2024-01-02 15:40:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:00.103 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:00.350 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:00.352 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:00.352 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.373 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.373 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.373 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:00.377 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C6 6C FE F6 47 86 E3 91 B5 79 6C 95 43 31 31 30 6B 68 2C 56 47 0F 72 5D 47 D2 56 48 9E 31 8C F4",
#   "session id"          : "F0 35 12 AD 5D 0A 60 00 3C 2F 77 A6 95 A0 73 66 55 7B FC 99 18 77 60 71 88 DA BA 50 74 50 B0 64",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 91 64 06 6E 23 F0 2E 85   E8 67 65 C7 A9 BB D4 7B  .d.n#....ge.....
#             0010: 6A 95 47 90 10 02 10 12   46 30 4C 46 83 CC 04 6D  j.G.....F0LF...m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.500 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7C 95 15 C9 D6 B5 66 DA 5E F6 9F 64 1A 74 67 9F A0 76 F4 B2 AB 2F 54 BA 40 2D 59 F5 0D AD B8 94",
#   "session id"          : "F0 35 12 AD 5D 0A 60 00 3C 2F 77 A6 95 A0 73 66 55 7B FC 99 18 77 60 71 88 DA BA 50 74 50 B0 64",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DD 1A 66 40 5C 64 69 34   4D 65 4C 3C 73 80 A8 EC  ..f@\di4MeL<s...
#           0010: F4 CC DB FE 6E E8 D8 10   DD BA 4A 81 E3 EA D3 62  ....n.....J....b
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.501 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.501 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.502 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.502 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.502 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.503 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.503 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.505 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.505 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.506 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.507 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.517 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.519 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.521 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.530 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.531 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.531 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.531 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.531 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.532 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.532 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.532 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.534 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.534 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.535 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.535 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.536 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.537 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.541 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 D2 46 67",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:31.000 UTC",
#       "not  after"         : "2024-01-02 15:40:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 07 83 92 70 02 CF 09   97 B7 E5 6E BA 3E 55 3C  ....p......n.>U<
#           0010: AD 55 83 25                                        .U.%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.541 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:00.590 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:00.591 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:00.591 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:00.592 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.636 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.644 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 CE CB 32 22 ED 6B E6   BA 68 73 2D 3A 97 11 6D  9..2".k..hs-:..m
#     0010: 8C B1 30 B8 F2 23 78 09   B9 3D 88 93 80 4D 5C D3  ..0..#x..=...M\.
#     0020: 8C B3 29 67 C3 21 2F 3C   80 04 F5 21 1D 01 9F B5  ..)g.!/<...!....
#     0030: 4D B7 F2 CA E0 6D AC 0A   18 0E 50 3B 05 AB 40 EA  M....m....P;..@.
#     0040: AF 2F C6 1F 9D F3 35 75   5F C4 11 74 D7 CD CC B4  ./....5u_..t....
#     0050: BA E4 12 4B 70 26 88 0D   86 3E 74 AF B5 B0 16 34  ...Kp&...>t....4
#     0060: B7 A3 61 F9 B2 FF C3 3B   72 78 A4 97 6B 7E FC 28  ..a....;rx..k..(
#     0070: 93 5E 86 93 49 8E 5A F1   F5 38 D0 93 A3 BB 5F 13  .^..I.Z..8...._.
#     0080: AA 1B 89 2D D8 8F 56 AB   79 30 08 AB C2 A7 F4 41  ...-..V.y0.....A
#     0090: 90 E4 09 07 95 90 B6 28   CE BD FB F2 40 31 40 06  .......(....@1@.
#     00A0: A5 F3 2B 37 CA BA 1C 82   29 06 91 BA A9 FB CF 1E  ..+7....).......
#     00B0: CA 9F F2 D9 84 25 96 75   EB 93 B8 BF 18 05 17 18  .....%.u........
#     00C0: 41 8F C4 D1 85 36 53 9A   5A 61 7C D0 ED DA D8 31  A....6S.Za.....1
#     00D0: C6 C1 D8 A4 2A 84 51 4F   3F C6 B5 6F 6F FD 22 CF  ....*.QO?..oo.".
#     00E0: E8 06 E7 B5 FF 1A 94 60   86 F3 B7 9F C3 B5 27 68  .......`......'h
#     00F0: D0 1F 61 25 AB A0 DB 6F   DF 9E 44 E5 DD 9C B6 33  ..a%...o..D....3
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.647 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6A 9D 04 99 5D AF E6 69   F6 B5 0D B5 66 BF F5 5F  j...]..i....f.._
#     0010: 4B 6F 77 C0 5B DE F9 BB   C3 31 91 95 5D 98 80 C6  Kow.[....1..]...
#     0020: 16 3D B4 9A 3E 8E 29 DA   91 D3 59 59 79 9A C9 13  .=..>.)...YYy...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.651 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:00.652 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.652 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:00.652 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.652 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:00.652 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:00.653 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.653 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.656 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 6C EE 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:35.000 UTC",
#       "not  after"         : "2024-01-02 15:40:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 BB 7A 45 90 50 62 64   24 FF C5 62 DB 39 64 D0  ..zE.Pbd$..b.9d.
#           0010: DA CB 05 B1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 4A 12 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:28.000 UTC",
#       "not  after"         : "2024-01-02 15:40:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#           0010: 97 16 9A 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.698 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 85 AE 99 F1 C8 95 CA   FC 52 29 66 3D F4 25 91  f........R)f=.%.
#     0010: E4 07 C8 DE 4F FD BC DB   23 CD BA 10 07 AF 9C 65  ....O...#......e
#     0020: 6A DE 5F 6C 90 46 C1 26   E4 26 3F 2E C8 4A 10 86  j._l.F.&.&?..J..
#     0030: 5A DE C8 E8 D6 F3 05 10   EF CE 37 5A DC CD 9B E6  Z.........7Z....
#     0040: AC 22 88 B6 DF 63 CD 9E   EA 31 BE CD 83 0F 82 C4  ."...c...1......
#     0050: D1 14 5C 30 C1 FB 8D 26   66 36 8D 9D DB 15 48 89  ..\0...&f6....H.
#     0060: 81 98 ED EE 1F 6B 3E 56   BE 25 68 65 28 5E 09 C0  .....k>V.%he(^..
#     0070: 9F F8 EF 62 15 55 AA 76   93 60 08 96 C5 46 46 00  ...b.U.v.`...FF.
#     0080: ED 41 CC E2 1D 96 7C 44   64 FE E4 90 60 95 41 66  .A.....Dd...`.Af
#     0090: AF 57 19 B8 0A 10 E4 2B   2C 5E 97 D9 BF E4 7D 6D  .W.....+,^.....m
#     00A0: E8 C7 FF 8A CC 47 2B 1D   DE E4 18 91 8A 52 FA CC  .....G+......R..
#     00B0: 64 95 08 04 04 47 53 CC   4C B8 08 1B 2D 61 A0 8F  d....GS.L...-a..
#     00C0: AC A0 93 E3 81 19 19 61   B8 05 8D AD 8A 5C 42 C5  .......a.....\B.
#     00D0: 33 FD 51 09 84 DE 31 52   F8 1A 52 D7 F1 94 67 F6  3.Q...1R..R...g.
#     00E0: 0C 81 66 D4 DE 14 AA 0D   D3 F3 D2 BA EC E5 20 2A  ..f........... *
#     00F0: 0D 1B 89 9C 17 60 55 F8   B5 BA 24 DD 7D 83 2A E9  .....`U...$...*.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.699 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D 40 12 87 2D 0D 05 BB   BB 59 90 50 6B 61 BF FC  .@..-....Y.Pka..
#     0010: 68 A3 1D B0 A0 25 A3 80   90 52 82 A0 CB EC FF D6  h....%...R......
#     0020: 05 03 A0 4C 75 4C 03 C0   08 F7 26 79 1C 83 BE 0B  ...LuL....&y....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.700 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:00.749 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BF D3 8E FF 08 35 EB 88 04 3E 98 0A EF D8 40 BB 69 59 B9 6E FB 88 A6 AB FD 56 D0 38 0F E6 75 1F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 15:41:01.028 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 15:41:01.030 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-04 15:41:02.053; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 15:41:02.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 15:41:02.453; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 15:41:02.456; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 15:41:02.457; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZisTo7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:02.491 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 6C EE 5A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:35.000 UTC",
#     "not  after"         : "2024-01-02 15:40:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 BB 7A 45 90 50 62 64   24 FF C5 62 DB 39 64 D0  ..zE.Pbd$..b.9d.
#         0010: DA CB 05 B1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:02.497 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 97 AB CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:26.000 UTC",
#     "not  after"         : "2024-01-02 15:40:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:02.514 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:02.759 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.760 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:02.761 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:02.762 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.782 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.782 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:02.785 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3F 78 CD 9E F6 F8 45 BA 0F 65 6A 4A 19 49 30 0E 51 70 E9 F3 24 B4 AE 88 96 73 92 33 DD 1F 84 0F",
#   "session id"          : "18 C0 74 E5 76 FF 1E 23 14 78 73 71 52 CD C1 64 D9 01 09 56 AA 29 93 2C 2F D7 9D B3 BF 0A 3C 0E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 CA BE 22 1D B2 04 A1   58 54 9D A8 D6 05 5E F1  ..."....XT....^.
#             0010: 29 0E FA 66 D8 A5 1A B8   FF C9 5E 11 87 F6 13 46  )..f......^....F
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.934 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "29 5F 22 2A 1E DA 1C EC 7C 0C 46 8E E1 A0 DF 8F 85 15 08 27 1A 29 EF D6 99 D7 89 F9 74 85 B5 91",
#   "session id"          : "18 C0 74 E5 76 FF 1E 23 14 78 73 71 52 CD C1 64 D9 01 09 56 AA 29 93 2C 2F D7 9D B3 BF 0A 3C 0E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EB FC B1 A1 CD 88 5D 93   1F A5 63 A1 60 62 38 B3  ......]...c.`b8.
#           0010: A5 D0 52 D6 22 7B BC AE   63 8B A9 BE B7 E8 83 15  ..R."...c.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.935 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.935 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.938 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.938 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.940 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.940 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:02.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:02.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.951 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.953 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.954 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.964 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.964 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.964 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.964 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.965 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:02.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:02.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.967 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.968 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.968 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.968 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.969 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.970 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:02.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.974 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 D2 46 67",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:31.000 UTC",
#       "not  after"         : "2024-01-02 15:40:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 07 83 92 70 02 CF 09   97 B7 E5 6E BA 3E 55 3C  ....p......n.>U<
#           0010: AD 55 83 25                                        .U.%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:02.974 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:03.048 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:03.049 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:03.049 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:03.049 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.076 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 4A 12 68",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 15:40:28.000 UTC",
#     "not  after"         : "2024-01-02 15:40:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#         0010: 97 16 9A 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#         0010: 06 F9 11 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.083 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 38 81 4C FB B1 2F DF   B4 C9 41 85 28 96 D5 F0  W8.L../...A.(...
#     0010: 3E 96 3D 68 8C B9 8E E2   41 C3 5D B3 53 DF E3 7B  >.=h....A.].S...
#     0020: 27 AD 05 4F 9A D8 37 A3   03 7F 1F 2D 60 AE AB C5  '..O..7....-`...
#     0030: 54 48 6D 50 C8 33 5F 80   96 F1 01 A3 04 17 A5 B8  THmP.3_.........
#     0040: EF 84 9B 69 E5 9D 90 B1   96 28 04 8F F1 EF 32 7E  ...i.....(....2.
#     0050: 89 38 89 36 D6 DC 6A A4   A1 83 D4 AB 3D A7 CC CC  .8.6..j.....=...
#     0060: EC FD 5B 15 89 7B 79 57   C1 84 AF 4C DA 4F 17 BA  ..[...yW...L.O..
#     0070: D7 F4 7C FF 65 32 59 EC   B0 10 36 77 CB 4E 47 A0  ....e2Y...6w.NG.
#     0080: FD 68 30 D6 2C 8D A7 CB   15 CF F4 51 D3 AC 31 76  .h0.,......Q..1v
#     0090: 8E 4B 7C EB 58 CD 10 E3   22 5F 2B 97 D6 22 69 55  .K..X..."_+.."iU
#     00A0: 83 74 A9 0F 7B FD 5F 75   81 09 49 C9 06 F8 40 1A  .t...._u..I...@.
#     00B0: 36 A9 C4 25 64 7D A6 28   24 B4 12 B8 99 31 BD 5D  6..%d..($....1.]
#     00C0: AD 22 D3 A0 4D 6D A0 9A   33 71 EB B2 BC B2 D1 F5  ."..Mm..3q......
#     00D0: 8C E9 6D 1E 9F 0C 53 C8   DF DD CA 86 63 92 E1 74  ..m...S.....c..t
#     00E0: FD D9 0B 83 98 48 5A 71   BD 03 6C 02 77 56 BB F4  .....HZq..l.wV..
#     00F0: B2 75 D0 27 C4 C3 46 24   E8 1D 67 48 D7 E4 93 27  .u.'..F$..gH...'
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.085 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 F5 D3 05 44 E8 66 E6   E8 17 79 36 32 B5 C6 4D  ....D.f...y62..M
#     0010: AA C3 21 04 08 89 AE BC   E4 4A BF BE 06 F9 F9 9B  ..!......J......
#     0020: AC B9 D6 14 78 A1 45 F2   9E C4 16 EE ED C7 8F 1D  ....x.E.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.089 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:03.090 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:03.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:03.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:03.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 15:41:03.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:03.092 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.092 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.095 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 6C EE 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:35.000 UTC",
#       "not  after"         : "2024-01-02 15:40:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 BB 7A 45 90 50 62 64   24 FF C5 62 DB 39 64 D0  ..zE.Pbd$..b.9d.
#           0010: DA CB 05 B1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 4A 12 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:28.000 UTC",
#       "not  after"         : "2024-01-02 15:40:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#           0010: 97 16 9A 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.138 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A D6 C0 7D 29 6A 5F 76   BA 2F B0 2D BA 08 BA 53  j...)j_v./.-...S
#     0010: 08 5C 22 2A 72 92 DD CF   16 58 E5 DF A5 7F 3B 9C  .\"*r....X....;.
#     0020: 64 09 0B 36 4D FA F1 A7   DC E2 29 BD 57 78 C6 1A  d..6M.....).Wx..
#     0030: E7 B0 56 C1 A3 FA 51 CB   77 80 24 C0 EA 71 51 DD  ..V...Q.w.$..qQ.
#     0040: C5 0E 67 A4 AC 4E 9E EB   C5 92 94 44 D6 E7 AD 42  ..g..N.....D...B
#     0050: FD 4C 23 D8 A3 34 AF 1F   56 1C 17 C4 2B 7B 2B 19  .L#..4..V...+.+.
#     0060: 07 5A 3B EC D1 8A 30 79   CA B6 93 A7 0D EE 9C C4  .Z;...0y........
#     0070: 89 4D 37 22 DB 41 F1 69   EB C0 8D 26 8D B9 10 F0  .M7".A.i...&....
#     0080: C2 B7 53 7D 0C 22 22 29   DB 2B F7 70 F2 E0 4B 2A  ..S.."").+.p..K*
#     0090: 9B 79 E7 E8 DA 33 A4 A3   AE FB 90 A8 2C 80 55 49  .y...3......,.UI
#     00A0: B4 92 3A 19 7B 39 2C 80   13 68 90 ED 6D CC A7 4D  ..:..9,..h..m..M
#     00B0: 4C C3 76 96 FA 97 A4 E5   3D A5 F9 17 32 54 FB 36  L.v.....=...2T.6
#     00C0: 63 AD 92 C0 DD 50 A0 FF   23 15 78 61 52 5B C8 1D  c....P..#.xaR[..
#     00D0: B4 D2 18 35 18 54 D1 72   EA B9 36 E8 F7 30 14 12  ...5.T.r..6..0..
#     00E0: A4 C4 3A 59 8D 15 0B 4D   C1 9E 39 CC D9 D7 6B 09  ..:Y...M..9...k.
#     00F0: AA 05 3D E1 3E B5 B2 D4   5A B7 63 B3 88 8B 0E 9C  ..=.>...Z.c.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.140 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 48 20 3F 96 E5 84 75   B0 E4 DF 01 26 58 59 5C  .H ?...u....&XY\
#     0010: 32 59 32 A2 39 F6 FE AB   E3 F1 12 7D E1 67 5B 5D  2Y2.9........g[]
#     0020: A7 34 A7 5E FF 45 CB 3A   48 53 87 28 B1 74 CA 8F  .4.^.E.:HS.(.t..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.141 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:03.192 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C7 7B 65 BA 59 F0 E8 CC C8 FD 2C 4E 85 A7 3E E3 B0 19 D4 6E C8 67 5F 4F 1F 72 17 0B 16 FB 67 D8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 15:41:03.486 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 15:41:03.487 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-04 15:41:15.773; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:16.136 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 4A 12 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:28.000 UTC",
#       "not  after"         : "2024-01-02 15:40:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#           0010: 97 16 9A 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C 95 7D 18 63 A6 23 FF   32 3D 73 EE E1 37 2B 5D  ....c.#.2=s..7+]
#           0010: 06 F9 11 A4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 97 AB CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 15:40:26.000 UTC",
#       "not  after"         : "2024-01-02 15:40:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 2C 16 7A FE 62 35 70   0D E4 DB 8F 2C F1 A8 B8  .,.z.b5p....,...
#           0010: 97 16 9A 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-04 15:41:16.153 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:16.448 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:16.455 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:16.455 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:41:16.456 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:16.617 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.617 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:16.619 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 15:41:16.620 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.626 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.641 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 15:41:16.645 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "FE 00 D0 6F 4F 3D 59 96 85 80 68 85 26 81 DC CC B0 42 50 30 DE C4 75 E1 B3 CC CB D8 B6 17 72 91",
#     "session id"          : "80 DE B7 F5 9D 1D 87 8C C2 DD 5E 62 B3 68 37 5A 34 A9 B1 A4 9B 73 BC EB EB 4B 0D 83 AD 36 AF 0C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3F A8 1C DC BB 8E 0F 9A   48 5B E1 44 C7 63 92 A0  ?.......H[.D.c..
#               0010: FE DB 8D C7 CA DB 7F D5   98 A8 73 5B 7E 0F 56 43  ..........s[..VC
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.667 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F8 A6 B5 4F 60 FC 84 E7 CE 61 48 03 16 70 AC 10 84 BD 74 01 96 DD B3 E4 D2 CF CB CB F6 A8 3F 85",
#     "session id"          : "80 DE B7 F5 9D 1D 87 8C C2 DD 5E 62 B3 68 37 5A 34 A9 B1 A4 9B 73 BC EB EB 4B 0D 83 AD 36 AF 0C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C 30 67 D6 0F 0F 33 33   52 8C 91 A4 0A F1 10 B6  ,0g...33R.......
#             0010: C7 B9 96 C0 50 DE 5B AA   27 36 A7 6D 1E E4 4F 5A  ....P.[.'6.m..OZ
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.667 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.667 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.670 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.672 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.683 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.686 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.687 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.696 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.696 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.697 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:16.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:41:16.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 15:41:16.699 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 15:42:45.930 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:42:45.974 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:42:45.975 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:42:45.975 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 15:42:45.975 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32892/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28703ms
ok 65 stop command for single port in 31562ms
ok 66 status detects locally running solr in 14598ms
ok 67 status does not expose cli parameters to end user in 229ms
ok 68 listing out files in 2264ms
ok 69 copying files around in 6915ms
ok 70 upconfig in 2950ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1249ms
ok 73 Cleanup in 1241ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 23m 12s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m43s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5606 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5606/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40465/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-04 09:37:37.385; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 09:37:37.391; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-04 09:37:38.289; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-04 09:37:38.328; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22685ms
ok 61 start solr with client truststore and security manager in 25026ms
not ok 62 start solr with mTLS needed in 56322ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-aD61cg/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40465.
#
# Started Solr server on port 40465 (pid=196726). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40466.
#
# Started Solr server on port 40466 (pid=197152). Happy searching!
#
# INFO  - 2023-10-04 09:39:00.907; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 09:39:00.913; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 09:39:01.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 09:39:01.282; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 09:39:01.282; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:01.313 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 CA DE 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:37.000 UTC",
#     "not  after"         : "2024-01-02 09:38:37.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E F3 A1 C4 A3 B1 A8 17   7E 0C B1 5E 3F E8 23 98  ...........^?.#.
#         0010: 72 98 32 09                                        r.2.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:01.317 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 2F 38 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:29.000 UTC",
#     "not  after"         : "2024-01-02 09:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:01.331 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:01.558 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.558 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:01.560 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:01.560 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.566 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.578 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.578 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.578 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:01.580 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6E 7E 14 B6 2F C8 01 27 C7 64 8C 70 B4 BF 8C 50 FC 7E 14 4B B4 9A F4 F4 9B 15 31 94 53 AB F3 E6",
#   "session id"          : "A2 03 55 A7 16 2B 18 E8 FA 85 04 6D 3A AE E5 CD F5 C2 DA 16 90 44 BC 38 A6 9B E3 6B A5 1D 9A 25",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 66 28 69 E5 A7 31 05 88   D7 2D 8A 2A 85 98 BA 24  f(i..1...-.*...$
#             0010: CD AB D5 F7 E3 63 D2 2D   1C FB 90 A4 7A BD D8 5D  .....c.-....z..]
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.695 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9D ED F3 33 17 0A 7E 4B E3 4A 28 2E 8B 58 44 BF 35 83 C3 0E CD 27 B3 04 15 A6 DF 08 23 9C A3 CD",
#   "session id"          : "A2 03 55 A7 16 2B 18 E8 FA 85 04 6D 3A AE E5 CD F5 C2 DA 16 90 44 BC 38 A6 9B E3 6B A5 1D 9A 25",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D0 EB BD 4B 96 FF 56 35   A7 CA AA 69 20 14 CD B9  ...K..V5...i ...
#           0010: 2B 27 EC 1C 04 53 05 15   A1 6D 38 08 4A 71 84 73  +'...S...m8.Jq.s
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.696 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.696 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.698 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.698 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.700 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.700 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.701 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.702 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.710 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.712 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.713 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.716 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.717 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.717 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.717 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.717 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.717 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.718 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.718 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.718 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.719 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.720 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.720 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.720 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.721 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.722 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.725 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 F0 40 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:33.000 UTC",
#       "not  after"         : "2024-01-02 09:38:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 D0 A3 35 5F 9E DE 82   A5 47 6A 2D 45 99 22 B0  "..5_....Gj-E.".
#           0010: 7A BE 38 72                                        z.8r
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.725 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:01.783 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:01.783 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:01.784 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:01.784 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.811 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.815 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 1B B6 DF 8E 2A 07 C3   D5 10 63 A7 AA A7 F9 77  .....*....c....w
#     0010: 72 C1 FB 8A 57 FE 31 DB   01 20 53 38 D4 9F 19 61  r...W.1.. S8...a
#     0020: 22 B3 AD B3 5C 8A 36 80   A7 C3 8C 7B 56 ED E8 5A  "...\.6.....V..Z
#     0030: C1 49 7E 77 F5 65 51 AF   B9 A3 A8 E1 DB 14 D4 B3  .I.w.eQ.........
#     0040: 32 74 8C 89 6D 79 6C 85   F1 8D 71 10 77 E1 D9 26  2t..myl...q.w..&
#     0050: F8 72 45 63 82 E7 A5 EB   80 B2 6C E7 92 A8 7D 3E  .rEc......l....>
#     0060: D8 7A 0E AA CD 34 3E 7F   CE 15 E4 E3 EB 31 19 07  .z...4>......1..
#     0070: F1 21 59 8F 95 C2 1E 7C   D9 0A 4E 3C 96 C5 C5 0D  .!Y.......N<....
#     0080: 99 3B 18 CE 99 75 70 22   94 42 96 51 63 DF 88 CB  .;...up".B.Qc...
#     0090: 91 C6 A0 00 EA C6 7B 7D   F5 D0 B6 D8 4A 5D 87 10  ............J]..
#     00A0: 0D FD 14 D2 59 52 6E 38   48 C1 56 2B FB B6 EE 41  ....YRn8H.V+...A
#     00B0: 8F D7 3F 58 05 FF 35 19   0C 9F 49 B0 1F 7A 79 F3  ..?X..5...I..zy.
#     00C0: 0F 7C 48 2D 65 B7 74 AD   79 23 F6 51 ED 6A C3 30  ..H-e.t.y#.Q.j.0
#     00D0: 00 22 AB C0 58 E2 B1 84   EE A1 C2 36 3A A7 08 52  ."..X......6:..R
#     00E0: 0A 25 6B 63 12 6E 06 6E   97 C3 BD BE 8D 88 90 29  .%kc.n.n.......)
#     00F0: 6F BA 9E 32 93 AD 5C 42   94 C2 F7 72 20 6B 51 08  o..2..\B...r kQ.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.817 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 FC 64 F8 2E 53 0A FE   40 39 E7 65 A0 77 27 F6  ..d..S..@9.e.w'.
#     0010: 04 9C BB 83 21 4C E2 A7   64 03 23 7F 18 6A 42 42  ....!L..d.#..jBB
#     0020: 02 7B F2 CF 90 54 B3 2B   7C 2D 25 D4 95 92 6A 0B  .....T.+.-%...j.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.819 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:01.820 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.820 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:01.820 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.820 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:01.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:01.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.821 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.824 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 CA DE 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:37.000 UTC",
#       "not  after"         : "2024-01-02 09:38:37.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E F3 A1 C4 A3 B1 A8 17   7E 0C B1 5E 3F E8 23 98  ...........^?.#.
#           0010: 72 98 32 09                                        r.2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 7F 2A AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:30.000 UTC",
#       "not  after"         : "2024-01-02 09:38:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#           0010: D0 78 C7 8C                                        .x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.850 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D D6 5E E5 90 BD C1 2D   F4 C7 8D B2 39 F0 03 C2  M.^....-....9...
#     0010: FD AC 21 14 F0 3A F1 2D   C9 69 B1 60 0A AD 1E 42  ..!..:.-.i.`...B
#     0020: A4 32 0B C2 4E 74 D0 86   2A 90 C2 9F C1 23 5C 16  .2..Nt..*....#\.
#     0030: 24 52 78 45 E4 EF 8E 5B   F5 C1 5B CD 81 A9 87 46  $RxE...[..[....F
#     0040: 3E F9 C1 F8 89 82 5A A3   0D 54 57 40 69 37 43 BF  >.....Z..TW@i7C.
#     0050: 67 2D C0 9E 17 FF F9 76   64 93 70 E2 96 90 51 BD  g-.....vd.p...Q.
#     0060: 7E 55 0A 9B AF 9F BE 5A   22 E2 7E 46 A9 47 BE 8C  .U.....Z"..F.G..
#     0070: 6A 87 19 E5 59 51 6E 3D   84 9B 21 B4 B6 B1 A2 D0  j...YQn=..!.....
#     0080: 3E 6D E0 BB A9 84 59 1E   5C 7E B5 08 A6 5A 71 60  >m....Y.\....Zq`
#     0090: 80 5A 37 D4 8A 0B 48 99   AF 82 96 6E B5 58 5C DC  .Z7...H....n.X\.
#     00A0: CF A1 9B 94 AA B4 98 B6   29 93 15 AA 55 75 55 E8  ........)...UuU.
#     00B0: A1 07 D6 D8 91 9F 86 76   6C 80 CC BA 79 45 B7 5F  .......vl...yE._
#     00C0: 99 85 5E 6B F1 44 9D 6F   08 BE E8 BC 44 71 E8 74  ..^k.D.o....Dq.t
#     00D0: 06 59 84 48 53 0E 4F 91   AD 5C 51 A5 45 93 50 7F  .Y.HS.O..\Q.E.P.
#     00E0: E0 38 BB B9 06 DB 2A 8B   6A 9C 9E AF 43 65 34 3D  .8....*.j...Ce4=
#     00F0: A2 06 8B E5 86 A3 68 3C   77 68 FB 54 9F FA FA DF  ......h<wh.T....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.851 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 80 38 CA 79 3E 97 D3 90   62 E0 26 03 63 E5 9D 23  .8.y>...b.&.c..#
#     0010: AA 0A EB 11 9E 72 F5 C2   D8 EA 3A 51 EF 8B 6B 46  .....r....:Q..kF
#     0020: 9C 2A D1 26 D1 B7 5A 88   11 FA 33 21 92 8C 00 89  .*.&..Z...3!....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.851 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:01.899 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "71 91 36 FD 1B 07 C4 04 75 68 AE F5 AE 50 D5 D6 D8 21 4A 35 CD BC 23 BB 8E 1D 61 AD 06 D2 6C F3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 09:39:02.159 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 09:39:02.160 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-04 09:39:03.098; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 09:39:03.103; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 09:39:03.490; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 09:39:03.493; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 09:39:03.493; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aD61cg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:03.525 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "25 CA DE 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:37.000 UTC",
#     "not  after"         : "2024-01-02 09:38:37.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E F3 A1 C4 A3 B1 A8 17   7E 0C B1 5E 3F E8 23 98  ...........^?.#.
#         0010: 72 98 32 09                                        r.2.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:03.529 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 2F 38 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:29.000 UTC",
#     "not  after"         : "2024-01-02 09:38:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:03.543 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:03.768 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:03.770 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:03.770 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.776 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.788 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.789 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.789 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:03.791 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "70 23 6A 0B B8 12 E5 FE 19 92 68 51 52 70 A5 22 59 ED 5C 80 F9 EF D2 EE A9 41 25 3D 72 73 03 CA",
#   "session id"          : "68 4C D2 E0 E7 42 49 AC CA C8 CE 9D CF 42 FD CE 3F 20 5A 58 F8 26 97 D1 21 4E 0E 7C D4 49 1D 6C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 4B F3 0A FB 5A B2 E9   D7 9E E2 37 49 56 71 CC  YK...Z.....7IVq.
#             0010: C3 1C C4 11 FF AE 00 26   06 8D 44 51 2E C7 48 67  .......&..DQ..Hg
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.890 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "38 7F B5 ED 2D DF A3 A6 53 C5 12 5B 61 9E 24 7E BB 74 9B B5 1D D3 5C 2B 00 5C 39 8A 4B AA AE E1",
#   "session id"          : "68 4C D2 E0 E7 42 49 AC CA C8 CE 9D CF 42 FD CE 3F 20 5A 58 F8 26 97 D1 21 4E 0E 7C D4 49 1D 6C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A0 87 00 CA 9E 18 35 C9   A4 1D 22 8F 76 04 3B 6F  ......5...".v.;o
#           0010: D0 5E E8 B5 10 42 B9 36   06 A9 D4 96 F5 0D E9 60  .^...B.6.......`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.890 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.891 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.893 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.895 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.895 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.895 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:03.896 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.904 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.905 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.906 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.910 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.910 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.910 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.910 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.911 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.911 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.911 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:03.911 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:03.911 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.913 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.913 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.913 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.913 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.914 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.915 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:03.915 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.918 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 F0 40 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:33.000 UTC",
#       "not  after"         : "2024-01-02 09:38:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 22 D0 A3 35 5F 9E DE 82   A5 47 6A 2D 45 99 22 B0  "..5_....Gj-E.".
#           0010: 7A BE 38 72                                        z.8r
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:03.918 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:03.978 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:03.979 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:03.979 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:39:03.979 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.005 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 7F 2A AE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 09:38:30.000 UTC",
#     "not  after"         : "2024-01-02 09:38:30.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#         0010: D0 78 C7 8C                                        .x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#         0010: 61 EB F5 1D                                        a...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.009 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B A5 78 41 85 3E AD D9   64 C7 FC 92 4C 73 1D 6C  ..xA.>..d...Ls.l
#     0010: E9 FD BC EA 61 3C 13 8A   79 1D ED CF A2 F3 FC F6  ....a<..y.......
#     0020: BC F4 32 E6 5C 1A E1 3A   D9 8F 95 1D 68 A6 BD BB  ..2.\..:....h...
#     0030: FF 8F 77 32 B2 82 A5 40   48 6B 8D AB B1 CF 90 3F  ..w2...@Hk.....?
#     0040: 00 53 30 FB 4F DC 68 41   E1 6F 36 DC C7 92 1A F2  .S0.O.hA.o6.....
#     0050: 87 59 AF D4 74 F1 99 1B   41 C2 ED E4 E8 4C BA 82  .Y..t...A....L..
#     0060: 88 B4 26 C4 18 A7 E1 30   77 81 72 51 78 95 88 7F  ..&....0w.rQx...
#     0070: BA CE E6 AC 43 DB E6 31   97 26 BE 27 72 8D 09 D2  ....C..1.&.'r...
#     0080: B5 D7 0C B6 B4 4A 3D 62   20 80 3A DC 9E 4F 75 22  .....J=b .:..Ou"
#     0090: DE FB 7E 86 15 F2 27 85   F1 A3 25 A5 1F 88 7A 74  ......'...%...zt
#     00A0: ED 43 5F 81 ED 53 0D 6C   A9 EE 1E 2A 8E EF 5B 8B  .C_..S.l...*..[.
#     00B0: 23 40 CC 07 49 97 9C CF   5D 37 DC FB 50 49 2A 36  #@..I...]7..PI*6
#     00C0: 61 1B 85 40 5B 20 1C DB   52 DB 67 97 96 D6 C1 1E  a..@[ ..R.g.....
#     00D0: 73 34 AE C7 88 35 23 81   36 DA 6D E6 C1 98 24 43  s4...5#.6.m...$C
#     00E0: 6F 85 D4 A5 88 2C 3B B0   28 FD 32 CC 48 C3 92 F0  o....,;.(.2.H...
#     00F0: C6 3D 66 36 18 AE 7C 5C   D1 7F 6F 59 1D 52 DF BE  .=f6...\..oY.R..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.011 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C FD D2 7B F1 86 D6 9A   1A CA 7B C3 66 E0 8F F7  l...........f...
#     0010: 95 61 BD 9A 28 03 E2 DD   5D 4C 1D 66 F9 6A DF 2B  .a..(...]L.f.j.+
#     0020: 1F 43 CB 7C 1D 78 CE E8   F8 B8 49 B9 2D 2A 32 BA  .C...x....I.-*2.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.014 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:04.015 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:04.015 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:04.015 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:04.016 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 09:39:04.016 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:04.016 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.016 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.019 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 CA DE 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:37.000 UTC",
#       "not  after"         : "2024-01-02 09:38:37.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2E F3 A1 C4 A3 B1 A8 17   7E 0C B1 5E 3F E8 23 98  ...........^?.#.
#           0010: 72 98 32 09                                        r.2.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 7F 2A AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:30.000 UTC",
#       "not  after"         : "2024-01-02 09:38:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#           0010: D0 78 C7 8C                                        .x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.043 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D 70 4F 78 88 53 6D 91   38 35 CA 7C 2A 92 E7 CF  .pOx.Sm.85..*...
#     0010: 85 4F B8 F5 6B 8D 65 AF   7C 10 60 37 FC 6E AB CB  .O..k.e...`7.n..
#     0020: 0D CD 84 73 AD E5 2D B9   98 77 74 3E 5C 6A 29 73  ...s..-..wt>\j)s
#     0030: 2F C5 FB 7A AD 54 EB 94   02 F3 CA 35 CF 4E 76 1E  /..z.T.....5.Nv.
#     0040: C6 53 9D CB B7 09 3A 9D   0D DE BD FB E8 4B 4C B6  .S....:......KL.
#     0050: 7F 31 79 21 BC 8B C7 9D   CB 48 13 19 70 CF 09 1F  .1y!.....H..p...
#     0060: 59 0D 04 C1 69 B8 F1 33   35 30 DA 53 B7 85 A8 07  Y...i..350.S....
#     0070: A9 B0 C4 CB 6F F9 EB 7A   D0 73 01 60 9D 4F 8A 53  ....o..z.s.`.O.S
#     0080: D3 50 BE 59 52 CA B3 AD   4C BF 58 BD A4 8E F8 7F  .P.YR...L.X.....
#     0090: 8B E5 ED 5C FF 52 3E 4C   2A 87 B1 4A D7 C8 C2 A5  ...\.R>L*..J....
#     00A0: 6F C8 01 78 D0 9B 13 39   9F B4 31 56 0B FC 66 C5  o..x...9..1V..f.
#     00B0: E2 11 BD 7F 8C 6B BB 2F   E6 87 2A 3B 84 9A 08 C5  .....k./..*;....
#     00C0: 40 38 BB 6D 7C 1C 98 79   A7 42 3C 08 41 0C 9C 96  @8.m...y.B<.A...
#     00D0: EF 72 A1 5E EB AB 6F 04   6A 40 42 95 6E 5A AB 4A  .r.^..o.j@B.nZ.J
#     00E0: 99 DB 11 8D F5 FD 11 A3   CF D7 04 56 BC 97 A8 EE  ...........V....
#     00F0: DA 4D CB A7 29 FB 10 FF   D5 B9 0A 63 98 B9 85 8E  .M..)......c....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.044 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 07 08 05 62 08 8A 3C   84 AB B6 7D 16 F3 B7 4B  ....b..<.......K
#     0010: 12 B8 53 4C 48 EE E3 12   86 71 63 03 15 F6 F0 EA  ..SLH....qc.....
#     0020: 67 8C B9 3A 10 C7 BD AF   23 2B 19 45 9B 57 C9 CE  g..:....#+.E.W..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.045 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:04.092 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 E1 44 5C BB 5E EC 57 10 B0 00 B9 61 BB 27 B6 28 D4 2D 24 50 82 8A A8 2D F3 EA 93 EC E6 5B 5A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 09:39:04.361 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 09:39:04.362 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-04 09:39:15.355; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:15.682 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 7F 2A AE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:30.000 UTC",
#       "not  after"         : "2024-01-02 09:38:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#           0010: D0 78 C7 8C                                        .x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 79 90 24 BC BF 31 A9   10 3D EE 90 F6 BC 41 6C  .y.$..1..=....Al
#           0010: 61 EB F5 1D                                        a...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 2F 38 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 09:38:29.000 UTC",
#       "not  after"         : "2024-01-02 09:38:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3D 60 AF 2F 74 2A B9 AD   D7 D8 A4 D5 DA 9B 9E 4C  =`./t*.........L
#           0010: D0 78 C7 8C                                        .x..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-04 09:39:15.696 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:15.921 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.921 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:15.923 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 09:39:15.923 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.940 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.940 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.941 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 09:39:15.943 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5B C6 95 3F ED E4 C4 1D 2C C0 95 4B 54 07 5E 5C 8C 8A CC EA 1D 2A D9 7B F9 DD C4 24 12 62 97 9B",
#     "session id"          : "F1 7D E4 B7 A5 F2 61 D5 B5 EF D9 41 CA F2 F8 DC 83 C8 73 69 6C 9F 44 9C A0 10 5A 01 65 DB A3 9E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 85 FE AD 40 D6 E7 8E 1E   A5 49 6A 58 0C 0A 51 E6  ...@.....IjX..Q.
#               0010: A2 55 FC AF CB 54 02 57   65 68 04 55 E6 DA 83 29  .U...T.Weh.U...)
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.963 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "25 8D 5A AD 26 A2 53 9E 0C 7D 34 34 F6 BE 8B A0 0C 66 6C 16 76 5C B7 9F 67 2C 32 E4 6A 94 BD 5C",
#     "session id"          : "F1 7D E4 B7 A5 F2 61 D5 B5 EF D9 41 CA F2 F8 DC 83 C8 73 69 6C 9F 44 9C A0 10 5A 01 65 DB A3 9E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C 35 82 A0 29 B5 5B 28   1F 3D FB 7E D3 C9 9E E9  \5..).[(.=......
#             0010: FD 5B 0E BC CC 77 AD E9   B6 54 69 EC 02 67 A7 3B  .[...w...Ti..g.;
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.964 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.964 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.965 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.966 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.968 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.968 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:15.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:15.970 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.970 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.970 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.977 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.978 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.979 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.983 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.984 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:15.984 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:39:15.984 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 09:39:15.985 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 09:40:34.999 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:40:35.054 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:40:35.054 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:40:35.055 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 09:40:35.055 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40466/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28334ms
ok 65 stop command for single port in 30946ms
ok 66 status detects locally running solr in 14609ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2180ms
ok 69 copying files around in 6603ms
ok 70 upconfig in 2638ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 20s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m48.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5605 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5605/

1 tests failed.
FAILED:  org.apache.solr.cloud.api.collections.TestCollectionAPI.test

Error Message:
org.junit.ComparisonFailure: collection health expected:<[GREEN]> but was:<[YELLOW]>

Stack Trace:
org.junit.ComparisonFailure: collection health expected:<[GREEN]> but was:<[YELLOW]>
	at __randomizedtesting.SeedInfo.seed([11869D9C1D05DF7:894C56036F2C300F]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.cloud.api.collections.TestCollectionAPI.clusterStatusWithCollectionHealthState(TestCollectionAPI.java:428)
	at org.apache.solr.cloud.api.collections.TestCollectionAPI.test(TestCollectionAPI.java:98)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at org.apache.solr.BaseDistributedSearchTestCase$ShardsRepeatRule$ShardsFixedStatement.callStatement(BaseDistributedSearchTestCase.java:1163)
	at org.apache.solr.BaseDistributedSearchTestCase$ShardsRepeatRule$ShardsStatement.evaluate(BaseDistributedSearchTestCase.java:1134)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4873 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44697/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-04 01:24:46.604; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 01:24:46.609; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-04 01:24:47.579; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-04 01:24:47.618; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23192ms
ok 61 start solr with client truststore and security manager in 25379ms
not ok 62 start solr with mTLS needed in 57746ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UzQXLG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44697.
#
# Started Solr server on port 44697 (pid=197850). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44698.
#
# Started Solr server on port 44698 (pid=198298). Happy searching!
#
# INFO  - 2023-10-04 01:26:11.247; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 01:26:11.253; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 01:26:11.634; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 01:26:11.637; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7b84fcf8(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 01:26:11.637; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@30b19518(ca,h=[localhost],a=[],w=[]) for Client@604f2bd2[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:11.949 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 94 67 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:47.000 UTC",
#     "not  after"         : "2024-01-02 01:25:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 41 89 2B 60 19 D9 FF   08 AE 5A 6C B1 A0 60 F2  +A.+`.....Zl..`.
#         0010: 5C 40 02 EF                                        \@..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:11.954 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 50 DB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:39.000 UTC",
#     "not  after"         : "2024-01-02 01:25:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:11.968 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:12.179 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.179 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:12.181 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:12.182 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.188 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.200 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.200 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:12.204 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "02 25 81 03 72 E3 06 45 35 86 91 CC BB FF A9 CC 81 10 34 28 F1 FE 97 E9 48 3F 8B 0B B7 10 BC F0",
#   "session id"          : "95 40 FD 26 9A 96 EF DB 1C E9 5E 26 CE 46 23 FE 48 4E 80 70 6C 27 CE AE 55 29 15 05 6D 70 A4 A7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DC 80 FB D2 F8 DA 7C 0E   19 54 A9 2A 73 BD 90 04  .........T.*s...
#             0010: D6 C4 FC 36 32 E5 F1 CE   AD AF 71 F4 7E 85 F0 27  ...62.....q....'
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.328 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F0 A9 74 E8 AD 0C 81 FC 30 ED A9 DA 98 7E B1 F9 C7 7D B5 DF 0A 2A 5B 48 1F 1F A9 2F B1 AF D5 44",
#   "session id"          : "95 40 FD 26 9A 96 EF DB 1C E9 5E 26 CE 46 23 FE 48 4E 80 70 6C 27 CE AE 55 29 15 05 6D 70 A4 A7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 05 E0 C6 5F 31 C7 03 AC   08 DF 6B 13 01 B1 89 CB  ..._1.....k.....
#           0010: 8D C8 A7 15 F2 35 38 B6   0D 3C EF 4A C1 6F C9 57  .....58..<.J.o.W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.328 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.329 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.331 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.333 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.333 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.343 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.345 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.346 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.350 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.350 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.351 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.351 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.351 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.351 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.353 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.354 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.354 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.355 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.356 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.357 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.361 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 54 1C 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:43.000 UTC",
#       "not  after"         : "2024-01-02 01:25:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B F1 1B 96 F7 8A 11 BF   F0 B8 A2 80 15 D7 67 17  ;.............g.
#           0010: A2 80 5F DC                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.361 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:12.424 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:12.427 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:12.427 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:12.427 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.467 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.470 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D FB 88 55 D0 C6 6C 6B   95 1E BF 5A DA E8 4D 04  ...U..lk...Z..M.
#     0010: EA C3 AC 06 61 B8 8E D3   88 33 88 73 C5 3E 6A 21  ....a....3.s.>j!
#     0020: 84 26 57 9F BF BC 7A DB   C3 3D D5 AE 7F BC 53 BB  .&W...z..=....S.
#     0030: C4 CB 8B FE 8A 36 5E 04   55 FF D1 1B 42 08 24 F1  .....6^.U...B.$.
#     0040: 14 D1 30 51 0F 31 8F 0E   76 1D 7F CF 71 EB 98 62  ..0Q.1..v...q..b
#     0050: 6E 1B CE 01 0B 5A DC F0   B9 6F 87 95 98 EB 0C B0  n....Z...o......
#     0060: 4B A7 0D 49 CD C4 37 A2   D4 E0 37 72 0B DE 88 FE  K..I..7...7r....
#     0070: 0E EE F1 55 A8 D6 52 4D   29 70 13 3E C2 D4 D6 4D  ...U..RM)p.>...M
#     0080: 17 D8 A8 4E 56 C9 F6 A8   94 C7 25 22 20 1B 42 C0  ...NV.....%" .B.
#     0090: 18 92 CE 58 FE 22 2B AF   8A 47 33 3F 50 30 AA B1  ...X."+..G3?P0..
#     00A0: F0 AA 85 5B 62 21 D9 73   DE EF CF 58 76 E4 AE 6A  ...[b!.s...Xv..j
#     00B0: 7E F1 35 A1 56 87 8F FD   E7 90 73 87 F4 73 25 5D  ..5.V.....s..s%]
#     00C0: 61 A6 49 29 22 42 2C 89   4A 6B DB 79 AC 26 F8 89  a.I)"B,.Jk.y.&..
#     00D0: 3C B9 A6 49 66 DF 72 52   8D CF A2 BE CB 6D AF FE  <..If.rR.....m..
#     00E0: DC 95 61 34 9C 80 83 10   75 8F 4E 64 B6 5B CC 53  ..a4....u.Nd.[.S
#     00F0: C7 73 6E 9B 5E CF 88 D0   A8 30 AE 92 BD F5 66 63  .sn.^....0....fc
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.472 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 C7 15 25 D7 D8 4C 39   65 C7 C4 03 2A 2F 48 2E  ...%..L9e...*/H.
#     0010: 58 6A 3F 95 19 58 5D FF   78 AD 61 29 96 F5 54 86  Xj?..X].x.a)..T.
#     0020: B2 D0 4E 51 A0 2F F6 AC   83 89 46 A4 B0 92 68 5E  ..NQ./....F...h^
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.475 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:12.476 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.476 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:12.476 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.477 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:12.477 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:12.477 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.477 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.480 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 94 67 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:47.000 UTC",
#       "not  after"         : "2024-01-02 01:25:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 41 89 2B 60 19 D9 FF   08 AE 5A 6C B1 A0 60 F2  +A.+`.....Zl..`.
#           0010: 5C 40 02 EF                                        \@..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C E0 EA 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:41.000 UTC",
#       "not  after"         : "2024-01-02 01:25:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#           0010: 83 C4 D7 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.505 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AD F3 A2 26 A1 8E 6D 44   A6 06 AB 9B EB 72 1C 98  ...&..mD.....r..
#     0010: D5 BE 85 FA 04 7B 5B 8B   68 17 77 07 C7 8F FF 1D  ......[.h.w.....
#     0020: 98 5A 3B 9E 63 A4 43 B5   A4 2D 99 F0 BA DB 65 AD  .Z;.c.C..-....e.
#     0030: 8D 3C F2 44 F1 B0 69 B5   93 32 B6 8C 14 6B 33 CF  .<.D..i..2...k3.
#     0040: 69 E1 13 C6 50 78 1C 0A   23 4F EA 76 5E CC 9B D0  i...Px..#O.v^...
#     0050: 23 0C 48 40 2D 0E 70 83   96 51 C7 11 87 1E 79 AF  #.H@-.p..Q....y.
#     0060: 8B C4 88 0E 7D 4E 64 53   DB BB 30 BE A9 F3 1B E5  .....NdS..0.....
#     0070: F0 AD 77 6E 28 F3 61 9A   C8 F8 41 48 32 35 5C 56  ..wn(.a...AH25\V
#     0080: 2F 4E FA 25 FD 31 1E 1E   C6 33 F1 6E 70 F3 38 E7  /N.%.1...3.np.8.
#     0090: 08 71 54 43 6A 0B CE 85   C3 56 CE 9C 6A 91 7A 5E  .qTCj....V..j.z^
#     00A0: 03 CE D2 F3 EA 6C FE 19   8E D2 34 ED 32 8B 31 92  .....l....4.2.1.
#     00B0: E5 11 72 C1 37 09 A9 0F   0A 49 40 DE 2D 77 E9 4E  ..r.7....I@.-w.N
#     00C0: A5 FE 0F E6 DD A9 03 D7   9E 51 35 28 DF 56 27 E2  .........Q5(.V'.
#     00D0: 1A 9F A6 DB E4 89 64 07   31 3A D7 ED A0 A9 81 10  ......d.1:......
#     00E0: 5F D5 DD 0C 7C A8 12 39   A2 7B 32 A8 3A 03 FE 9F  _......9..2.:...
#     00F0: AC 8F D1 B7 A3 E9 CD F3   BB 0A 41 B7 F6 ED 8D 03  ..........A.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.507 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 0B BA 45 8E EF 5B B2   20 7B E8 C3 BC CA 1C 55  ...E..[. ......U
#     0010: 44 51 C9 05 8A 39 0C FD   9C 4D 2C 84 42 05 1A DE  DQ...9...M,.B...
#     0020: 62 AB 71 B4 A6 36 A5 09   CA D7 11 E8 53 C9 CF 3C  b.q..6......S..<
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.507 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:12.562 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C1 63 D8 C3 99 70 43 62 40 E3 22 E4 2B C8 CA 75 1D EF 65 29 13 D1 11 4B FA 53 23 02 D6 D0 74 87",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 01:26:12.845 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 01:26:12.846 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-04 01:26:13.791; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-04 01:26:13.796; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-04 01:26:14.240; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@49d3c823(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 01:26:14.244; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-04 01:26:14.244; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@23aa363a(ca,h=[localhost],a=[],w=[]) for Client@5d8bafa9[provider=null,keyStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UzQXLG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:14.276 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 94 67 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:47.000 UTC",
#     "not  after"         : "2024-01-02 01:25:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 41 89 2B 60 19 D9 FF   08 AE 5A 6C B1 A0 60 F2  +A.+`.....Zl..`.
#         0010: 5C 40 02 EF                                        \@..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:14.281 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 50 DB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:39.000 UTC",
#     "not  after"         : "2024-01-02 01:25:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:14.297 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:14.521 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:14.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:14.523 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.542 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:14.545 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "73 A1 F7 4A 00 A3 AF DE A1 93 C4 C7 57 85 C3 D5 64 5A B2 AC 68 47 39 23 4C 61 13 CD 57 50 D5 23",
#   "session id"          : "92 57 13 61 2B D9 DE B7 86 C3 90 0D 18 39 06 0F D3 36 D5 FD D9 C1 2A 19 DF CE 1C 72 6C 83 F9 1C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 98 E8 37 61 A2 C0 E2 B0   66 1B AC 10 81 C2 99 6D  ..7a....f......m
#             0010: 2F 6B 49 05 4B F9 AB A1   B5 C1 D6 91 9A 4D C6 2F  /kI.K........M./
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.655 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CF 9E 96 25 A7 BA 00 30 71 54 87 B6 86 DF DB A7 69 8B 4A 09 10 49 E9 D8 11 E0 67 E5 C5 B0 94 E0",
#   "session id"          : "92 57 13 61 2B D9 DE B7 86 C3 90 0D 18 39 06 0F D3 36 D5 FD D9 C1 2A 19 DF CE 1C 72 6C 83 F9 1C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 52 38 6B 1E 0A 8D F8 69   C0 AD 91 B6 65 EC C9 F2  R8k....i....e...
#           0010: DF 70 78 2B 01 B1 90 4C   92 FF 0C D7 E7 73 AE 26  .px+...L.....s.&
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.655 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.656 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.658 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.658 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.660 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.661 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.663 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.670 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.672 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.674 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.677 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.678 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.678 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.678 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.678 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.678 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.679 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.679 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.679 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.681 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.681 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.681 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.682 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.683 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.684 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.688 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 54 1C 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:43.000 UTC",
#       "not  after"         : "2024-01-02 01:25:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B F1 1B 96 F7 8A 11 BF   F0 B8 A2 80 15 D7 67 17  ;.............g.
#           0010: A2 80 5F DC                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.688 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:14.731 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:14.733 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:14.733 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:14.733 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.773 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C E0 EA 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-04 01:25:41.000 UTC",
#     "not  after"         : "2024-01-02 01:25:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#         0010: 83 C4 D7 FC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#         0010: C0 4B 22 A8                                        .K".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.777 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 3E 43 01 44 37 1D 99   2F 1C 80 64 33 8C EC B6  .>C.D7../..d3...
#     0010: C4 97 6D 3B D8 E4 41 75   FF D5 6B 19 4F 2A F7 7D  ..m;..Au..k.O*..
#     0020: 4F 3E F1 99 DF 55 2E F4   60 C3 01 41 59 63 BC 9E  O>...U..`..AYc..
#     0030: 89 71 8C 6C A9 17 16 DC   3E 8C 10 69 46 AF 9B DB  .q.l....>..iF...
#     0040: C0 16 C7 77 64 A0 01 22   4B F1 B5 41 29 79 0D 07  ...wd.."K..A)y..
#     0050: 22 11 7F F4 78 D3 A9 54   53 D8 D7 74 EC CA 0E CC  "...x..TS..t....
#     0060: A0 91 03 51 94 8A 77 3E   49 38 B1 07 6A 8A 5B 8A  ...Q..w>I8..j.[.
#     0070: 37 14 1D E9 D9 C4 1C EE   F5 37 99 12 3F F5 AA 93  7........7..?...
#     0080: 5B 59 4F 37 D0 27 C8 9D   82 27 4C CF C9 F7 5C D2  [YO7.'...'L...\.
#     0090: AA F2 DD EB 4F 75 10 C2   95 F7 F0 8D D5 C0 22 75  ....Ou........"u
#     00A0: C0 2D 18 C0 7C 32 8A 8F   BD B8 C4 1B 5F 8C 8E EE  .-...2......_...
#     00B0: 8B 7B D9 A4 F6 59 1E 96   4C F9 2B 2B 53 28 0C 89  .....Y..L.++S(..
#     00C0: D1 4F 52 F5 A6 5E DA E7   A2 48 F1 3D 4F D0 E3 86  .OR..^...H.=O...
#     00D0: C0 79 E7 9C 57 BD B4 BE   9C 00 7B B8 EE 99 78 8E  .y..W.........x.
#     00E0: BA 0B 9E CA BD 2A 8E 75   5A F3 D6 99 B5 85 3E 6D  .....*.uZ.....>m
#     00F0: 0A FB 9B 72 9B 47 EC EE   F5 B2 EC EE 40 1B 83 7E  ...r.G......@...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.778 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C FD C1 D0 CC A5 02 12   D0 4A 54 97 DE 0A 05 58  ,........JT....X
#     0010: 1F 8C B0 12 A9 A8 1F D7   0E 3F 41 A2 46 1F 37 47  .........?A.F.7G
#     0020: B9 33 45 52 43 30 CF E1   61 73 8E 9B D2 7E D5 FB  .3ERC0..as......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.780 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:14.781 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.782 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:14.782 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.782 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-04 01:26:14.782 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:26:14.783 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.783 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.786 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 94 67 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:47.000 UTC",
#       "not  after"         : "2024-01-02 01:25:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 41 89 2B 60 19 D9 FF   08 AE 5A 6C B1 A0 60 F2  +A.+`.....Zl..`.
#           0010: 5C 40 02 EF                                        \@..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C E0 EA 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:41.000 UTC",
#       "not  after"         : "2024-01-02 01:25:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#           0010: 83 C4 D7 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.812 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B0 43 AE 71 CB EC EA C8   0B 0D 8F 6D 2A B0 78 C4  .C.q.......m*.x.
#     0010: 8F A3 CF 5C 52 B6 CB 10   78 53 43 79 03 5B FA 98  ...\R...xSCy.[..
#     0020: 7A 8A 05 7D 4B 39 F5 73   93 E2 9C 2F B1 EC BB 50  z...K9.s.../...P
#     0030: C7 3C 1D 18 70 D0 B2 40   AB 37 D3 F5 1E 33 7E 08  .<..p..@.7...3..
#     0040: 95 B0 FA 8C 0D 19 49 57   F0 0A 7E 59 30 3A 96 AF  ......IW...Y0:..
#     0050: 50 27 CA 7C 8C B8 28 21   E0 85 C5 F8 AF 01 04 BB  P'....(!........
#     0060: 68 8D 75 22 EF 20 7B 8C   DB CA 28 D6 B0 87 17 73  h.u". ....(....s
#     0070: 6A 02 88 F0 A8 E7 78 38   DE 4D D0 0D 64 03 62 EA  j.....x8.M..d.b.
#     0080: 84 EE 08 AD 52 F0 CF 1F   BC FE D1 A7 2C 35 B9 FA  ....R.......,5..
#     0090: 85 A7 E3 96 6A B5 24 C7   50 9F 5F 1A 41 03 DB 78  ....j.$.P._.A..x
#     00A0: F4 E7 87 19 71 90 CB E6   3D 05 E6 3D 1B 4C FF C6  ....q...=..=.L..
#     00B0: 47 BA 82 F9 90 5E BE A2   2C 9D 8B A5 3A D5 14 D1  G....^..,...:...
#     00C0: 1D F1 F2 4D 0D 16 BD 93   7D 58 D8 E1 F6 FE 5A 51  ...M.....X....ZQ
#     00D0: 4C 42 E4 7F 5B CC 71 87   1D 57 E3 EC 11 9D D1 60  LB..[.q..W.....`
#     00E0: 6B 20 2B B4 BF EF 3E 92   85 B4 5F 09 41 71 1E 4A  k +...>..._.Aq.J
#     00F0: 7D 71 68 12 C8 B3 1F B4   83 17 F3 42 11 A6 D4 D1  .qh........B....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.813 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 76 7D D7 FD ED D9 99   AE E9 E2 25 9B B3 39 2A  Yv.........%..9*
#     0010: C9 36 CB CB 4E 73 E3 53   24 EF 0B 28 DC 19 DC 38  .6..Ns.S$..(...8
#     0020: 8B BC B4 91 86 1F C9 64   E8 96 79 88 8D 37 2E 52  .......d..y..7.R
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.814 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:14.866 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "50 60 26 8F CD 92 3F 11 1D 42 2E 57 65 4D 8F 5E 14 5D C5 E8 79 F2 34 4C 6F 63 68 CA 45 9B 26 3C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-04 01:26:15.160 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-04 01:26:15.161 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-04 01:26:26.520; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:26.864 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C E0 EA 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:41.000 UTC",
#       "not  after"         : "2024-01-02 01:25:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#           0010: 83 C4 D7 FC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 73 DE 02 6F A0 16 8E   B6 D3 E2 6A 42 83 22 83  .s..o......jB.".
#           0010: C0 4B 22 A8                                        .K".
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 50 DB AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-04 01:25:39.000 UTC",
#       "not  after"         : "2024-01-02 01:25:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 0E 91 78 BD 80 9B 85   76 CF 06 FD D0 BA 13 84  )..x....v.......
#           0010: 83 C4 D7 FC                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-04 01:26:26.880 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:27.241 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:27.241 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:27.241 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:26:27.242 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:27.396 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.396 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:27.398 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-04 01:26:27.399 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.416 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.417 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-04 01:26:27.420 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0D FF 3F BF C7 89 DA 4A C2 06 8E C4 29 47 73 F9 3A 35 CE 11 9C 8D 5D 1E 1C 44 73 23 86 9B AA 44",
#     "session id"          : "8D 64 71 DF 9D D2 42 F2 87 8D 68 79 B9 9F EA 47 E3 DF 59 9B BF 9F FE 27 4E A6 0D EA 80 37 F1 CB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C9 14 20 E4 E8 66 C8 DC   12 19 E2 3A 0F 5E 01 A3  .. ..f.....:.^..
#               0010: BA B6 D5 61 77 7B A2 E8   4A 56 39 CA 41 BE F6 73  ...aw...JV9.A..s
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:27.440 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "FE 6D BC 83 E4 C1 E6 84 71 B1 A2 8F 10 D8 6C 6A 0E DD 4D 83 78 27 E5 EF 90 6C A4 BD 38 CC E1 89",
#     "session id"          : "8D 64 71 DF 9D D2 42 F2 87 8D 68 79 B9 9F EA 47 E3 DF 59 9B BF 9F FE 27 4E A6 0D EA 80 37 F1 CB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 8D 78 6C D3 44 86 CA   92 D0 FA 28 28 60 95 04  ..xl.D.....((`..
#             0010: 43 78 82 CA E9 F3 74 7C   81 AB 44 DB A3 FA 42 19  Cx....t...D...B.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:27.440 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:27.441 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-04 01:26:27.442 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DE

[...truncated too long message...]

uilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-04 01:27:47.145 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:27:47.187 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:27:47.187 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:27:47.187 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-04 01:27:47.187 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44698/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28428ms
ok 65 stop command for single port in 30905ms
ok 66 status detects locally running solr in 14398ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2218ms
ok 69 copying files around in 6703ms
ok 70 upconfig in 2664ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1223ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.api.collections.TestCollectionAPI.test (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.api.collections.TestCollectionAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.api.collections.TestCollectionAPI.test" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=11869D9C1D05DF7 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 39s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5604 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5604/

2 tests failed.
FAILED:  org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod

Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=342, name=OverseerExitThread, state=TIMED_WAITING, group=Overseer state updater.]
        at java.base@11.0.16/java.lang.Thread.sleep(Native Method)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryDelay(ZkCmdExecutor.java:101)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:80)
        at app//org.apache.solr.common.cloud.SolrZkClient.getChildren(SolrZkClient.java:400)
        at app//org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:99)
        at app//org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
        at app//org.apache.solr.cloud.LeaderElector.retryElection(LeaderElector.java:392)
        at app//org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:134)
        at app//org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
        at app//org.apache.solr.cloud.LeaderElector.retryElection(LeaderElector.java:392)
        at app//org.apache.solr.cloud.ZkController.rejoinOverseerElection(ZkController.java:2396)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater.checkIfIamStillLeader(Overseer.java:511)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater$$Lambda$1473/0x00000008405b6c40.run(Unknown Source)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)

Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=342, name=OverseerExitThread, state=TIMED_WAITING, group=Overseer state updater.]
        at java.base@11.0.16/java.lang.Thread.sleep(Native Method)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryDelay(ZkCmdExecutor.java:101)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:80)
        at app//org.apache.solr.common.cloud.SolrZkClient.getChildren(SolrZkClient.java:400)
        at app//org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:99)
        at app//org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
        at app//org.apache.solr.cloud.LeaderElector.retryElection(LeaderElector.java:392)
        at app//org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:134)
        at app//org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
        at app//org.apache.solr.cloud.LeaderElector.retryElection(LeaderElector.java:392)
        at app//org.apache.solr.cloud.ZkController.rejoinOverseerElection(ZkController.java:2396)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater.checkIfIamStillLeader(Overseer.java:511)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater$$Lambda$1473/0x00000008405b6c40.run(Unknown Source)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
	at __randomizedtesting.SeedInfo.seed([3ED0708F34084C2]:0)


FAILED:  org.apache.solr.search.TestThinCache.testSimple

Error Message:
java.lang.AssertionError: expected:<0> but was:<1>

Stack Trace:
java.lang.AssertionError: expected:<0> but was:<1>
	at __randomizedtesting.SeedInfo.seed([3ED0708F34084C2:3B5E23F6D4B35013]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.search.TestThinCache.testSimple(TestThinCache.java:139)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2726 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46457/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 21:59:32.140; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 21:59:32.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 21:59:33.406; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 21:59:33.444; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22643ms
ok 61 start solr with client truststore and security manager in 26176ms
not ok 62 start solr with mTLS needed in 56717ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-bBUNuv/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46457.
#
# Started Solr server on port 46457 (pid=199576). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46458.
#
# Started Solr server on port 46458 (pid=200006). Happy searching!
#
# INFO  - 2023-10-03 22:00:57.687; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 22:00:57.693; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 22:00:58.052; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@69653e16(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 22:00:58.055; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 22:00:58.056; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@576f63f6(ca,h=[localhost],a=[],w=[]) for Client@550a1967[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:00:58.087 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 10 AB 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:33.000 UTC",
#     "not  after"         : "2024-01-01 22:00:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 2B CC 62 F3 D4 6A 83   4E 1B 92 E8 25 DF 24 6E  i+.b..j.N...%.$n
#         0010: 50 F0 42 75                                        P.Bu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:00:58.091 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 F1 29 EA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:25.000 UTC",
#     "not  after"         : "2024-01-01 22:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:00:58.105 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:00:58.330 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.331 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:00:58.332 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:00:58.333 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.338 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.349 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:00:58.352 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9A 99 E5 C8 63 D4 A9 43 C1 34 DF B9 64 D0 3D 0A F4 1E F0 5F 65 F5 71 24 15 14 99 19 09 ED 58 ED",
#   "session id"          : "51 6A 09 03 07 B9 72 81 C1 CA F8 11 34 40 B6 81 2B 10 03 27 02 4E DD F3 C1 5A D5 F4 F2 48 49 8B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DD 2F FC DC 92 07 95 B4   62 38 8E 5D D3 DF 55 C0  ./......b8.]..U.
#             0010: 6C 40 F3 FC 3D 51 24 18   B6 0B AA 9E 64 BA D2 11  l@..=Q$.....d...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.471 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "79 97 5A 87 7C C7 E0 8D E6 E7 86 67 8A CC 26 71 5B C3 C5 BB E4 67 C4 67 BD 32 E7 F7 7A BE 54 FA",
#   "session id"          : "51 6A 09 03 07 B9 72 81 C1 CA F8 11 34 40 B6 81 2B 10 03 27 02 4E DD F3 C1 5A D5 F4 F2 48 49 8B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FB AD F1 81 CC B2 51 64   1A 46 11 28 E8 E7 F9 2F  ......Qd.F.(.../
#           0010: F7 65 B1 37 3A 43 57 8C   3C 1B 46 BC 36 99 97 42  .e.7:CW.<.F.6..B
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.471 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.472 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.474 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.475 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.475 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.476 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.476 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.485 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.486 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.487 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.491 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.491 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.491 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.491 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.492 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.492 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.492 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.492 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.492 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.494 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.494 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.494 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.495 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.495 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.496 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.496 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.499 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 AF 81 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:29.000 UTC",
#       "not  after"         : "2024-01-01 22:00:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A D1 9C 1D 06 06 52 88   26 8A D6 48 1D 63 1B 00  j.....R.&..H.c..
#           0010: 8E 73 C6 70                                        .s.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.499 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:00:58.539 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:00:58.540 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:00:58.540 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:00:58.540 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.581 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.584 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 93 EB C5 9B F3 CB 9A   8B D1 5F C3 7B 22 17 C2  .........._.."..
#     0010: E5 34 A0 A7 89 2E BC FE   E8 21 CF 25 B7 BB 12 C1  .4.......!.%....
#     0020: 51 D4 A4 49 CA F3 D7 71   9D 6B 93 7B 79 B4 F4 33  Q..I...q.k..y..3
#     0030: A1 C5 D1 FA CD AE F8 49   F3 39 12 EC 9E F1 88 42  .......I.9.....B
#     0040: 15 A6 41 47 67 D8 FB 2A   B9 D9 42 76 B7 76 97 19  ..AGg..*..Bv.v..
#     0050: 59 99 FD C1 72 23 72 57   41 EE CB F6 C4 67 56 71  Y...r#rWA....gVq
#     0060: EC B6 3A 7A 4B CF 8C C3   59 CA 48 2B 3D 8D 60 F2  ..:zK...Y.H+=.`.
#     0070: 6B A2 D6 BB 6E 36 6F 5B   F2 05 4C 5C 12 51 84 77  k...n6o[..L\.Q.w
#     0080: A5 05 7A 15 93 EC 9E 2F   EE 3C 0F F4 7C F5 2A 42  ..z..../.<....*B
#     0090: 4F 23 CD 7C 9F CA EC 36   F1 9B 08 D8 82 7F AF F1  O#.....6........
#     00A0: AB E4 86 1B E1 40 11 13   51 04 92 2A 5F 42 E4 5E  .....@..Q..*_B.^
#     00B0: 72 4E C0 99 28 8D 0E 2E   42 33 78 A6 7D 44 D0 7D  rN..(...B3x..D..
#     00C0: 5B AF EA 2A 4E 7E 16 D4   49 16 E2 71 02 F3 83 8B  [..*N...I..q....
#     00D0: 03 BE 97 5E BA 33 67 2B   FC 2E 21 CA 38 7F 0C A0  ...^.3g+..!.8...
#     00E0: D7 9E B8 CC 20 38 68 7E   7C 64 6D 6B FD 62 6E 0E  .... 8h..dmk.bn.
#     00F0: E5 81 60 70 15 2C 93 4E   52 EA 1D 37 B8 1C 24 6C  ..`p.,.NR..7..$l
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.586 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E7 37 DD C4 24 50 5C 12   97 9B B3 4B C5 AE 30 07  .7..$P\....K..0.
#     0010: 86 72 B6 E8 6E F0 0B 74   43 AC C4 ED AE C8 95 77  .r..n..tC......w
#     0020: 21 DF 51 F2 1E 17 8C DC   D6 BA 09 5E CA 26 D6 ED  !.Q........^.&..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.588 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:00:58.589 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.589 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:00:58.590 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.590 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:00:58.590 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:00:58.590 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.591 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.593 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 10 AB 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:33.000 UTC",
#       "not  after"         : "2024-01-01 22:00:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 2B CC 62 F3 D4 6A 83   4E 1B 92 E8 25 DF 24 6E  i+.b..j.N...%.$n
#           0010: 50 F0 42 75                                        P.Bu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 88 2B CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:27.000 UTC",
#       "not  after"         : "2024-01-01 22:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#           0010: D0 A8 DE 04                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.619 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F FC 91 7F 73 4A EB B4   D5 D8 FD 42 8B AC E8 40  /...sJ.....B...@
#     0010: 67 4A D3 0E F4 C0 97 01   13 0A B4 28 0A D2 AD C2  gJ.........(....
#     0020: 8F 1D 8F 3F 72 BB AE BD   2C D2 E1 0A A3 79 69 EA  ...?r...,....yi.
#     0030: AB 01 C3 9C BF 64 B2 86   16 94 93 8E AD 06 15 57  .....d.........W
#     0040: ED 06 74 8B C4 C1 C2 74   0E 58 6E 0A 60 02 8A C3  ..t....t.Xn.`...
#     0050: B0 88 D7 D6 52 E4 AF AA   06 83 97 A0 37 22 2C E3  ....R.......7",.
#     0060: 81 71 72 A3 32 B4 0B 72   AB BE 5C D4 C2 49 D9 93  .qr.2..r..\..I..
#     0070: 90 73 F9 B2 35 C8 DB 25   7C 6E 48 C7 F7 65 3A 2B  .s..5..%.nH..e:+
#     0080: 62 EF F3 8A FF F0 F8 ED   EC 12 82 EB 8E D0 8B 3B  b..............;
#     0090: 77 51 26 E6 FD 2C 6D 2F   90 E9 1D 1B A8 B6 4C 58  wQ&..,m/......LX
#     00A0: 7A DF 30 44 B9 A2 C2 EE   D3 0B 63 77 D0 06 1D 4F  z.0D......cw...O
#     00B0: 78 37 6C 8F F4 01 72 42   56 BD 74 4A A2 C0 82 77  x7l...rBV.tJ...w
#     00C0: C4 EF 94 53 95 48 A2 E7   0C 86 D3 F1 1E DB B6 9D  ...S.H..........
#     00D0: 99 26 25 AD 45 57 29 14   EB 7C 7C AE CC 6F 59 88  .&%.EW)......oY.
#     00E0: 91 7E C6 A6 31 DB 88 92   12 78 6C 16 BC 83 2D 8B  ....1....xl...-.
#     00F0: 34 2C E1 D5 9F 55 8F 4F   BC CD 58 38 53 6F 98 EF  4,...U.O..X8So..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.621 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 46 03 9A 57 80 83 39 91   9C A6 78 C4 B6 85 95 3E  F..W..9...x....>
#     0010: 42 6E 32 53 85 E3 EC 23   A0 AB 8F 52 12 6E F6 4B  Bn2S...#...R.n.K
#     0020: A6 AE D4 9D 93 8E F4 5E   19 44 1F 0E A8 A0 20 9C  .......^.D.... .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.621 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:00:58.668 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1A 45 35 B3 FC 54 6B A5 26 61 69 94 0B 64 3C 23 0A E0 DE 66 FB C6 D0 68 0B F8 35 F9 B3 91 BF 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 22:00:58.955 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 22:00:58.956 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 22:00:59.899; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 22:00:59.904; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 22:01:00.296; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 22:01:00.299; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 22:01:00.300; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bBUNuv/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:01:00.331 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 10 AB 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:33.000 UTC",
#     "not  after"         : "2024-01-01 22:00:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 2B CC 62 F3 D4 6A 83   4E 1B 92 E8 25 DF 24 6E  i+.b..j.N...%.$n
#         0010: 50 F0 42 75                                        P.Bu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:01:00.336 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 F1 29 EA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:25.000 UTC",
#     "not  after"         : "2024-01-01 22:00:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 22:01:00.350 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:00.582 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.582 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:00.584 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:00.584 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.590 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.602 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:00.604 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B1 91 D9 6C 42 E5 2C 03 63 93 14 25 2C A3 98 74 A9 AD 86 3A 81 ED CF 54 10 49 A6 89 5D ED BF D9",
#   "session id"          : "E7 CF C9 6C EC 48 97 E4 1D EA 29 F9 E2 2B BC 94 9C 91 90 D2 16 1D 66 1B A6 A2 9B AB 9E EC 41 7E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 26 71 BE 4F FE 5C 35   7B 1C 57 99 06 27 FA E0  D&q.O.\5..W..'..
#             0010: 17 0C AE 73 54 76 B7 26   E9 BD 92 2C C6 C4 26 66  ...sTv.&...,..&f
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.719 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 1D 43 A7 90 79 F8 A6 78 DF 6E D0 7E 36 6D E0 67 CA 5F 53 59 05 F0 0E 7E FC EE DF FB 04 CF F8",
#   "session id"          : "E7 CF C9 6C EC 48 97 E4 1D EA 29 F9 E2 2B BC 94 9C 91 90 D2 16 1D 66 1B A6 A2 9B AB 9E EC 41 7E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8C 16 E0 55 C5 03 08 0F   4B 79 CF 59 78 E3 EC 39  ...U....Ky.Yx..9
#           0010: F0 C2 77 6B 32 24 2F 05   90 D0 29 59 CB E4 1C 12  ..wk2$/...)Y....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.720 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.720 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.722 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.724 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.724 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.733 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.734 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.736 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.739 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.742 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.742 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.742 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.743 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.743 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.744 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.747 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 AF 81 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:29.000 UTC",
#       "not  after"         : "2024-01-01 22:00:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A D1 9C 1D 06 06 52 88   26 8A D6 48 1D 63 1B 00  j.....R.&..H.c..
#           0010: 8E 73 C6 70                                        .s.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.747 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:00.788 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:00.788 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:00.788 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:00.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.826 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 88 2B CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 22:00:27.000 UTC",
#     "not  after"         : "2024-01-01 22:00:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#         0010: D0 A8 DE 04                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#         0010: 63 AF 25 83                                        c.%.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.830 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 49 D5 0B E8 6B FD A7 50   72 82 C8 4D FF CF D0 EA  I...k..Pr..M....
#     0010: BD 79 D8 5C 1C F3 85 E0   D5 56 0E AB 9A 57 E4 55  .y.\.....V...W.U
#     0020: C7 D5 64 26 1D 21 BB 70   1C 5F D6 6E 07 E3 C7 82  ..d&.!.p._.n....
#     0030: 57 69 C7 24 A4 E0 06 F7   49 6F FA 0B C5 EF 36 26  Wi.$....Io....6&
#     0040: 35 5B A8 BD C7 A9 F2 3F   56 50 4B E0 11 FD 1F B5  5[.....?VPK.....
#     0050: 5D BC 66 FF BF DC 8A 8F   7E 84 4C 15 FC 66 25 73  ].f.......L..f%s
#     0060: 79 44 8D 89 90 68 3B 42   D2 BF 76 80 7C 9D 48 DD  yD...h;B..v...H.
#     0070: 4F 7A C5 54 D9 A8 13 90   83 65 BB 61 97 BE BF F8  Oz.T.....e.a....
#     0080: 0A 96 69 7B 04 CF 14 9C   79 51 EE E3 DC 9E 0E E4  ..i.....yQ......
#     0090: 8D 1A 3D 9B 4E 58 AB 2B   28 2B 29 AF 3E 25 F0 E1  ..=.NX.+(+).>%..
#     00A0: 18 E9 B2 0E 93 06 92 AE   FD 68 CB BE 48 5C A3 29  .........h..H\.)
#     00B0: 7B 78 2A 64 EB E8 FD BF   8B E0 D6 5B C8 AF 8C 2D  .x*d.......[...-
#     00C0: A6 DC 17 5A B3 53 97 1E   B3 E0 9F E3 1B A7 5D 29  ...Z.S........])
#     00D0: 73 51 26 52 89 06 DC 29   2F 3B 9A 36 72 8C 49 6D  sQ&R...)/;.6r.Im
#     00E0: A6 2A B1 83 C2 B9 8C 16   FC 97 10 37 38 6B 25 33  .*.........78k%3
#     00F0: 50 F4 32 6F 61 A9 19 2A   BE BB 8C 99 D9 B1 DD CB  P.2oa..*........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.831 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 89 D9 42 9F C6 35 8C   2A 19 7A C3 92 8D 9A 54  ...B..5.*.z....T
#     0010: F3 6A C7 82 C9 35 45 91   5E 24 62 0F BC B3 C8 85  .j...5E.^$b.....
#     0020: 47 BE 86 15 4D 66 D8 92   BC F1 45 71 B7 0C 81 A3  G...Mf....Eq....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.834 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:01:00.835 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.835 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:01:00.835 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.835 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 22:01:00.835 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 22:01:00.836 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.836 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.839 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 10 AB 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:33.000 UTC",
#       "not  after"         : "2024-01-01 22:00:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 2B CC 62 F3 D4 6A 83   4E 1B 92 E8 25 DF 24 6E  i+.b..j.N...%.$n
#           0010: 50 F0 42 75                                        P.Bu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 88 2B CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:27.000 UTC",
#       "not  after"         : "2024-01-01 22:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#           0010: D0 A8 DE 04                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.865 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7B 6D 3B 2A 42 C6 53 B2   A8 F6 F6 75 57 7C 66 58  .m;*B.S....uW.fX
#     0010: AA 40 B7 2B 89 C2 F9 87   6B 6C 8F 93 4E 7A D9 63  .@.+....kl..Nz.c
#     0020: 2A D1 39 33 55 8D 2F 91   AF 7A DD 8D B6 4E EB 45  *.93U./..z...N.E
#     0030: 9F 83 FC E9 95 45 4F 07   BB 69 A3 71 53 6B 6B 8C  .....EO..i.qSkk.
#     0040: 1A D9 0E E2 81 C1 FB 2A   C8 6B 97 B5 0F 4F A1 BE  .......*.k...O..
#     0050: 79 5C CB 1D EF EC 0D 8A   6F 01 D9 FB CB 80 23 82  y\......o.....#.
#     0060: E2 97 C2 DC 3F 67 48 8B   FB 44 E6 4B 61 AD 35 6C  ....?gH..D.Ka.5l
#     0070: 88 AA 43 A2 9F A1 FB A8   F4 A7 06 0B 98 D3 C6 13  ..C.............
#     0080: 29 E7 5A DA 33 14 3D 3D   88 D0 5F 80 BB DB BA FA  ).Z.3.==.._.....
#     0090: F6 C5 74 01 F7 53 46 80   CC B8 AE A7 CD 4B 5A B0  ..t..SF......KZ.
#     00A0: A7 2C 18 F8 90 81 1F 18   9D 7E DA BE 75 3F FA 9F  .,..........u?..
#     00B0: A7 BA FA 7F 19 4D 22 1A   9A 11 50 51 51 E8 2D 4D  .....M"...PQQ.-M
#     00C0: 15 86 78 24 66 7A C5 17   44 9D D6 9F C6 61 1F 75  ..x$fz..D....a.u
#     00D0: A9 31 DD C1 7A CE 63 53   09 31 F2 E6 E9 88 AC DC  .1..z.cS.1......
#     00E0: BD B2 C5 AF 9F 00 9C DA   D1 7E C3 25 7B FC 23 80  ...........%..#.
#     00F0: 71 64 CE CB 44 46 CB AC   7B D6 D5 25 84 E8 9A 5D  qd..DF.....%...]
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.866 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 05 F0 AF 1C 6D 69 24 8D   BB E0 04 62 D9 A0 E3 23  ....mi$....b...#
#     0010: 5D 84 30 AF B4 D6 09 64   FD A1 69 C5 69 4B 4F 78  ].0....d..i.iKOx
#     0020: 64 2A C9 0C 05 C1 8E 4B   24 58 02 19 DE F2 E4 09  d*.....K$X......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.867 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 22:01:00.915 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DC 85 7A 51 79 F3 A1 D3 11 B2 24 32 6A 40 6B D2 AE 9C 8F AD E7 A5 AE 6B 92 0B 50 E6 C4 4B 0B 8B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 22:01:01.170 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 22:01:01.170 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 22:01:12.266; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 22:01:12.612 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F1 29 EA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:25.000 UTC",
#       "not  after"         : "2024-01-01 22:00:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#           0010: D0 A8 DE 04                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 88 2B CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 22:00:27.000 UTC",
#       "not  after"         : "2024-01-01 22:00:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 45 46 00 85 1B 7A 83   30 95 D1 81 7E 51 1E A9  .EF...z.0....Q..
#           0010: D0 A8 DE 04                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 2B 15 9F 1F 65 09 EE   2D D2 28 27 5D 7A 49 5F  .+...e..-.(']zI_
#           0010: 63 AF 25 83                                        c.%.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 22:01:12.628 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:12.732 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:12.736 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:12.736 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:01:12.736 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:12.862 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.862 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:12.864 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 22:01:12.864 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.869 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.880 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 22:01:12.883 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F1 61 88 E3 03 4F A7 34 33 E4 17 B7 02 56 65 96 1C 66 D9 67 FA 44 08 53 AC 7A 64 75 43 D0 4F 84",
#     "session id"          : "40 BB 12 7C 32 AD A2 18 9B 1D 19 59 47 04 DB 7E 10 89 4A 66 39 62 22 C4 43 E9 B0 70 46 C6 CB FE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)"

[...truncated too long message...]

l.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:02:31.859 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 22:02:31.859 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46458/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28134ms
ok 65 stop command for single port in 31072ms
ok 66 status detects locally running solr in 14739ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2236ms
ok 69 copying files around in 6683ms
ok 70 upconfig in 2657ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
ok 73 Cleanup in 1229ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=3ED0708F34084C2 -Ptests.file.encoding=UTF-8

  - org.apache.solr.search.TestThinCache.testSimple (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestThinCache.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestThinCache.testSimple" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=3ED0708F34084C2 -Ptests.file.encoding=UTF-8


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 57s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m25.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5603 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5603/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39717/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 18:58:33.380; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 18:58:33.385; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 18:58:34.302; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 18:58:34.344; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22655ms
ok 61 start solr with client truststore and security manager in 25554ms
not ok 62 start solr with mTLS needed in 58167ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-nFz4Pe/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39717.
#
# Started Solr server on port 39717 (pid=200403). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.5.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39718.
#
# Started Solr server on port 39718 (pid=200833). Happy searching!
#
# INFO  - 2023-10-03 18:59:57.573; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 18:59:57.578; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 18:59:57.937; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 18:59:57.940; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604f2bd2(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 18:59:57.940; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1d3ac898(ca,h=[localhost],a=[],w=[]) for Client@1cdc4c27[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 18:59:57.972 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 C2 1F 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:33.000 UTC",
#     "not  after"         : "2024-01-01 18:59:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 D5 66 52 78 58 7D 4E   31 39 1C A6 EA 02 16 28  ..fRxX.N19.....(
#         0010: BA 03 A5 60                                        ...`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 18:59:57.976 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 1C F0 BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:25.000 UTC",
#     "not  after"         : "2024-01-01 18:59:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 18:59:58.030 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 18:59:58.220 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.220 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 18:59:58.222 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 18:59:58.222 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.239 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.239 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 18:59:58.242 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A7 FC A9 9D 69 99 D2 D8 08 30 93 FC 87 3C 33 12 FD DB 02 D6 2A E1 EA 23 AB D2 6E DB 95 F6 13 31",
#   "session id"          : "6B BB C8 BB F2 15 D5 BF 41 C6 51 9C F3 16 F9 E3 22 66 E2 4F 1D 48 EE 72 AF 2C 93 95 32 7B A6 35",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C9 5E B8 60 5B 33 20 05   D4 B1 EE B6 A9 14 6E 9D  .^.`[3 .......n.
#             0010: ED 74 88 C6 DA 64 52 78   A8 C7 6C A5 DA F7 9C 58  .t...dRx..l....X
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.354 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7C 6F 8F A5 A5 F9 DA A5 56 FB AD CE 1E C0 95 1C FE 61 C6 65 23 2A FA 7F B1 59 FA 13 1E FF F9 4B",
#   "session id"          : "6B BB C8 BB F2 15 D5 BF 41 C6 51 9C F3 16 F9 E3 22 66 E2 4F 1D 48 EE 72 AF 2C 93 95 32 7B A6 35",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 16 28 2D C2 09 B0 5E DA   02 2E 5D 06 67 E8 48 5F  .(-...^...].g.H_
#           0010: 67 F9 1D 88 9B DF 80 A5   14 0A 25 B3 DA B9 50 5F  g.........%...P_
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.355 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.355 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.356 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.356 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.356 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.357 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.357 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.357 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.357 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.357 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.359 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.359 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.359 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.360 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.361 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.361 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.361 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.368 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.370 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.371 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.374 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.374 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.375 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.377 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.377 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.378 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.378 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.379 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.379 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.382 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 65 D5 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:29.000 UTC",
#       "not  after"         : "2024-01-01 18:59:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 8E 10 F1 45 50 65 F6   65 D9 41 DA 83 27 E1 EF  ....EPe.e.A..'..
#           0010: 49 4A 8E 79                                        IJ.y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 18:59:58.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 18:59:58.436 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 18:59:58.436 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 18:59:58.436 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.460 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.463 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8E 23 BA 25 FF 03 A1 FF   65 3C 4B 56 DA 6F 94 C2  .#.%....e<KV.o..
#     0010: 2E 91 C4 E1 70 E8 E8 97   6D DB 5E 67 FA 01 E2 D5  ....p...m.^g....
#     0020: C2 55 F9 9E 81 B3 6B 3F   06 9F 22 25 9D 54 1F B8  .U....k?.."%.T..
#     0030: 57 E4 AB CB F7 FF 67 B5   64 FF F7 A0 BC 87 E1 A4  W.....g.d.......
#     0040: AD FD 96 BD E5 32 EC E1   DC 4A 5D EE 6B B9 D7 F6  .....2...J].k...
#     0050: C7 7B 30 DB B9 62 C1 9F   CD 45 FD BA 13 F4 00 B5  ..0..b...E......
#     0060: 40 F2 C0 2B A5 73 3C B4   06 09 65 74 E8 44 2A CD  @..+.s<...et.D*.
#     0070: D5 88 7E 12 19 96 C8 1C   7A 61 63 BF 25 1F FF 8B  ........zac.%...
#     0080: 60 80 51 19 F2 A6 B6 95   DB AF 51 BA 96 A7 1F E8  `.Q.......Q.....
#     0090: 5B D5 35 07 08 C1 82 28   E4 14 2A 7B 7B 82 5E 3D  [.5....(..*...^=
#     00A0: DF 1E 84 C2 E4 5A 2B 20   50 54 A2 88 A5 2C B5 DD  .....Z+ PT...,..
#     00B0: 0A 7C 00 51 55 53 92 98   8E 6D FC 06 3F EA E8 31  ...QUS...m..?..1
#     00C0: 16 EA 74 A8 02 6A 49 8F   6D FC 22 1E A0 AB DC 89  ..t..jI.m.".....
#     00D0: F0 4E 06 C1 90 95 D1 FD   86 C6 38 B9 86 A7 63 2D  .N........8...c-
#     00E0: 3D 43 93 22 BB F2 EA EF   CD 4F B4 92 44 E7 7E 2A  =C.".....O..D..*
#     00F0: 70 53 D3 A0 6E C6 90 C3   E0 85 45 70 BC 8C 21 01  pS..n.....Ep..!.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.465 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E9 00 6F 5A 5B 6C 40 4B   1D B5 96 4F C3 28 9E 32  ..oZ[l@K...O.(.2
#     0010: E5 9B 6A A3 35 D8 F6 8E   3D 5E 05 54 29 9B 18 51  ..j.5...=^.T)..Q
#     0020: F5 BF 15 09 C0 7A A1 E5   6D E2 F5 A0 73 BF 72 29  .....z..m...s.r)
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.467 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 18:59:58.468 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.468 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 18:59:58.468 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.468 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 18:59:58.468 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 18:59:58.469 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.469 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.471 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 C2 1F 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:33.000 UTC",
#       "not  after"         : "2024-01-01 18:59:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 D5 66 52 78 58 7D 4E   31 39 1C A6 EA 02 16 28  ..fRxX.N19.....(
#           0010: BA 03 A5 60                                        ...`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 6A BE 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:27.000 UTC",
#       "not  after"         : "2024-01-01 18:59:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#           0010: 0B 71 0A 4D                                        .q.M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.497 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D DD 81 78 26 E1 C1 A5   05 20 76 03 95 9E 4D 79  ...x&.... v...My
#     0010: 6B F9 74 9C DB D2 A3 C3   F8 1E 88 7D B0 DE A5 0B  k.t.............
#     0020: A8 BC CB 18 76 AA 61 7A   3B BE 00 16 68 4C AF E9  ....v.az;...hL..
#     0030: 5E 4B 81 9D DC 37 88 E1   E7 47 BB 85 56 BF 77 B8  ^K...7...G..V.w.
#     0040: BB C8 A0 D5 79 66 C6 5C   8C E3 59 D2 D3 0B 68 F3  ....yf.\..Y...h.
#     0050: 5E 07 92 7A 4F 0C CB 3C   84 AC 98 5C 9F 5E 6B 20  ^..zO..<...\.^k
#     0060: 4E 5F 7C 37 6B 9C 45 B4   0B 28 66 EA 59 BA 47 CD  N_.7k.E..(f.Y.G.
#     0070: 35 2F B6 36 E6 59 AF 17   2F DE F4 6B 17 8F D3 AF  5/.6.Y../..k....
#     0080: 29 2D 6A 08 C7 17 66 3D   28 23 31 F7 74 FF C2 03  )-j...f=(#1.t...
#     0090: 34 7E DC E0 EA 44 D1 96   1B DF B5 BA 3F BB 7F 68  4....D......?..h
#     00A0: 1F 31 E0 D9 42 F5 BA 21   E7 74 57 51 6A 96 D8 CE  .1..B..!.tWQj...
#     00B0: C8 D9 66 DA D3 A5 0C A6   7E 9A F8 0E 05 C8 F0 BA  ..f.............
#     00C0: 76 79 7D B1 B5 19 27 DA   08 3B EC 46 7E 23 D9 7E  vy....'..;.F.#..
#     00D0: 13 97 8E E7 ED 5F D8 B5   1C 92 8F 15 B0 15 D1 18  ....._..........
#     00E0: 6F B0 4F AF 72 42 30 B1   CC 65 69 83 0C 0C 03 E9  o.O.rB0..ei.....
#     00F0: F2 33 06 3F 61 35 92 5E   36 02 61 D0 03 46 CE D9  .3.?a5.^6.a..F..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.498 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8D 5E 65 18 20 5E 52 E0   41 5D DE 23 7A A1 0B 82  .^e. ^R.A].#z...
#     0010: 38 BA AF 67 D9 67 75 26   4E 34 5E A1 33 55 E4 19  8..g.gu&N4^.3U..
#     0020: F7 A4 0B EB D2 E0 1B 87   D9 CF 97 A5 70 17 77 EA  ............p.w.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.499 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 18:59:58.544 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "27 58 3D 9F DF C7 56 CE B3 FF FF 8F B1 77 8A EC 21 29 45 46 36 86 2E ED E7 C0 13 0A 69 62 A3 B3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 18:59:58.815 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 18:59:58.816 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 18:59:59.752; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 18:59:59.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 19:00:00.115; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@37091312(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@ff684e1[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 19:00:00.118; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@ff684e1[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 19:00:00.119; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1cdc4c27(ca,h=[localhost],a=[],w=[]) for Client@ff684e1[provider=null,keyStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nFz4Pe/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 19:00:00.150 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 C2 1F 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:33.000 UTC",
#     "not  after"         : "2024-01-01 18:59:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 D5 66 52 78 58 7D 4E   31 39 1C A6 EA 02 16 28  ..fRxX.N19.....(
#         0010: BA 03 A5 60                                        ...`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 19:00:00.154 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "03 1C F0 BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:25.000 UTC",
#     "not  after"         : "2024-01-01 18:59:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 19:00:00.169 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:00.390 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:00.392 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:00.392 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.397 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.409 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:00.412 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "91 1E A1 DC C7 15 75 CA 04 C4 E1 E6 2F 8B 5F E9 F4 E5 46 D8 14 3F 14 9B 34 BA A6 38 F4 1D 8E 23",
#   "session id"          : "FF D7 0A 45 6A 74 72 86 66 F8 60 21 5D 61 5D 9A C2 55 FA 39 D7 14 DB 43 55 A3 FA 57 E7 8D E0 3F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 33 23 1B 75 FD 83 B3   32 41 DB 69 AE 99 34 F4  .3#.u...2A.i..4.
#             0010: BB 15 E6 86 63 95 F2 22   1E AA 25 48 14 71 DC 5F  ....c.."..%H.q._
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.531 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "00 A7 AD 14 31 2F 86 74 D7 F4 A6 43 D1 24 0F 72 23 1D 6B 66 30 9A 0E 40 70 C1 14 39 D9 7F 16 C5",
#   "session id"          : "FF D7 0A 45 6A 74 72 86 66 F8 60 21 5D 61 5D 9A C2 55 FA 39 D7 14 DB 43 55 A3 FA 57 E7 8D E0 3F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB 80 3A CD 76 81 A7 F2   AF 7F 90 2F 3D A1 F5 E4  ..:.v....../=...
#           0010: 2E AD 6F E7 A0 80 6F 6C   4D E7 91 B6 A4 E0 C3 1A  ..o...olM.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.531 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.531 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.532 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.534 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.535 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.544 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.547 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.550 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.551 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.552 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.552 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.553 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.553 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.553 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.554 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.554 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.555 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.558 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 65 D5 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:29.000 UTC",
#       "not  after"         : "2024-01-01 18:59:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 8E 10 F1 45 50 65 F6   65 D9 41 DA 83 27 E1 EF  ....EPe.e.A..'..
#           0010: 49 4A 8E 79                                        IJ.y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:00.612 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:00.613 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:00.613 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:00.613 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.643 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 6A BE 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 18:59:27.000 UTC",
#     "not  after"         : "2024-01-01 18:59:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#         0010: 0B 71 0A 4D                                        .q.M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#         0010: AC 1A 99 1A                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.647 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 89 B6 0B BF FD CA 7A   8F E3 09 98 2F 71 8C 15  .......z..../q..
#     0010: DE 66 69 F6 AA 0A AF 85   18 D0 D3 21 71 52 6A 56  .fi........!qRjV
#     0020: AD 5F 62 B5 11 34 D5 F0   7A F2 6D BF 06 3D BF 65  ._b..4..z.m..=.e
#     0030: 40 F4 D0 11 CD 03 19 8D   74 8C 99 BD 27 68 C6 22  @.......t...'h."
#     0040: 18 75 5E 8A 3A C5 1E 61   C8 39 8A DB A3 08 BE FE  .u^.:..a.9......
#     0050: 97 26 BC 42 AB 4D 81 2E   10 0A 28 30 FC 7A C6 6C  .&.B.M....(0.z.l
#     0060: 41 CA 40 52 9C DB 8C CC   C1 91 24 0B A6 58 D4 8A  A.@R......$..X..
#     0070: 45 F9 BC 92 8A 11 BA 5C   9F D9 37 6A 05 9B F4 58  E......\..7j...X
#     0080: 42 7B FA D9 67 34 EE 5A   6E 71 D1 0D CE 46 04 0C  B...g4.Znq...F..
#     0090: 4D 58 82 90 39 8F 69 91   58 B4 CB 8B C5 4F 6D 7E  MX..9.i.X....Om.
#     00A0: C6 1F 0E C8 2D 8E 20 CE   3C 02 86 7F 1E AB 56 58  ....-. .<.....VX
#     00B0: C8 41 AB DA 4D 72 DB 8E   29 69 99 EC B6 52 6D 38  .A..Mr..)i...Rm8
#     00C0: 43 0A AF 9A 4D CB FE A4   31 43 B0 C6 61 CA FD E6  C...M...1C..a...
#     00D0: CD AD ED FF D2 91 23 E2   DC 2B CC A4 9F 20 66 87  ......#..+... f.
#     00E0: 16 8D A9 B4 E9 75 15 C9   3B 5A 39 69 AB 55 03 E3  .....u..;Z9i.U..
#     00F0: 7A 93 6F DB 04 22 0D 6A   6F 2A 1F A8 C5 88 CE A2  z.o..".jo*......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.649 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 89 20 09 2C 84 87 D3   10 41 10 F4 3A 71 98 6E  .. .,....A..:q.n
#     0010: 0A 4E F8 81 83 B7 44 4F   77 5E BF 47 9C 7A 5C 8F  .N....DOw^.G.z\.
#     0020: 53 B9 ED C9 F7 16 1D C9   9F 0E 9F 39 23 25 CA 56  S..........9#%.V
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.651 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 19:00:00.653 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.653 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 19:00:00.653 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.653 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 19:00:00.653 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:00.654 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.654 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.657 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 C2 1F 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:33.000 UTC",
#       "not  after"         : "2024-01-01 18:59:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 D5 66 52 78 58 7D 4E   31 39 1C A6 EA 02 16 28  ..fRxX.N19.....(
#           0010: BA 03 A5 60                                        ...`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 6A BE 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:27.000 UTC",
#       "not  after"         : "2024-01-01 18:59:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#           0010: 0B 71 0A 4D                                        .q.M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.682 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 94 6D D9 AF 51 BE 55 C2   37 36 CB 95 B5 52 A5 74  .m..Q.U.76...R.t
#     0010: 75 29 93 FF 06 7E 67 CF   FB 01 A3 BD 77 73 8C 8A  u)....g.....ws..
#     0020: 0C F5 F2 86 33 D2 09 67   C7 33 E6 97 CB F9 24 27  ....3..g.3....$'
#     0030: 9A A9 B5 06 18 9B 1B 4B   17 9E FA 75 2D 22 21 B1  .......K...u-"!.
#     0040: CB CD 6F 6C FD 52 CF E3   B0 E4 8D 74 3C EB 22 3B  ..ol.R.....t<.";
#     0050: DD E4 49 D2 B6 1B 87 C0   74 97 AB 98 6A 71 0C 69  ..I.....t...jq.i
#     0060: AE 10 9A 34 62 40 F4 74   96 CD 3F 61 CA C4 3A 8D  ...4b@.t..?a..:.
#     0070: 59 F3 CC 42 FF BD BB 0C   A6 B9 2F 42 FC 70 83 52  Y..B....../B.p.R
#     0080: 0C C7 A2 0C 86 B4 17 9E   97 1A 64 F1 0D 9E F3 40  ..........d....@
#     0090: 47 99 08 73 CD 8B E9 6D   73 19 CD 96 DE 4C 13 40  G..s...ms....L.@
#     00A0: 15 03 6E 76 7A 56 75 2A   47 70 FB F6 3B 13 6D 9B  ..nvzVu*Gp..;.m.
#     00B0: A5 DF 07 61 5C 76 92 C8   2D A5 5D 42 E6 20 4B 47  ...a\v..-.]B. KG
#     00C0: 38 97 F5 72 FC F7 89 78   AF 4D 69 5D AE 8F 8F 35  8..r...x.Mi]...5
#     00D0: 0D 93 6D 5C 56 F3 EF 60   D9 F5 BC F9 82 30 1F C8  ..m\V..`.....0..
#     00E0: C8 0B D0 D5 42 34 A5 82   D7 C3 55 75 1C B8 C5 FC  ....B4....Uu....
#     00F0: B3 38 2A E8 53 32 79 BB   4F E4 4F 37 09 72 81 65  .8*.S2y.O.O7.r.e
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.683 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 B6 DA 2E BF E7 66 C5   25 19 9E 56 C3 F4 21 08  ......f.%..V..!.
#     0010: 4B 4B 75 B1 71 22 AB 26   89 EA 63 8E D8 CC F5 EC  KKu.q".&..c.....
#     0020: B9 20 E4 89 3E BA DB 92   E9 F8 AD F9 F1 05 C8 14  . ..>...........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.683 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:00.731 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EB D0 C0 70 C6 9B C3 8C A5 CD B8 19 E7 79 93 88 75 C0 98 B9 EC 35 23 A8 CC C5 B7 9A 89 28 C1 C5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 19:00:01.061 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 19:00:01.062 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 19:00:13.157; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 19:00:13.496 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 1C F0 BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:25.000 UTC",
#       "not  after"         : "2024-01-01 18:59:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#           0010: 0B 71 0A 4D                                        .q.M
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 6A BE 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 18:59:27.000 UTC",
#       "not  after"         : "2024-01-01 18:59:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 E2 05 C0 EF 99 4A FE   6E 92 7C 27 03 F3 6E 21  Q.....J.n..'..n!
#           0010: 0B 71 0A 4D                                        .q.M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 2E 9A A8 2F 1D ED 29   B7 18 AA 3C 4A BF 9D C0  ..../..)...<J...
#           0010: AC 1A 99 1A                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 19:00:13.513 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:13.885 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:13.886 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:13.886 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:00:13.886 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:14.039 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.039 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:14.041 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 19:00:14.042 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.059 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.060 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 19:00:14.062 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "05 DD D0 72 9B BD 20 98 BC 23 F2 3D 7E 66 0A DC 91 2B 0D 80 6A E5 9E B6 09 6D A7 7C 8F 06 19 BB",
#     "session id"          : "A6 51 6E BC 1A BD 47 84 BD BE AD 55 E4 28 27 33 AA F5 C6 61 57 54 9B 88 67 40 68 B1 41 1E C6 C5",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 41 C9 29 EA C3 75 00 44   EA 07 AC 3C 5E 37 80 B3  A.)..u.D...<^7..
#               0010: DF 2D 82 2E 8D 99 80 CE   DF 97 68 C5 A3 8C 87 34  .-........h....4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.083 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "66 96 7C F6 74 F5 D7 78 76 E6 51 5C DE AB 39 50 FD 7A AD A8 8D 5A F3 47 50 74 B4 AD 64 EA AF 6C",
#     "session id"          : "A6 51 6E BC 1A BD 47 84 BD BE AD 55 E4 28 27 33 AA F5 C6 61 57 54 9B 88 67 40 68 B1 41 1E C6 C5",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A 54 49 CF 8E 8A BF 2E   D5 43 6F D7 E7 8D 8C 69  ZTI......Co....i
#             0010: 2D AB EF 70 64 4D 8E E6   95 64 7C 63 17 12 45 20  -..pdM...d.c..E
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.083 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.084 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.084 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.085 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.086 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.088 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.088 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:14.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:14.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.097 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.099 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.100 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.104 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.104 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.104 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.104 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.105 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.105 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.105 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:14.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:00:14.105 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 19:00:14.107 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sche

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 19:01:34.066 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:01:34.109 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:01:34.109 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:01:34.109 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 19:01:34.109 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39718/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28141ms
ok 65 stop command for single port in 31366ms
ok 66 status detects locally running solr in 14680ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2185ms
ok 69 copying files around in 6688ms
ok 70 upconfig in 2613ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 13s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m42s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5602 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5602/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37825/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 14:34:54.508; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 14:34:54.513; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 14:34:55.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 14:34:55.752; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22534ms
ok 61 start solr with client truststore and security manager in 25568ms
not ok 62 start solr with mTLS needed in 56582ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wU7yPZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37825.
#
# Started Solr server on port 37825 (pid=198027). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37826.
#
# Started Solr server on port 37826 (pid=198453). Happy searching!
#
# INFO  - 2023-10-03 14:36:18.776; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 14:36:18.781; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 14:36:19.155; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 14:36:19.158; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 14:36:19.159; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:19.192 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 72 18 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:55.000 UTC",
#     "not  after"         : "2024-01-01 14:35:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 AC 9F ED 28 3C 1A B7   7B 1E 5C 5E BA 22 08 8C  8...(<....\^."..
#         0010: D4 44 34 18                                        .D4.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:19.197 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 9E C3 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:46.000 UTC",
#     "not  after"         : "2024-01-01 14:35:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:19.213 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:19.555 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:19.555 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:19.556 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:19.556 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:19.701 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.701 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:19.703 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:19.703 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.709 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.720 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:19.723 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1F F3 DD 19 2A 97 71 A9 95 5B DF E3 3C 33 D7 3A ED 70 73 CE 29 E9 62 92 48 97 5B AE DA 27 01 19",
#   "session id"          : "6F 9B 68 48 E0 B5 C7 93 F0 C2 7F 8D 43 5B 8D AE 8E B0 58 D9 93 60 B3 58 F1 67 4E 95 C3 C5 7A 0C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EF 23 73 00 E8 75 3F 3F   92 A9 A7 A2 64 09 8E 42  .#s..u??....d..B
#             0010: 5A A5 00 6A A2 DE 13 59   D2 DC 27 B3 0D 0D 0D 08  Z..j...Y..'.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.830 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AC A1 35 08 54 44 E5 4E 0E 85 0A 2A AD 81 1B 98 77 35 4D 72 35 85 78 FF 42 61 52 B5 DD 75 A0 1F",
#   "session id"          : "6F 9B 68 48 E0 B5 C7 93 F0 C2 7F 8D 43 5B 8D AE 8E B0 58 D9 93 60 B3 58 F1 67 4E 95 C3 C5 7A 0C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 31 F9 18 87 8E 2F AB 09   C8 A3 B5 57 33 43 59 A5  1..../.....W3CY.
#           0010: 50 39 F1 2A 80 C6 23 93   FD E4 E7 16 C7 48 B4 0F  P9.*..#......H..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.830 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.830 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.831 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.831 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.832 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.834 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.834 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.836 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.843 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.844 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.845 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.849 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.849 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.849 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.850 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.852 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.852 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.852 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.853 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.854 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.855 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.855 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.858 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E 8D 44 BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:51.000 UTC",
#       "not  after"         : "2024-01-01 14:35:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 22 E3 21 0D B5 A7 78   2E D2 D7 39 1F 08 1A 02  ;".!...x...9....
#           0010: 70 93 CA 39                                        p..9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.859 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.941 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.945 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AB E0 DD B5 C1 FE 21 E4   31 7D 67 E6 F4 94 25 67  ......!.1.g...%g
#     0010: CC 01 AE 4B AC A7 64 95   92 20 F8 48 83 C2 70 98  ...K..d.. .H..p.
#     0020: 8E 49 D8 3C 0B E4 21 49   22 A9 20 24 BD CD C5 6F  .I.<..!I". $...o
#     0030: C8 BF 6E 27 D5 FA 00 34   94 1A B8 BE 90 EB 5E 77  ..n'...4......^w
#     0040: 6D FA C4 CC 8A BF A4 1B   B7 84 7E 30 A9 F4 02 4A  m..........0...J
#     0050: C0 AA 97 E1 7E EB CC A9   71 02 F3 D1 4F A8 D0 A9  ........q...O...
#     0060: 98 46 D1 55 EA C6 7F 2B   00 4B 06 5A 21 BD 8D 1E  .F.U...+.K.Z!...
#     0070: C6 F8 D5 D0 86 1D 1B 48   FB B5 64 B4 26 5D 47 F5  .......H..d.&]G.
#     0080: 00 3C 69 94 FF 6A EB 7B   E3 76 13 78 72 C0 90 CE  .<i..j...v.xr...
#     0090: 23 08 4C E3 63 68 61 CC   5A 6D FE EF 8B 20 7D EB  #.L.cha.Zm... ..
#     00A0: 2C 99 14 FC 30 CA AD 42   5B 7C 86 54 F1 EE 67 D1  ,...0..B[..T..g.
#     00B0: 5A C0 AE 1D 38 9B 48 03   72 3A 5C E9 8E CA EF 31  Z...8.H.r:\....1
#     00C0: 9B 43 59 3E 0F 31 63 1D   14 1A C3 BF B3 CC 78 C2  .CY>.1c.......x.
#     00D0: 43 FE BC 57 8D 09 B5 13   60 CC A2 18 4D 59 1C 68  C..W....`...MY.h
#     00E0: CE 10 24 8D 14 D5 91 85   48 03 1D 38 52 16 AA 2B  ..$.....H..8R..+
#     00F0: C4 C3 5E 80 11 E3 F3 6D   EA AA 1B 1C 9E 9D 03 80  ..^....m........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.947 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 54 4D 9D EE C8 7C 5D 6C   C1 8F 05 44 9E AC 28 11  TM....]l...D..(.
#     0010: 52 7D 6A 28 C6 2D 79 5B   6F 9B A2 8F CE 8B 66 23  R.j(.-y[o.....f#
#     0020: 87 9D 48 62 08 52 E6 57   16 04 E4 11 F4 DD 06 F5  ..Hb.R.W........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.949 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:19.950 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.950 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:19.950 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.951 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:19.951 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:19.951 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.952 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.954 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E 72 18 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:55.000 UTC",
#       "not  after"         : "2024-01-01 14:35:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 AC 9F ED 28 3C 1A B7   7B 1E 5C 5E BA 22 08 8C  8...(<....\^."..
#           0010: D4 44 34 18                                        .D4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E FD CD F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:48.000 UTC",
#       "not  after"         : "2024-01-01 14:35:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#           0010: 2B 8E 00 F1                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.980 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 05 C6 39 82 3B DC BD   26 99 79 1C 53 C2 64 AF  f..9.;..&.y.S.d.
#     0010: 5C 5A B0 40 1A DD 98 EA   76 70 F0 8C BC 49 93 1A  \Z.@....vp...I..
#     0020: 31 89 16 87 C1 64 79 2E   60 2F C3 0C 96 50 9A D4  1....dy.`/...P..
#     0030: 54 18 A2 AE A0 B7 F9 33   3A 57 D1 69 16 94 21 C6  T......3:W.i..!.
#     0040: 30 E2 99 E0 DB 3B 5B B7   2F 61 65 BC 07 2B ED 50  0....;[./ae..+.P
#     0050: F9 0C BA E8 BF E1 CF 4B   EA DD 56 D0 E5 8D 79 1E  .......K..V...y.
#     0060: DA 6D 9C A7 CD B7 A9 2E   20 1E F4 91 BC 4A BB DF  .m...... ....J..
#     0070: A9 10 A7 92 A6 C8 23 C4   41 0C 41 6E 78 C4 F5 22  ......#.A.Anx.."
#     0080: E4 68 C2 04 A2 F3 8E BF   2F 2A 5A 4E 3B 00 11 E1  .h....../*ZN;...
#     0090: F7 0F A9 1D FE 6C 4E BC   C3 3F 0B FD 7D 27 D8 AB  .....lN..?...'..
#     00A0: E1 AE 07 BD 06 1C 1F D7   0E DC 09 B4 52 CD 14 75  ............R..u
#     00B0: A2 49 CC FC 84 A8 2D FB   24 DA D9 C2 AC 71 43 46  .I....-.$....qCF
#     00C0: 38 73 14 69 4E 0F 38 AE   6D 3A 91 BF D1 32 6B C1  8s.iN.8.m:...2k.
#     00D0: 08 47 88 D8 C2 7B C5 F9   E1 94 64 CF 04 1A 02 B4  .G........d.....
#     00E0: 72 9A 3B AF 4F 28 FF 44   E3 A1 DF C2 77 01 9E 87  r.;.O(.D....w...
#     00F0: FB FE 0A FC F2 76 23 9A   A9 47 F1 4E 18 3A 29 E9  .....v#..G.N.:).
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.981 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 32 DF 6E 8A 86 AE 40 35   FA E3 F8 4A 1B E9 F7 01  2.n...@5...J....
#     0010: 25 C5 F8 BE C5 52 87 41   4D 04 69 EE FE FB 83 02  %....R.AM.i.....
#     0020: F8 78 73 10 41 7D 22 F7   A4 BD D6 93 56 84 3B C9  .xs.A.".....V.;.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:19.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:20.037 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CB 7D 39 FF E0 85 7D A9 81 59 23 62 A1 FB CC 81 46 5A 6A 47 54 78 92 59 90 40 48 21 40 7D E1 38",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 14:36:20.314 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 14:36:20.314 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 14:36:21.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 14:36:21.242; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 14:36:21.594; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 14:36:21.597; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 14:36:21.597; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wU7yPZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:21.666 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0E 72 18 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:55.000 UTC",
#     "not  after"         : "2024-01-01 14:35:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 AC 9F ED 28 3C 1A B7   7B 1E 5C 5E BA 22 08 8C  8...(<....\^."..
#         0010: D4 44 34 18                                        .D4.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:21.671 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 9E C3 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:46.000 UTC",
#     "not  after"         : "2024-01-01 14:35:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:21.684 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:21.875 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.876 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:21.878 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:21.878 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.883 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.895 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.895 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.895 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:21.897 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "60 09 0C 5D BD 5D 1C 70 22 78 D2 05 30 A9 52 DA 71 C0 64 B5 6F 08 10 8F CD 93 81 72 F5 66 27 11",
#   "session id"          : "A1 5B CB E2 4C 1C D1 2E 3A AD B1 FA 29 BD 73 E0 0E 31 74 B2 73 E8 41 B4 4E A4 2D 4F C6 8E 5E 5E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 2F 69 2F 91 BE 2D A0   BD CC E3 77 9A 9E 2C 81  ./i/..-....w..,.
#             0010: 34 9F 4F 76 36 F8 89 A2   46 C6 84 D2 36 3B 2E 65  4.Ov6...F...6;.e
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.997 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "79 C9 66 D1 43 20 FF CE 03 37 1A A0 E6 DC E1 95 F7 86 E9 0C 2F 88 8C 75 7D AD 77 80 37 2D 9D B7",
#   "session id"          : "A1 5B CB E2 4C 1C D1 2E 3A AD B1 FA 29 BD 73 E0 0E 31 74 B2 73 E8 41 B4 4E A4 2D 4F C6 8E 5E 5E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 2D F6 2D AC 9C 53 B2   79 7F AF AA 20 34 D7 E4  .-.-..S.y... 4..
#           0010: 4D F9 AC 11 3C 8F 01 D3   88 2D BB 5B 3B B1 78 13  M...<....-.[;.x.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.998 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.998 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:21.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.000 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.000 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.002 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.002 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.003 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.003 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.003 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.003 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.004 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.012 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.013 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.014 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.018 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.018 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.018 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.018 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.018 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.019 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.020 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.021 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.021 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.021 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.022 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.023 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.023 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.026 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E 8D 44 BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:51.000 UTC",
#       "not  after"         : "2024-01-01 14:35:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 22 E3 21 0D B5 A7 78   2E D2 D7 39 1F 08 1A 02  ;".!...x...9....
#           0010: 70 93 CA 39                                        p..9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.026 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:22.069 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:22.070 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:22.071 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:22.071 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.114 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E FD CD F7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 14:35:48.000 UTC",
#     "not  after"         : "2024-01-01 14:35:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#         0010: 2B 8E 00 F1                                        +...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#         0010: 54 09 84 81                                        T...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.118 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 6B C3 47 81 9F 10 37   20 7C E3 51 A4 9F D1 B8  _k.G...7 ..Q....
#     0010: 8A 95 8B 4C 89 3B 94 10   FD 93 97 51 81 12 7F 93  ...L.;.....Q....
#     0020: 0F DE C4 53 EE DE FC 8F   09 57 BC 36 81 F2 F4 99  ...S.....W.6....
#     0030: 93 5B 9F F3 AC F4 FC 39   40 7A 3D 11 50 D2 B5 B5  .[.....9@z=.P...
#     0040: D2 5F 58 C1 E6 22 55 E5   8A F7 B2 ED 52 61 10 4B  ._X.."U.....Ra.K
#     0050: 68 8D 50 69 B4 32 E4 46   E7 2C B0 02 37 2D B5 97  h.Pi.2.F.,..7-..
#     0060: E8 2B 20 03 93 B8 6A FC   DC 12 62 58 B2 D0 4B B9  .+ ...j...bX..K.
#     0070: E7 6F 0D 34 75 B6 97 98   1E 24 DD E7 3B BC 73 44  .o.4u....$..;.sD
#     0080: D9 EB BB 11 3D 47 DA F3   8F 57 09 9B D2 FE 81 1B  ....=G...W......
#     0090: 6A A9 31 AD D9 38 FD 05   D5 55 11 88 92 AC 13 65  j.1..8...U.....e
#     00A0: A8 0B DE CC 33 27 1B 5C   00 70 BC 31 E1 B6 96 31  ....3'.\.p.1...1
#     00B0: 2E F4 39 AC F4 28 6E C3   2B 18 04 10 06 6E BF 64  ..9..(n.+....n.d
#     00C0: E9 DF 92 30 5D B1 8E 40   39 41 91 2A 24 94 0A A2  ...0]..@9A.*$...
#     00D0: FA D2 79 8C D7 4A 07 9E   09 79 F6 6A 5F 77 DC AE  ..y..J...y.j_w..
#     00E0: 10 98 E2 9C 79 59 0C FD   A0 C0 D6 05 8C FF 64 F5  ....yY........d.
#     00F0: E5 5D AC 7D 0C DA B5 63   13 21 15 78 9B 2B 90 22  .].....c.!.x.+."
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.120 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 F7 C0 59 28 B0 B4 74   56 19 29 DD F0 AA BE 5A  @..Y(..tV.)....Z
#     0010: BE BE 7A C9 7C 89 71 68   75 7D BB 45 2A 61 C8 C7  ..z...qhu..E*a..
#     0020: 11 92 20 45 7D B5 C0 F5   98 5A D3 5A 1B E3 32 4A  .. E.....Z.Z..2J
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.122 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:22.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:22.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 14:36:22.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:22.125 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.125 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.128 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0E 72 18 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:55.000 UTC",
#       "not  after"         : "2024-01-01 14:35:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 AC 9F ED 28 3C 1A B7   7B 1E 5C 5E BA 22 08 8C  8...(<....\^."..
#           0010: D4 44 34 18                                        .D4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E FD CD F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:48.000 UTC",
#       "not  after"         : "2024-01-01 14:35:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#           0010: 2B 8E 00 F1                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.153 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 CE 1F C3 09 DA E0 B1   AF 3F AD D6 8E 06 03 02  .........?......
#     0010: 7B FC 9D 49 9B 2B B4 37   FF 26 EA D3 BE 34 42 D4  ...I.+.7.&...4B.
#     0020: DB 85 3E 70 BA 56 43 64   56 75 C7 78 CF 87 47 70  ..>p.VCdVu.x..Gp
#     0030: 70 3A 3F B5 66 B9 F6 B0   BE B4 E2 28 CE 1E D6 62  p:?.f......(...b
#     0040: 30 72 F9 87 92 8D 08 6A   C6 3E D2 89 88 DE C5 AC  0r.....j.>......
#     0050: 17 96 22 71 DE 4D 1B 01   28 26 9D C5 75 C5 28 52  .."q.M..(&..u.(R
#     0060: 4A 90 A5 F4 9C 9E C3 81   F6 C1 F8 E5 D9 BE E8 92  J...............
#     0070: 4A F1 78 60 62 EA E9 1C   D8 E6 BB 20 ED 3F C5 6F  J.x`b...... .?.o
#     0080: 22 E6 20 21 FA E3 24 FB   B1 A7 4B 1E 70 26 EC D2  ". !..$...K.p&..
#     0090: 7A 65 53 D1 2A C1 2E 50   1C 4A E4 59 38 4C 0E 2C  zeS.*..P.J.Y8L.,
#     00A0: D1 85 2B 91 BE 53 3B D3   28 85 35 AC 45 B6 C7 FD  ..+..S;.(.5.E...
#     00B0: DC 2B 1E 54 42 EE 14 DB   5C 0A 6F B6 F4 FF 37 4D  .+.TB...\.o...7M
#     00C0: ED E5 22 85 4D F0 34 94   05 4C 37 6D 7B 91 A5 A1  ..".M.4..L7m....
#     00D0: D6 52 21 97 52 4A E4 1A   32 D2 0A 54 6F 72 8F D3  .R!.RJ..2..Tor..
#     00E0: 49 CA 26 37 FF BC E3 B1   64 D9 9B 19 FF DD 38 28  I.&7....d.....8(
#     00F0: B3 A8 50 08 92 37 E5 2F   3C 0A 34 20 24 42 6D F4  ..P..7./<.4 $Bm.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.154 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 23 C5 2B 8A BB EC CB 35   BE 8F F0 01 E6 1B B9 4E  #.+....5.......N
#     0010: 68 CD 89 06 29 18 2D FD   B4 3F 12 0F 91 A6 41 6F  h...).-..?....Ao
#     0020: E2 CE 1B 8A 18 7D 30 AB   DE A4 BE 92 1A A4 E2 88  ......0.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.155 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:22.202 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "52 D3 7A 75 8F 36 15 AB 1F E0 B7 FE C5 B1 75 0E 8A 44 DA 0E DF 28 C5 78 C0 80 F4 4D 63 7F BE 43",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 14:36:22.465 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 14:36:22.466 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 14:36:33.361; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:33.694 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E FD CD F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:48.000 UTC",
#       "not  after"         : "2024-01-01 14:35:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#           0010: 2B 8E 00 F1                                        +...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F 11 DF 4A 64 F2 21 CC   CB E6 F3 34 44 3F B1 71  ...Jd.!....4D?.q
#           0010: 54 09 84 81                                        T...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 9E C3 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 14:35:46.000 UTC",
#       "not  after"         : "2024-01-01 14:35:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5D FC DF 89 FE 96 3E 25   1B C5 C6 1C 90 2B 49 01  ].....>%.....+I.
#           0010: 2B 8E 00 F1                                        +...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 14:36:33.711 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:33.828 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:33.828 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:33.829 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:36:33.829 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:33.958 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.959 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:33.960 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 14:36:33.961 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.978 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 14:36:33.981 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B4 CF 1E B9 C9 EB DC 0D C7 8C BA 57 B7 B8 E5 CF 25 84 9D D2 43 1D AE 34 B3 CC 09 11 03 14 13 B8",
#     "session id"          : "6D 25 02 AA E9 62 BA 2F 3F 9D 78 8B 1D 4C 8A 71 DA E4 0D 69 DE EC 25 52 02 1E 05 3D C7 CA 1D 44",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E2 8D 6B B9 04 F7 98 D2   FF A7 9C 64 E4 0F 97 02  ..k........d....
#               0010: 0E 5C 83 17 6E 1B F0 59   23 A3 4C 51 76 95 A6 71  .\..n..Y#.LQv..q
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.002 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E8 F4 BB CD 5D F6 E4 FD FF 31 51 85 91 CF B1 AB 55 80 53 39 71 4B D0 BB 4C 61 E7 72 1D 45 BB A9",
#     "session id"          : "6D 25 02 AA E9 62 BA 2F 3F 9D 78 8B 1D 4C 8A 71 DA E4 0D 69 DE EC 25 52 02 1E 05 3D C7 CA 1D 44",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F0 43 05 DA 10 F0 F8 B7   B6 36 BB 13 03 3F 51 F9  .C.......6...?Q.
#             0010: 06 FC B1 61 5C 7C 7C 3E   E4 8C 36 91 DE D3 FE 0A  ...a\..>..6.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.002 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.002 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.003 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.003 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.004 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.005 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.005 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.007 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.007 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.007 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.008 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.009 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.009 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:34.009 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:34.009 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.009 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.010 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.017 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.019 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.020 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.024 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.024 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.024 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.024 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.024 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:34.025 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:36:34.025 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 14:36:34.027 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 14:37:52.429 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:37:52.470 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:37:52.470 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:37:52.470 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 14:37:52.470 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37826/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28381ms
ok 65 stop command for single port in 31815ms
ok 66 status detects locally running solr in 14607ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2157ms
ok 69 copying files around in 6546ms
ok 70 upconfig in 2587ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1206ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 9s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5601 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5601/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38559/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 12:31:47.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 12:31:47.043; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 12:31:47.981; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 12:31:48.022; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23125ms
ok 61 start solr with client truststore and security manager in 25303ms
not ok 62 start solr with mTLS needed in 57455ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-IP0Dos/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38559.
#
# Started Solr server on port 38559 (pid=199064). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38560.
#
# Started Solr server on port 38560 (pid=199490). Happy searching!
#
# INFO  - 2023-10-03 12:33:11.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 12:33:11.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 12:33:11.867; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 12:33:11.871; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 12:33:11.871; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:11.906 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 08 72 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:47.000 UTC",
#     "not  after"         : "2024-01-01 12:32:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 8B C2 F4 7D F4 18 BB   98 30 3D 61 50 13 20 0F  .........0=aP. .
#         0010: 61 31 0D BD                                        a1..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:11.911 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 32 4E 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:39.000 UTC",
#     "not  after"         : "2024-01-01 12:32:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:11.926 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:12.491 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:12.494 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:12.495 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.516 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.516 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.516 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:12.520 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 43 F0 D3 11 8B F6 5C 12 D9 60 2A 5F 98 28 80 AE ED 81 08 D9 75 F3 A8 32 14 A9 62 1A 18 CB 9C",
#   "session id"          : "5D E1 27 DE 33 B7 19 01 69 B3 78 8D 0F 89 4F 99 AD 0F C9 D5 51 FA 41 09 67 7D BA CA 0E D6 92 5C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EA 4F 2D 98 88 98 0B EF   DF F4 21 41 6D C3 C7 8C  .O-.......!Am...
#             0010: 58 68 09 6C D3 62 BA AE   3C FF F5 55 37 DF 12 60  Xh.l.b..<..U7..`
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.660 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4C 55 FD 1E 71 29 A0 98 57 3A AA 7C 97 71 3E E1 C6 46 C3 E2 B8 BE 70 EB 61 77 D5 33 D2 1A C5 5D",
#   "session id"          : "5D E1 27 DE 33 B7 19 01 69 B3 78 8D 0F 89 4F 99 AD 0F C9 D5 51 FA 41 09 67 7D BA CA 0E D6 92 5C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BD D5 BB 73 22 4F 9B C0   C8 A4 C4 BE C7 19 75 83  ...s"O........u.
#           0010: 06 BF 1F FE D2 EA 6A 0B   D1 2D 74 9D B4 7B 8B 48  ......j..-t....H
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.661 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.661 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.664 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.666 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.666 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.666 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.676 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.678 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.679 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.683 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.683 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.685 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.686 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.687 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.687 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.687 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.690 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.693 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 88 9E 63",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:43.000 UTC",
#       "not  after"         : "2024-01-01 12:32:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B E5 50 C6 4C 24 6B D0   49 0F 4E F3 8A 6A 18 05  +.P.L$k.I.N..j..
#           0010: 9C 78 CF 61                                        .x.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.694 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:12.741 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:12.743 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:12.743 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:12.743 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.783 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.786 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 80 ED 28 B6 71 92 ED F4   9D 52 1B 43 D6 1D 4B 25  ..(.q....R.C..K%
#     0010: A3 02 81 0E 8E 7B 6A 95   A9 D5 74 E5 6F 04 CE FF  ......j...t.o...
#     0020: D4 CE A1 21 5B 67 47 D0   F7 14 33 C2 EF 09 98 A2  ...![gG...3.....
#     0030: AA 57 FE 0C D6 21 C4 0B   5A 81 D6 BE E4 AD E8 D1  .W...!..Z.......
#     0040: 0D C3 95 0C F2 52 56 52   F9 60 5F 99 F5 35 FB 2F  .....RVR.`_..5./
#     0050: 05 E4 17 CE A6 F0 64 AE   AA 2E 36 5B 4F 98 34 D9  ......d...6[O.4.
#     0060: 71 E3 C1 0F 67 AA D4 7A   1B A4 04 ED 08 CE E9 9D  q...g..z........
#     0070: 2A DF E0 26 23 48 30 2A   97 B0 E2 7E AD DB 87 5E  *..&#H0*.......^
#     0080: B6 59 00 98 69 D8 0E 8A   43 B9 D4 AA CA 64 67 D7  .Y..i...C....dg.
#     0090: 57 93 A7 01 4A 4E 1C 0A   05 EE 84 BD 0C F8 C6 4A  W...JN.........J
#     00A0: F2 48 01 C2 5A A0 71 F6   41 9B 27 88 63 A0 1D 68  .H..Z.q.A.'.c..h
#     00B0: 66 39 30 90 39 BA 01 6B   D5 4C 9A 58 99 96 02 CD  f90.9..k.L.X....
#     00C0: 6B C8 22 31 88 EC 80 C4   76 5F 20 7D 78 EE 8D 8D  k."1....v_ .x...
#     00D0: B6 37 87 11 42 AE 67 7F   E4 0A 8F 35 AF 93 3C D0  .7..B.g....5..<.
#     00E0: 53 70 38 31 A8 BC 1F E9   BF AB 27 39 ED 12 49 EC  Sp81......'9..I.
#     00F0: 04 2D 02 3F CD 80 FB 11   5E ED 36 B6 07 75 E2 D8  .-.?....^.6..u..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.788 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B0 E3 FA 3F ED 34 3B 52   C4 87 BA BA C5 94 9D B9  ...?.4;R........
#     0010: A3 1F D1 A4 F8 E4 3D 53   CC 16 02 C7 99 31 92 D5  ......=S.....1..
#     0020: B9 87 8F 15 F4 55 28 D9   F6 6A EF 4E F4 17 EB 3B  .....U(..j.N...;
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.790 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:12.791 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.792 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:12.792 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.792 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:12.792 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:12.793 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.793 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.797 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 08 72 E0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:47.000 UTC",
#       "not  after"         : "2024-01-01 12:32:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 8B C2 F4 7D F4 18 BB   98 30 3D 61 50 13 20 0F  .........0=aP. .
#           0010: 61 31 0D BD                                        a1..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 36 D3 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:41.000 UTC",
#       "not  after"         : "2024-01-01 12:32:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#           0010: D9 CC 67 AD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.823 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 3D E7 C8 0F 77 AF 94   72 2B 1D 0F 74 EF 6B 9B  .=...w..r+..t.k.
#     0010: 74 63 C5 D4 65 20 7D C5   05 CE EA 59 72 56 0C D0  tc..e .....YrV..
#     0020: 29 55 D7 4D A5 3A 17 99   AF A4 27 73 A7 76 F2 C5  )U.M.:....'s.v..
#     0030: DD FE 5E 75 13 12 91 44   79 D8 F2 00 52 32 FC 6A  ..^u...Dy...R2.j
#     0040: 23 87 48 DF 7B 3A DD 39   65 A8 00 FC FA F6 E5 49  #.H..:.9e......I
#     0050: 00 4D 03 1D D5 AF 1F 1B   81 2B D9 6D 77 E1 FE 04  .M.......+.mw...
#     0060: E2 E2 7B 08 C2 E4 30 4E   E8 D3 AA 22 76 91 80 31  ......0N..."v..1
#     0070: 5C 55 BC 34 64 F4 C7 A4   26 45 00 3A B5 B4 4A 69  \U.4d...&E.:..Ji
#     0080: 4B E0 19 10 24 2C 03 17   49 58 0A 14 83 32 B9 11  K...$,..IX...2..
#     0090: 31 EE C6 CD 6E 53 26 97   40 3F 65 91 7E 16 35 C9  1...nS&.@?e...5.
#     00A0: AA FA 45 48 2A A1 26 01   CD 0A FA A2 9A B9 FA 59  ..EH*.&........Y
#     00B0: 4C 42 37 B4 B4 67 AC 32   60 4B E0 07 F2 E3 87 B7  LB7..g.2`K......
#     00C0: CB 7D 34 62 21 A8 FD A5   42 91 7C BE 5D 91 72 7E  ..4b!...B...].r.
#     00D0: 13 D1 22 F2 97 C5 CA D9   7C DF C5 FF BC 5C 9F F5  .."..........\..
#     00E0: BB DD 1B E1 68 D3 E5 43   FF 81 CC BB AC 96 B6 23  ....h..C.......#
#     00F0: 28 CE DA 1C 2C 11 C9 7D   BF E3 38 FD 2A 00 A1 26  (...,.....8.*..&
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.824 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC BC 38 AE 13 72 E3 6F   42 89 80 3C 5B 02 1C C4  ..8..r.oB..<[...
#     0010: 2C 0B C5 FE C8 6D 05 18   C9 A9 77 4C BC 97 9F 5C  ,....m....wL...\
#     0020: 4B 9C B3 AF E1 5E 71 90   31 A3 EB 71 F1 A5 74 1E  K....^q.1..q..t.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.825 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:12.878 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "41 F6 B7 34 A9 AC 6B D0 DB 1B A3 82 9A 80 00 AA E2 EB 45 E0 27 87 C2 77 62 40 E9 75 3B 06 C5 4B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 12:33:13.159 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 12:33:13.160 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 12:33:14.102; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 12:33:14.107; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 12:33:14.476; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 12:33:14.479; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 12:33:14.479; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IP0Dos/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:14.511 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 08 72 E0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:47.000 UTC",
#     "not  after"         : "2024-01-01 12:32:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D4 8B C2 F4 7D F4 18 BB   98 30 3D 61 50 13 20 0F  .........0=aP. .
#         0010: 61 31 0D BD                                        a1..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:14.515 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "37 32 4E 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:39.000 UTC",
#     "not  after"         : "2024-01-01 12:32:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:14.529 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:14.761 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.761 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:14.763 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:14.764 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.769 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.781 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.781 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.781 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:14.784 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F4 0F 04 EA C7 2F AC 26 6E 3C AC 9E 85 B7 84 22 E1 3D 5B 90 B0 6F 4A DA 4E 69 33 52 84 43 4C 07",
#   "session id"          : "CC F1 2C 5E 0E 14 6D 17 28 D3 4F 7D B7 BC 25 3A 51 44 26 9E 8E 76 40 24 0E 7D 75 5C 9C 89 D9 86",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 0A 3C E0 8F A5 31 45   40 76 C2 ED 8B D2 22 F5  ..<...1E@v....".
#             0010: D2 C6 BD 1B 9D C5 FC B8   AA 2B 6B C9 AF 43 60 60  .........+k..C``
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.917 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2E 19 43 88 87 18 AF 1D 3A DB 51 E4 55 7C 6C DA 68 76 4B FB 71 4B 77 61 88 7E 41 82 40 26 EB 6E",
#   "session id"          : "CC F1 2C 5E 0E 14 6D 17 28 D3 4F 7D B7 BC 25 3A 51 44 26 9E 8E 76 40 24 0E 7D 75 5C 9C 89 D9 86",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BA C3 B1 E3 E7 27 08 49   3F 6D CE 40 D9 2B 53 9F  .....'.I?m.@.+S.
#           0010: 94 BF 90 7D EE 25 66 9A   CF B9 30 4E 28 12 9C 28  .....%f...0N(..(
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.918 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.918 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.920 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.922 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.923 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.931 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.933 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.934 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.937 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.937 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:14.938 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.940 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.940 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.940 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.941 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.942 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.943 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:14.943 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.945 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 88 9E 63",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:43.000 UTC",
#       "not  after"         : "2024-01-01 12:32:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B E5 50 C6 4C 24 6B D0   49 0F 4E F3 8A 6A 18 05  +.P.L$k.I.N..j..
#           0010: 9C 78 CF 61                                        .x.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:14.946 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:14.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:14.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:14.987 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:14.987 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.023 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 36 D3 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 12:32:41.000 UTC",
#     "not  after"         : "2024-01-01 12:32:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#         0010: D9 CC 67 AD                                        ..g.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#         0010: F4 22 44 34                                        ."D4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.026 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 97 E6 44 AF 6A 5C BE   B6 70 A6 8B 64 22 99 31  U..D.j\..p..d".1
#     0010: 4F A8 A7 69 B7 ED 95 0A   F6 6A 67 66 C7 15 37 D2  O..i.....jgf..7.
#     0020: 24 77 D7 41 1B 5A 6C 52   BD 1C F7 AF 94 ED AB 48  $w.A.ZlR.......H
#     0030: 47 18 F4 FF 17 1C 0E 9C   21 04 6E 53 86 05 EC 90  G.......!.nS....
#     0040: 5E 0B 6E F7 37 3E B6 53   FC 2F 8E 28 0E 03 55 41  ^.n.7>.S./.(..UA
#     0050: 4B E9 94 C0 99 9A E4 21   1D 0E 55 60 AF 21 E8 2A  K......!..U`.!.*
#     0060: 64 6C EA FA 77 A7 8D 8F   34 8D 13 CA BB 7B 94 DA  dl..w...4.......
#     0070: 39 31 A3 80 1F B0 B5 6D   18 AC 9E CB 94 35 F1 57  91.....m.....5.W
#     0080: D5 89 54 C4 4C FA B3 C7   5E 62 F8 01 04 7D 1B 1F  ..T.L...^b......
#     0090: 2F 34 ED 8F 71 4C F6 A3   08 18 DC 3B E3 62 24 D7  /4..qL.....;.b$.
#     00A0: 46 75 3B CB DB 93 77 40   1F EF 7B B8 79 B6 24 5C  Fu;...w@....y.$\
#     00B0: 46 79 2B A5 80 D2 9B 42   46 EC 83 D1 09 8C 00 B7  Fy+....BF.......
#     00C0: 12 8F 75 1E 27 5C F1 DB   20 4F 67 10 88 28 65 0F  ..u.'\.. Og..(e.
#     00D0: 67 0B BA C0 B8 D9 4E 53   A1 74 60 75 79 7C 47 E4  g.....NS.t`uy.G.
#     00E0: 12 A0 C3 19 49 6F 4A 25   0C D2 A7 8C D8 CD 62 50  ....IoJ%......bP
#     00F0: 15 76 A0 6A E1 12 60 D9   15 E7 B4 60 B7 44 82 6C  .v.j..`....`.D.l
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.028 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 5F E8 63 85 8A AF AF   E0 A2 6D 62 00 20 A2 5B  w_.c......mb. .[
#     0010: 30 48 2C E8 D5 19 DB E5   FA C5 9B C0 A7 D0 D1 6E  0H,............n
#     0020: 70 B3 BD 45 67 F9 C8 F0   91 0A 1F 5E 87 E0 E9 6F  p..Eg......^...o
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.030 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:15.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:15.032 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:15.032 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:15.032 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 12:33:15.032 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:15.032 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.033 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.035 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 08 72 E0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:47.000 UTC",
#       "not  after"         : "2024-01-01 12:32:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 8B C2 F4 7D F4 18 BB   98 30 3D 61 50 13 20 0F  .........0=aP. .
#           0010: 61 31 0D BD                                        a1..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 36 D3 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:41.000 UTC",
#       "not  after"         : "2024-01-01 12:32:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#           0010: D9 CC 67 AD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.061 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 64 CF 91 C7 25 25 DA   EB 62 D2 B9 0F EA 4B 3B  ^d...%%..b....K;
#     0010: AE 6F 48 0C 48 70 74 F7   FF 0A D6 C8 09 04 6E 7C  .oH.Hpt.......n.
#     0020: 98 14 45 21 FE C5 F4 42   E7 C4 BC 9F 41 52 1C A8  ..E!...B....AR..
#     0030: 5D 1A F9 41 AF F3 5B 25   8E 2D 68 4B 07 4E 06 DB  ]..A..[%.-hK.N..
#     0040: E4 61 BC B7 54 CE 16 09   20 45 58 4A C3 71 54 0E  .a..T... EXJ.qT.
#     0050: 59 71 D6 D9 94 53 4D 9F   61 C6 38 00 8E 2F 42 6C  Yq...SM.a.8../Bl
#     0060: 93 79 72 25 53 C4 9E E6   2C 51 62 D8 A8 35 70 EC  .yr%S...,Qb..5p.
#     0070: 60 3C 8F 6F 0C 32 38 27   D4 A5 CD CA 72 07 29 C8  `<.o.28'....r.).
#     0080: 0A BE 04 ED B9 F7 D6 EB   74 13 73 32 0C F8 CF BB  ........t.s2....
#     0090: 3C AD E6 08 D6 CE 5C C8   16 B8 EF 50 00 A1 12 30  <.....\....P...0
#     00A0: AF 59 F8 1E 2C EB 7A A2   08 E7 CD F7 51 61 CC 59  .Y..,.z.....Qa.Y
#     00B0: 59 A8 48 05 0F FA 77 05   1E FF D0 CD 54 20 BB 16  Y.H...w.....T ..
#     00C0: 1F 31 0C 80 48 E8 2F 1D   EE B9 E2 D0 62 0B 4C 05  .1..H./.....b.L.
#     00D0: 4F 4B 45 68 2D 3B 98 3E   DB 5D A4 8B 2C 9C 54 52  OKEh-;.>.]..,.TR
#     00E0: AF 47 88 2D 50 FE 98 97   32 21 E5 84 80 E7 50 1B  .G.-P...2!....P.
#     00F0: 19 6A 85 F4 AC 4E 2D 60   0D 7D 4E 54 3E 46 06 F6  .j...N-`..NT>F..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.063 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C7 29 DB AF EE AC 44 2F   DE A6 CC D9 C3 86 87 28  .)....D/.......(
#     0010: AC 88 18 72 18 5F 74 F2   A5 FC 70 25 6C CD 7D 99  ...r._t...p%l...
#     0020: 11 7F 8A 0F D3 EC CC 06   7E 6B 21 3F 2F C5 51 E3  .........k!?/.Q.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.063 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:15.111 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CB 3C 9F 20 68 9C 0E B7 A0 75 44 24 DB 75 BE 3F 9B AF B4 38 EB 10 45 71 72 A4 02 1A 68 A0 30 66",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 12:33:15.379 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 12:33:15.380 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 12:33:26.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:27.086 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 32 4E 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:39.000 UTC",
#       "not  after"         : "2024-01-01 12:32:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#           0010: D9 CC 67 AD                                        ..g.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 36 D3 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 12:32:41.000 UTC",
#       "not  after"         : "2024-01-01 12:32:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C A8 2C 8A 39 72 92 31   D9 1F 5E 5C C1 98 19 B4  ..,.9r.1..^\....
#           0010: D9 CC 67 AD                                        ..g.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 00 A4 13 43 76 9B B0   E2 DF DE 8B D1 0E 53 9E  ....Cv........S.
#           0010: F4 22 44 34                                        ."D4
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 12:33:27.102 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:27.190 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:27.193 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:27.194 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:33:27.194 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:27.341 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:27.343 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 12:33:27.343 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.348 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.360 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.361 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.361 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 12:33:27.363 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "4D 3C 97 25 FC 73 10 F1 4A 65 6F DE A3 33 F8 CD C1 66 C7 3F CD 08 08 4F 91 6F FC 1D F3 5E EF E2",
#     "session id"          : "F8 30 A9 39 65 A2 88 93 36 96 8B 29 84 A4 A6 F7 ED BD 37 EE E5 18 C4 4A 48 44 0A D2 CA 3C 53 06",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 54 D7 7C DC 34 13 3B 93   7C 9A 8E 3A 36 D5 BA E0  T...4.;....:6...
#               0010: A9 42 3A 69 61 13 FD C1   44 D2 65 66 86 9C 9C 5A  .B:ia...D.ef...Z
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.382 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DC 8C F9 F5 7A 18 53 03 A4 FA 10 C5 B2 43 FA 4C 38 B1 2C 8D 22 39 74 AD B6 EA C9 18 04 44 49 E1",
#     "session id"          : "F8 30 A9 39 65 A2 88 93 36 96 8B 29 84 A4 A6 F7 ED BD 37 EE E5 18 C4 4A 48 44 0A D2 CA 3C 53 06",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C4 1B BF D0 30 22 F2 52   34 AD D8 BD E6 30 39 F7  ....0".R4....09.
#             0010: EC 04 7F 44 C6 D6 2C A1   D0 C3 4D C0 25 76 6C 5A  ...D..,...M.%vlZ
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.383 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.383 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.384 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.384 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.386 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.388 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.388 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.389 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:27.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:27.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.399 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.400 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.402 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.405 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:27.406 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:33:27.407 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 12:33:27.408 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sc

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 12:34:47.518 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:34:47.559 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:34:47.561 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:34:47.561 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 12:34:47.561 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38560/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28458ms
ok 65 stop command for single port in 31482ms
ok 66 status detects locally running solr in 14377ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2201ms
ok 69 copying files around in 6638ms
ok 70 upconfig in 2658ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1198ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1199ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 18s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m46s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5600 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5600/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([2D1DF2D35880AAE5:1A8606CD604C7741]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1589 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=2D1DF2D35880AAE5 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hadoop-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 5m 27s
628 actionable tasks: 611 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 5m55s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5599 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5599/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([AD9DC7C5D829C9F:3F2D3727B65EAAC1]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6181 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AD9DC7C5D829C9F -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 6m 58s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m26s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5598 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5598/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36239/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 06:57:31.757; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 06:57:31.763; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 06:57:32.659; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 06:57:32.699; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22689ms
ok 61 start solr with client truststore and security manager in 25670ms
not ok 62 start solr with mTLS needed in 60413ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-stzasp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36239.
#
# Started Solr server on port 36239 (pid=197967). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36240.
#
# Started Solr server on port 36240 (pid=198393). Happy searching!
#
# INFO  - 2023-10-03 06:58:56.379; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 06:58:56.386; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 06:58:56.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 06:58:56.763; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 06:58:56.763; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:56.797 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 A4 85 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:32.000 UTC",
#     "not  after"         : "2024-01-01 06:58:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3D E3 8C 6B F5 F4 02   F3 E8 36 BD D2 02 EB 07  .=..k.....6.....
#         0010: A9 38 61 06                                        .8a.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:56.802 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 CA BF 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:24.000 UTC",
#     "not  after"         : "2024-01-01 06:58:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:56.817 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:57.350 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:57.352 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:57.352 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.369 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.370 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:57.372 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "46 64 D7 59 7A 08 3E 64 D2 CE 40 5B 75 8F 2F EB 75 21 DF 39 E5 73 18 E2 63 B4 5A 63 CA 6A 32 42",
#   "session id"          : "3F C4 82 6E 36 02 92 00 41 3D 03 B1 38 53 97 96 AE B3 40 97 81 4A 72 83 7F 1B FE 42 02 D2 2C A8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 03 57 1F A2 D1 FF 62   FE 7F 51 12 42 FE D5 A5  ..W....b..Q.B...
#             0010: A5 83 99 40 62 B3 D8 3A   34 7B 5E 0B A5 36 6A 01  ...@b..:4.^..6j.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.494 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 64 F5 38 54 DE B1 96 D3 E8 8D DE 3F A3 C1 42 BB A4 A9 8A 25 C5 9D 40 B4 F3 9D D1 9D 6F 26 B6",
#   "session id"          : "3F C4 82 6E 36 02 92 00 41 3D 03 B1 38 53 97 96 AE B3 40 97 81 4A 72 83 7F 1B FE 42 02 D2 2C A8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F8 25 46 1C 7A 72 6E 6F   EA 79 5F F3 B4 61 28 31  .%F.zrno.y_..a(1
#           0010: 82 AA 6C B7 0F 5D 59 D8   43 5D 62 1E 46 81 49 37  ..l..]Y.C]b.F.I7
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.495 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.495 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.497 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.499 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.499 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.499 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.501 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.501 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.508 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.510 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.511 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.517 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.518 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.519 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.520 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.521 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.524 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 2C 9B 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:28.000 UTC",
#       "not  after"         : "2024-01-01 06:58:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 25 52 35 2A B2 56 36   A9 60 37 97 87 08 05 C3  .%R5*.V6.`7.....
#           0010: 7B CA F8 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.525 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:58:57.569 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:58:57.570 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:58:57.570 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:58:57.571 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.611 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.615 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 CC 50 02 56 F1 69 E9   05 EA 0C 64 C8 18 97 9F  ..P.V.i....d....
#     0010: 57 71 7B 4A FF 95 3E A7   F6 11 F8 37 A2 B7 C6 23  Wq.J..>....7...#
#     0020: A4 C2 0F 08 B6 D3 ED 4A   59 AA 61 1E 2E 1A F8 5D  .......JY.a....]
#     0030: 24 CF 45 72 DF E8 A2 61   F9 F9 A9 CB DE 14 E3 D4  $.Er...a........
#     0040: 62 FD BC AD DB 8E DE CE   5D 24 C5 1C 80 1C 9C 37  b.......]$.....7
#     0050: 30 93 72 84 5C FB 08 17   14 5C 76 F0 97 6B 45 CA  0.r.\....\v..kE.
#     0060: E1 6B 4C 99 B4 85 D8 08   57 32 4B E9 A8 D4 DC 24  .kL.....W2K....$
#     0070: 46 7E CA 57 30 F6 BC E8   B7 41 36 7F 15 F6 B0 66  F..W0....A6....f
#     0080: BC C7 5E DA DA AB 7B 1E   8C 70 2E 95 92 EC E4 03  ..^......p......
#     0090: B8 6A 2A 34 94 03 02 3D   18 95 B3 56 5A 14 98 94  .j*4...=...VZ...
#     00A0: 34 D8 77 0F 5A E0 C0 D0   0A E2 FD FE E7 A4 82 97  4.w.Z...........
#     00B0: B8 5E B2 AA A6 96 A5 0F   5E 4E A1 08 DB CD 85 AA  .^......^N......
#     00C0: 45 93 C2 BC 29 9B BC DE   60 1B 7C BA 70 DE E0 43  E...)...`...p..C
#     00D0: 41 73 F6 81 3E 71 72 1F   10 08 16 46 04 A2 61 17  As..>qr....F..a.
#     00E0: B7 48 1C 34 48 F9 DC 53   C1 BB B1 C3 25 37 0E FE  .H.4H..S....%7..
#     00F0: F7 15 AF BC 1A A3 EE D4   70 E9 74 58 70 6A B6 35  ........p.tXpj.5
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.617 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E1 D6 7D EF F4 FF B3 1D   05 E8 6B 9F 34 09 3C ED  ..........k.4.<.
#     0010: A7 D9 02 71 FB 8B 5A 81   0D 93 C0 4A F3 7D B1 37  ...q..Z....J...7
#     0020: 85 5E 7C 1B CA B2 3A FE   DB 87 3C CD B5 14 B7 7D  .^....:...<.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.619 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:58:57.620 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.621 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:58:57.621 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.621 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:58:57.621 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:58:57.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.622 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.624 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 A4 85 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:32.000 UTC",
#       "not  after"         : "2024-01-01 06:58:32.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 3D E3 8C 6B F5 F4 02   F3 E8 36 BD D2 02 EB 07  .=..k.....6.....
#           0010: A9 38 61 06                                        .8a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 2A B4 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:26.000 UTC",
#       "not  after"         : "2024-01-01 06:58:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#           0010: 04 B5 20 11                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.649 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 A7 33 8A 6D F3 4D 43   4E 7C 62 9C 3E 54 BB 77  ..3.m.MCN.b.>T.w
#     0010: 9A B3 D5 C9 BA 88 41 A2   20 09 0E 9F 2B 0F 41 70  ......A. ...+.Ap
#     0020: B4 38 1A 83 48 AB FB FA   1A 8E B6 E3 DF EF 5E 2F  .8..H.........^/
#     0030: 92 FC 42 6F A9 72 F0 C8   53 EE 03 70 46 C2 A9 C4  ..Bo.r..S..pF...
#     0040: D1 45 ED 02 DD 4D E6 0E   43 0D 9F 1C C3 F1 1B 75  .E...M..C......u
#     0050: 0F 2C FE 48 E5 AC FA 50   BC CF B5 4E 83 EE CD 99  .,.H...P...N....
#     0060: 66 15 99 88 C9 B4 AD FA   D2 EE 61 1D F4 21 3F 1D  f.........a..!?.
#     0070: 84 9C A0 54 66 66 83 8E   FA A8 EA ED 64 A4 AC F4  ...Tff......d...
#     0080: 15 1B C0 B8 86 5C 23 8F   B9 EC 14 4F C7 0F 32 46  .....\#....O..2F
#     0090: CE DB B5 8B 6E 48 B0 66   13 B8 D8 F6 79 93 BF 5A  ....nH.f....y..Z
#     00A0: 2F 18 B1 B0 2D 82 20 9A   46 8F 0B FF F1 30 36 23  /...-. .F....06#
#     00B0: 16 C0 BE C1 6D 22 13 EC   BB E7 78 41 92 02 11 13  ....m"....xA....
#     00C0: 79 65 E9 15 B6 85 88 A5   2E 2F C7 68 BA 3D 66 6E  ye......./.h.=fn
#     00D0: 9D 08 32 C2 1C 5C E5 94   29 2D 53 42 B0 FB D5 B4  ..2..\..)-SB....
#     00E0: F0 99 D7 00 8E BB 48 73   F8 12 55 09 D7 EE A4 11  ......Hs..U.....
#     00F0: C1 60 FC 3C 35 EA B0 72   0E 87 97 A7 60 E6 D1 CC  .`.<5..r....`...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.650 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 FD F1 2D E8 BD 05 7E   BD 92 BC 39 00 67 CF F4  Y..-.......9.g..
#     0010: 26 E2 8E 0B 07 AC BD D3   64 43 4B 30 2A 25 54 5A  &.......dCK0*%TZ
#     0020: 23 1F E3 41 41 12 70 8F   23 77 7A BC FB B0 F0 56  #..AA.p.#wz....V
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.651 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:58:57.702 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "44 DF B8 68 95 26 40 44 15 44 68 51 98 14 39 EB 9D 9A D3 1A 5B 53 62 E0 E1 35 A5 C0 06 92 CA 97",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 06:58:57.983 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 06:58:57.984 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 06:58:58.960; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 06:58:58.966; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 06:58:59.358; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 06:58:59.362; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 06:58:59.362; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-stzasp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:59.396 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 A4 85 D7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:32.000 UTC",
#     "not  after"         : "2024-01-01 06:58:32.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 3D E3 8C 6B F5 F4 02   F3 E8 36 BD D2 02 EB 07  .=..k.....6.....
#         0010: A9 38 61 06                                        .8a.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:59.401 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 CA BF 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:24.000 UTC",
#     "not  after"         : "2024-01-01 06:58:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 06:58:59.418 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:59.947 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.947 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:59.949 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:58:59.950 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.969 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.969 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.969 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:58:59.971 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 A8 DD E2 87 48 37 6F 94 58 E1 7A 8F 75 B8 A2 AA 0E E6 EC 91 06 F1 9B 74 93 84 2C 7E 62 39 A6",
#   "session id"          : "E6 D2 81 41 F9 54 58 51 F9 E0 E8 90 D9 4F F1 C6 6B 63 C4 E9 56 0F AC 04 02 3B 7B 01 EC FE 8A 9E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3E 09 60 81 B9 9E 22 34   62 7C 17 5F 5A 83 6B 28  >.`..."4b.._Z.k(
#             0010: A8 22 06 E6 B3 C3 93 FE   28 DC 15 51 44 70 AA 36  ."......(..QDp.6
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.084 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "25 E2 DA CF F7 24 4E FC A2 F0 34 44 45 91 BA 7E D1 37 3A 07 C8 E4 F3 FD E7 4D E3 1B 5A 21 6F 1A",
#   "session id"          : "E6 D2 81 41 F9 54 58 51 F9 E0 E8 90 D9 4F F1 C6 6B 63 C4 E9 56 0F AC 04 02 3B 7B 01 EC FE 8A 9E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 81 78 6D BA D3 14 57 4D   08 0D 71 A5 D7 25 6C 8E  .xm...WM..q..%l.
#           0010: 2B CB F5 44 AF 56 FE AC   8A 66 7B 94 6C F5 C3 29  +..D.V...f..l..)
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.087 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.089 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.089 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.099 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.101 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.102 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.105 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.106 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.106 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.106 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.106 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.109 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.109 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.109 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.110 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.111 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.112 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.116 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 2C 9B 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:28.000 UTC",
#       "not  after"         : "2024-01-01 06:58:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 03 25 52 35 2A B2 56 36   A9 60 37 97 87 08 05 C3  .%R5*.V6.`7.....
#           0010: 7B CA F8 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:00.165 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:00.166 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:00.166 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:00.167 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.207 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 2A B4 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 06:58:26.000 UTC",
#     "not  after"         : "2024-01-01 06:58:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#         0010: 04 B5 20 11                                        .. .
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#         0010: 43 3C 74 E6                                        C<t.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.211 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 A6 4C EF AE 50 31 0B   6E 54 B4 E9 7E 12 EC 19  7.L..P1.nT......
#     0010: BA 76 B5 27 F4 CB C6 E1   23 1F 99 20 53 39 90 60  .v.'....#.. S9.`
#     0020: 97 FA FA CD EF 8F 1E F7   EE B2 F1 C5 E1 FE 46 2A  ..............F*
#     0030: 8E 7D 15 A7 82 54 6C E7   04 03 B4 54 42 A8 C9 28  .....Tl....TB..(
#     0040: 98 08 1B 36 7A D2 08 C4   9B 97 99 DE 86 27 18 B1  ...6z........'..
#     0050: E5 EC E4 9B 1B 2E CD CD   E6 DA 41 8E 39 4C A9 26  ..........A.9L.&
#     0060: 5A 2F 96 9C AC 1C E5 64   59 BE 8D 41 B9 A1 13 AE  Z/.....dY..A....
#     0070: C6 B5 00 2E B9 7A 5A A6   C5 E1 48 58 DA 9B 90 C0  .....zZ...HX....
#     0080: 83 AD B7 FD CD A6 F9 8F   4E 2D 3C C4 04 75 41 B2  ........N-<..uA.
#     0090: 48 CA 93 E5 8B 26 57 80   06 49 C2 ED B7 BB 9C 9C  H....&W..I......
#     00A0: A9 D6 E2 7E 7A 33 83 AE   87 CA AD ED 15 03 A1 29  ....z3.........)
#     00B0: 79 87 E2 D4 7C 8B 63 01   22 C7 19 F1 F7 BB 55 F9  y.....c.".....U.
#     00C0: 7E E9 62 F2 F4 E8 B1 DF   D8 1C B0 EE 0E 5F 60 B0  ..b.........._`.
#     00D0: 52 85 E5 68 60 E0 D1 A7   47 9A 6B 75 8F E9 89 0C  R..h`...G.ku....
#     00E0: 1C C1 42 E3 EE EE 38 8B   80 B6 BC 1A 4B DC 7A 0C  ..B...8.....K.z.
#     00F0: CD 00 D9 E2 FD AF 0D C7   09 94 3C FB 33 50 EF 87  ..........<.3P..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.213 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 97 19 D6 47 88 19 41   03 2C 86 24 46 4A 35 22  A...G..A.,.$FJ5"
#     0010: 97 AF F6 10 B3 8E F9 F9   0E F9 EF 93 F4 4A 2F 84  .............J/.
#     0020: 0D D2 45 03 5C E6 8D B0   08 F5 21 C9 66 E9 1F F4  ..E.\.....!.f...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.215 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:59:00.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.217 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:59:00.217 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.217 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 06:59:00.218 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:00.218 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.219 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.222 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 A4 85 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:32.000 UTC",
#       "not  after"         : "2024-01-01 06:58:32.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 3D E3 8C 6B F5 F4 02   F3 E8 36 BD D2 02 EB 07  .=..k.....6.....
#           0010: A9 38 61 06                                        .8a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 2A B4 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:26.000 UTC",
#       "not  after"         : "2024-01-01 06:58:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#           0010: 04 B5 20 11                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.248 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AF C8 BA 99 8F E0 FE 7F   4A F5 C6 4E 32 83 F8 F7  ........J..N2...
#     0010: E1 D7 F6 57 40 E8 89 BF   DA B5 95 3B 02 13 F6 01  ...W@......;....
#     0020: D4 A5 AC 7D EE BB 66 95   51 2B FA 72 D8 F9 8E 67  ......f.Q+.r...g
#     0030: 68 E7 37 29 8A A2 29 45   A6 4F 2C BF 54 28 45 D9  h.7)..)E.O,.T(E.
#     0040: 0F 08 5E 01 CB 39 E4 8D   15 12 58 1E FC 7E E2 21  ..^..9....X....!
#     0050: A6 00 8F 95 6D C7 8F 3E   30 10 E6 4B 5C 77 E2 17  ....m..>0..K\w..
#     0060: 20 C0 F1 F8 E0 21 58 97   B1 59 FB 5F 41 92 EF 9A   ....!X..Y._A...
#     0070: 42 76 D3 9A 17 14 57 41   F6 9A C1 E6 DC BC 30 53  Bv....WA......0S
#     0080: 70 BD CB E5 D9 3C E9 05   44 8F 35 1B 43 C8 EE 79  p....<..D.5.C..y
#     0090: 10 32 9A FB 99 7F B8 AF   C6 23 99 84 D2 6B 63 17  .2.......#...kc.
#     00A0: 83 C0 28 DB 5E E8 B5 69   4D 74 93 80 4F 22 1D FB  ..(.^..iMt..O"..
#     00B0: 2A F7 9F F0 61 AB 0B A3   CB 11 B5 7F 00 35 7F 93  *...a........5..
#     00C0: E8 8A 6D DF 0E D4 D1 43   EB 71 32 EA 14 1F 98 FF  ..m....C.q2.....
#     00D0: 59 BF B0 61 57 07 AB F9   C1 0F 9D 7C 45 AE D1 B5  Y..aW.......E...
#     00E0: 7E CC 93 76 D6 60 FD BE   52 DA CA 89 F0 0B 8B A6  ...v.`..R.......
#     00F0: 2E 9D E4 DF 02 12 D7 F8   D1 B3 EA D8 E9 63 69 61  .............cia
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.249 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 D0 0F E6 B6 56 64 30   00 E5 F0 E6 CC 44 0D F3  .....Vd0.....D..
#     0010: 8A E7 75 7F 77 41 D4 3B   67 6C 84 64 23 13 8F B1  ..u.wA.;gl.d#...
#     0020: C0 16 08 25 AB 2E 63 50   6F FF 05 A5 90 57 CD BE  ...%..cPo....W..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.250 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:00.301 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 8D C5 1A 0B D9 54 E2 8C F6 79 3A 76 85 89 52 0A 89 AA DC DC 56 11 2B 69 18 84 2F 8B F5 0D 1C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 06:59:00.618 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 06:59:00.619 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 06:59:12.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 06:59:12.379 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 2A B4 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:26.000 UTC",
#       "not  after"         : "2024-01-01 06:58:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#           0010: 04 B5 20 11                                        .. .
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 BC 3C 7D F0 23 0A 65   04 3D B5 C9 89 B3 40 4A  w.<..#.e.=....@J
#           0010: 43 3C 74 E6                                        C<t.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 CA BF 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 06:58:24.000 UTC",
#       "not  after"         : "2024-01-01 06:58:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A4 20 9C C3 5B 72 F0 06   57 A8 B7 CD 01 05 E9 3C  . ..[r..W......<
#           0010: 04 B5 20 11                                        .. .
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 06:59:12.396 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:12.741 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:12.742 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:12.742 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 06:59:12.742 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:59:12.901 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.902 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:59:12.904 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 06:59:12.904 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.910 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.923 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.923 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.923 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 06:59:12.926 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "49 22 F8 39 F6 AD 13 67 EB 2C 91 25 AE 0E 02 4F EF CA EA 63 26 71 FB 36 23 FE 15 DF 1D 59 FF F0",
#     "session id"          : "16 B4 45 B4 50 1A EE 9F 49 EB CC 28 13 4B 7C 50 79 A8 44 9C 57 0C 33 55 C5 5D EE D5 75 29 96 DF",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E6 33 B1 24 7C B1 B9 5E   74 81 8A E2 B5 32 0E 98  .3.$...^t....2..
#               0010: 56 45 5A 55 15 A1 14 29   C3 52 9F 58 F0 F7 AD 0F  VEZU...).R.X....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.948 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B1 23 6D CF C7 F3 6C 09 9D 87 DD FE A7 2A 6B C1 95 25 ED 53 91 4A E5 2F C8 D6 2D 8C 08 1F B9 86",
#     "session id"          : "16 B4 45 B4 50 1A EE 9F 49 EB CC 28 13 4B 7C 50 79 A8 44 9C 57 0C 33 55 C5 5D EE D5 75 29 96 DF",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F BB 5C 49 FF 3D C2 61   F4 11 6B 86 91 6D 73 72  ..\I.=.a..k..msr
#             0010: BC 68 05 DE 91 60 F6 20   56 10 09 41 D2 93 82 10  .h...`. V..A....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.949 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.949 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.950 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.951 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.951 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.953 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.954 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.954 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.956 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.963 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.965 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.967 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.971 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.971 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.971 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 06:59:12.972 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 06:59:12.974 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 07:00:36.174 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 07:00:36.236 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 07:00:36.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 07:00:36.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 07:00:36.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36240/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28494ms
ok 65 stop command for single port in 31560ms
ok 66 status detects locally running solr in 14395ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2182ms
ok 69 copying files around in 6632ms
ok 70 upconfig in 2668ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1200ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1211ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 42s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m7.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5597 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5597/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35189/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 03:58:00.932; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 03:58:00.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 03:58:01.868; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 03:58:01.908; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23124ms
ok 61 start solr with client truststore and security manager in 24857ms
not ok 62 start solr with mTLS needed in 57767ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-oiOYgp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35189.
#
# Started Solr server on port 35189 (pid=198008). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35190.
#
# Started Solr server on port 35190 (pid=198442). Happy searching!
#
# INFO  - 2023-10-03 03:59:25.147; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 03:59:25.152; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 03:59:25.528; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 03:59:25.531; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 03:59:25.532; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:25.564 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 34 A8 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:59:01.000 UTC",
#     "not  after"         : "2024-01-01 03:59:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 8D 53 97 4F 8C D6 39   D7 64 FB 51 29 C8 DE 32  ..S.O..9.d.Q)..2
#         0010: 9D 74 F4 5D                                        .t.]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:25.568 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 3F D2 6F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:53.000 UTC",
#     "not  after"         : "2024-01-01 03:58:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:25.583 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:25.808 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:25.810 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:25.810 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.816 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.828 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.828 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.828 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:25.831 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "49 1D AD 5B B6 18 5C 34 52 A2 3F 18 D2 AB 07 DD B6 C8 11 A5 DE 1E C3 5C 7D CC A7 DA 0D 87 1F D0",
#   "session id"          : "EC 3C 0C D5 AC 85 C4 BA 3F 74 AD 16 F4 0E 8E 22 8D 08 41 F5 A5 C7 BB AA D2 0F 4C FE 2F 95 88 6C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 3F EC 86 0A 24 DB 39   2F 45 26 D1 39 54 04 A1  .?...$.9/E&.9T..
#             0010: BE 6E 00 F2 65 96 C5 BB   CF 04 57 EC C6 C2 23 44  .n..e.....W...#D
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.955 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6E 56 AF 2F 1C 56 80 39 8D 0D B1 BF BC 74 76 01 56 2F 63 AE 34 AF 28 30 7F 8A 1C A5 4E C6 E5 6A",
#   "session id"          : "EC 3C 0C D5 AC 85 C4 BA 3F 74 AD 16 F4 0E 8E 22 8D 08 41 F5 A5 C7 BB AA D2 0F 4C FE 2F 95 88 6C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 45 AA C6 21 E7 CB 8C   89 0F 10 E4 B1 A2 9A C8  CE..!...........
#           0010: 6B EB A1 7B 58 A1 21 81   E1 3D 76 F4 E7 8A 45 1F  k...X.!..=v...E.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.955 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.955 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.956 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.957 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.958 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.959 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.960 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.960 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.961 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.969 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.970 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.971 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.975 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.975 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.975 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:25.976 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.978 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.978 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.979 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.979 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.980 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.980 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:25.980 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.983 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 28 EC 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:57.000 UTC",
#       "not  after"         : "2024-01-01 03:58:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 F5 0E 87 66 BA 8D C3   83 9C 8A E2 2C 62 1D B8  ....f.......,b..
#           0010: 7B 9E EB A1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:25.983 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:26.022 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:26.024 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:26.025 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:26.025 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.078 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.082 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 40 AC 5B 15 8B 21 81   2E 72 13 D5 21 F7 FF 76  o@.[..!..r..!..v
#     0010: B2 F3 AB 94 1A 1A EF C3   FA 0C 7E EB E6 71 80 AA  .............q..
#     0020: E6 A2 6E 48 EE D0 54 B0   12 7A 67 24 B7 D4 90 70  ..nH..T..zg$...p
#     0030: 4C 0A BD 3F CC 4D 90 D4   D1 6F 97 1F 21 89 2A F2  L..?.M...o..!.*.
#     0040: 6A 93 2D 40 B1 6C 2E 6E   68 C0 59 C3 4F 9A BD FC  j.-@.l.nh.Y.O...
#     0050: 94 B9 26 36 E3 A7 60 6D   84 30 16 26 9A 81 B1 A0  ..&6..`m.0.&....
#     0060: B9 6C 9B 01 F2 26 3D 1C   53 0D 60 EB 76 69 27 D9  .l...&=.S.`.vi'.
#     0070: 45 90 99 F0 64 A2 3F 9D   62 B8 FB 88 95 A5 E3 FA  E...d.?.b.......
#     0080: 23 90 6B 15 0A 86 DA 9F   C6 3D 5E E4 EF A0 94 CE  #.k......=^.....
#     0090: 29 E4 26 B8 7E DD 40 8E   60 6A 57 18 CF BE 46 B0  ).&...@.`jW...F.
#     00A0: 72 32 F3 8B 00 53 27 1E   D0 33 6F 3A D9 4B B6 69  r2...S'..3o:.K.i
#     00B0: 08 30 CC E8 34 92 D5 90   6C 8B C7 3A 7F 52 77 33  .0..4...l..:.Rw3
#     00C0: EB E8 A0 CB 2F A7 96 FC   8B FD D2 E1 26 9E 14 35  ..../.......&..5
#     00D0: CA 39 47 5F F1 A3 37 72   B7 DA F3 D4 A0 EE 58 0D  .9G_..7r......X.
#     00E0: 94 4A 8D 6F 43 D5 7A 6A   4A 5E BF 39 9B 8A 21 B8  .J.oC.zjJ^.9..!.
#     00F0: B9 B0 3A DE E2 D4 46 8E   BC 11 9F 3B 77 40 13 37  ..:...F....;w@.7
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.083 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 60 4F B0 CA B9 9D 12 94   00 50 53 42 74 3E C8 09  `O.......PSBt>..
#     0010: 39 F2 04 2D 20 10 3B F0   70 B5 38 F9 E7 77 A4 84  9..- .;.p.8..w..
#     0020: AC 7E FC 07 58 30 94 1C   CD DF DF B1 85 09 E7 6E  ....X0.........n
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.086 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:26.087 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:26.087 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:26.087 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:26.087 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:26.088 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:26.088 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.088 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.091 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 34 A8 44",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:59:01.000 UTC",
#       "not  after"         : "2024-01-01 03:59:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 8D 53 97 4F 8C D6 39   D7 64 FB 51 29 C8 DE 32  ..S.O..9.d.Q)..2
#           0010: 9D 74 F4 5D                                        .t.]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 FE 5F 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:54.000 UTC",
#       "not  after"         : "2024-01-01 03:58:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#           0010: A7 15 37 04                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.117 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 15 C3 D5 95 E7 2B BE   AC 83 28 1B 2B 3A E9 62  H.....+...(.+:.b
#     0010: 3F F6 D1 F0 CC AA E5 6F   E8 72 C8 68 EF 44 A6 F8  ?......o.r.h.D..
#     0020: C9 9B 73 BC 1F F9 63 92   BB 77 20 9E 5E C0 4F 02  ..s...c..w .^.O.
#     0030: A3 89 EC 28 7E 10 BA D5   3F D5 05 9A 1F B1 89 AA  ...(....?.......
#     0040: B7 37 D1 49 BC EF 38 08   AA C0 C9 DC 18 A3 CD 85  .7.I..8.........
#     0050: C0 A8 1A 3C 4B C6 DA C5   9B 2E E0 3B 3F F5 20 1E  ...<K......;?. .
#     0060: AF 70 C0 05 B5 27 75 8C   D7 C9 D1 27 57 EF ED 62  .p...'u....'W..b
#     0070: 23 45 8E 75 61 90 51 E8   A3 93 3B 35 52 5E C4 C0  #E.ua.Q...;5R^..
#     0080: 96 38 C0 27 E9 02 21 F4   97 0D 43 CF A7 D8 8F 37  .8.'..!...C....7
#     0090: C1 34 33 44 0B FB 6E 90   AD 56 40 30 BC 28 8F FF  .43D..n..V@0.(..
#     00A0: B6 93 4A 41 B0 90 B6 43   43 7E 36 2D 09 50 C0 FC  ..JA...CC.6-.P..
#     00B0: C6 3E 21 1F 4A 1B 90 5C   9A 64 17 36 7E 06 E4 66  .>!.J..\.d.6...f
#     00C0: C8 40 43 22 E2 05 D5 7F   D9 67 04 19 72 98 5F 5C  .@C".....g..r._\
#     00D0: 97 F7 28 4C C3 11 AF C7   BF 53 DC 0F 9E A0 9E 29  ..(L.....S.....)
#     00E0: F9 A9 F6 87 DA 2E 70 5C   AA 6C 93 3F F3 21 38 2F  ......p\.l.?.!8/
#     00F0: 0E 65 5F 0A 11 0F DF 68   D9 F7 E6 55 32 88 63 16  .e_....h...U2.c.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.119 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 27 C0 49 A0 0D D4 12 13   55 11 C6 B8 19 4B 99 27  '.I.....U....K.'
#     0010: 3C E4 5D 7D 3F 19 7A 9B   0C BE 0B 30 9D 8F B1 84  <.].?.z....0....
#     0020: 46 35 46 F9 C4 AF 77 3A   55 80 0C B1 8F 36 07 0B  F5F...w:U....6..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.119 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:26.167 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "28 43 5A 07 7D 83 21 F4 A0 C9 EB A9 80 E9 7D 88 21 DF 3F FA 07 F4 7B A7 D8 6C 72 99 18 32 7C D1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 03:59:26.449 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 03:59:26.450 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 03:59:27.408; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 03:59:27.413; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 03:59:27.786; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 03:59:27.790; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 03:59:27.790; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oiOYgp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:27.824 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 34 A8 44",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:59:01.000 UTC",
#     "not  after"         : "2024-01-01 03:59:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 8D 53 97 4F 8C D6 39   D7 64 FB 51 29 C8 DE 32  ..S.O..9.d.Q)..2
#         0010: 9D 74 F4 5D                                        .t.]
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:27.829 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 3F D2 6F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:53.000 UTC",
#     "not  after"         : "2024-01-01 03:58:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:27.844 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:28.332 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.332 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:28.334 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:28.334 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.339 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.351 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.351 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:28.353 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "89 67 9F 35 3A 0A A2 A4 69 BA B2 D2 E4 DD 81 C3 63 CA 17 7F A8 C4 12 88 1B EA 82 89 44 8C AD 4E",
#   "session id"          : "D0 5B 06 27 39 A1 88 60 33 DA AC 56 91 A4 09 8A C7 48 EB 84 61 0E F0 3B 5D 8E BC 2A A4 96 FB 3B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D3 21 1B 0F 73 98 51 E7   AD C3 80 02 90 98 BB B4  .!..s.Q.........
#             0010: 29 91 1A 4D 87 29 DC FD   CB D0 1A 75 44 20 93 55  )..M.).....uD .U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.465 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 35 D2 0C 62 24 E3 F8 46 27 5C 06 D9 A1 DF 93 B1 21 D7 09 8D 37 04 5C 78 92 A0 74 9D 5A 68 53",
#   "session id"          : "D0 5B 06 27 39 A1 88 60 33 DA AC 56 91 A4 09 8A C7 48 EB 84 61 0E F0 3B 5D 8E BC 2A A4 96 FB 3B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 67 69 59 3B CE F1 49 65   8E 3E D4 68 58 4A 73 B8  giY;..Ie.>.hXJs.
#           0010: 96 1D DD 7C 03 EB ED C2   C6 3E 85 1A 94 3A 8E 14  .........>...:..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.466 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.466 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.467 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.467 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.467 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.468 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.468 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.470 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.471 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.471 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.471 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.472 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.473 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.473 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.481 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.482 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.484 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.487 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.491 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.491 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.494 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.497 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 28 EC 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:57.000 UTC",
#       "not  after"         : "2024-01-01 03:58:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 F5 0E 87 66 BA 8D C3   83 9C 8A E2 2C 62 1D B8  ....f.......,b..
#           0010: 7B 9E EB A1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.498 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:28.546 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:28.546 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:28.546 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:28.547 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.589 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "75 FE 5F 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 03:58:54.000 UTC",
#     "not  after"         : "2024-01-01 03:58:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#         0010: A7 15 37 04                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#         0010: AF 47 AE 65                                        .G.e
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.592 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: B1 BA 4E 75 87 AE A6 E1   14 F9 A2 4D BD E8 56 94  ..Nu.......M..V.
#     0010: 44 11 11 93 3E C5 2C 1A   31 03 29 6F 7E 39 26 62  D...>.,.1.)o.9&b
#     0020: 39 52 D8 54 84 0F E8 7B   FC 04 0D B9 A4 34 9E 05  9R.T.........4..
#     0030: C1 20 C0 20 E9 91 38 EE   05 80 A7 29 A4 92 58 4D  . . ..8....)..XM
#     0040: 0F 4E 16 09 82 39 C7 3E   78 54 B6 B6 9C 44 AC DE  .N...9.>xT...D..
#     0050: 61 43 E3 31 BA 41 AE A9   6D DF 89 E5 2F 7D 22 AF  aC.1.A..m.../.".
#     0060: 07 EE AE E7 68 E5 F6 60   A3 95 BA 4A BC 34 CE 0E  ....h..`...J.4..
#     0070: 4B 22 32 45 1D 1C F9 FB   B2 A4 77 10 80 E2 C0 5F  K"2E......w...._
#     0080: 61 A3 51 C5 D8 B6 F1 C4   B8 90 B3 70 68 A4 40 97  a.Q........ph.@.
#     0090: 48 79 CD FF 32 34 FC 97   C5 56 D9 EA 8F C7 24 B1  Hy..24...V....$.
#     00A0: B2 0A B8 72 D5 5D 03 C1   3F D7 BF 63 D8 0C AA 03  ...r.]..?..c....
#     00B0: 22 1F 7C 3B 07 91 4F A3   72 7C D5 C6 C3 D0 B6 CC  "..;..O.r.......
#     00C0: 15 72 2C 25 FD E1 EE E3   9E C1 D0 DB F8 CD 3A 6C  .r,%..........:l
#     00D0: E8 0E DF CD EB ED 68 3E   62 7F CE 42 EB 29 68 4F  ......h>b..B.)hO
#     00E0: 0A 24 E7 A4 1F EE 70 0B   EE 13 38 BA 87 20 C0 4F  .$....p...8.. .O
#     00F0: E1 6E 6A B9 BC 6D 10 E3   06 4D 63 8F AA 9A 0E E0  .nj..m...Mc.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.594 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DC 4B 01 FE 4B E5 ED 56   03 4C 12 F2 09 5C 44 52  .K..K..V.L...\DR
#     0010: 11 BC 4E E1 FC 60 82 A4   B8 B7 6F 74 F4 95 1B 90  ..N..`....ot....
#     0020: D2 92 D7 AB 3D 22 B0 C7   2B 47 D5 94 70 99 A7 9C  ....="..+G..p...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.597 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:28.598 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.598 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:28.599 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.599 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 03:59:28.599 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:28.600 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.600 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.603 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 34 A8 44",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:59:01.000 UTC",
#       "not  after"         : "2024-01-01 03:59:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 8D 53 97 4F 8C D6 39   D7 64 FB 51 29 C8 DE 32  ..S.O..9.d.Q)..2
#           0010: 9D 74 F4 5D                                        .t.]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 FE 5F 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:54.000 UTC",
#       "not  after"         : "2024-01-01 03:58:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#           0010: A7 15 37 04                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.630 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 82 92 B3 52 C7 30 E0 42   E9 D5 2D D3 E0 54 18 19  ...R.0.B..-..T..
#     0010: C6 05 D2 E5 FC 95 BB 2A   CD 5F 11 81 36 47 58 7D  .......*._..6GX.
#     0020: 88 04 19 3C 5A 71 43 49   2E F9 CC EB 60 8F 69 63  ...<ZqCI....`.ic
#     0030: FC 59 87 D8 6F 5F E5 76   CB B1 B6 6B 51 29 0D FD  .Y..o_.v...kQ)..
#     0040: B5 11 84 C6 ED CA 6F F2   46 19 6C 1A 3F 00 EE D3  ......o.F.l.?...
#     0050: 56 33 9B C8 10 84 D0 06   5A C2 7E 62 C8 9C C8 5D  V3......Z..b...]
#     0060: 90 E1 2E B6 C4 94 35 17   D3 0A BC 53 F5 E4 ED 42  ......5....S...B
#     0070: 09 CE B1 B5 22 24 D2 96   43 D6 E3 69 97 D5 A5 84  ...."$..C..i....
#     0080: 43 1C 35 B9 99 05 F0 14   14 BD 83 C2 86 A9 BF 7C  C.5.............
#     0090: 72 1B 13 AE 5E 0E 77 69   BD DB 52 22 5F B2 95 91  r...^.wi..R"_...
#     00A0: 4C B1 8E FC D2 16 A4 A7   E8 04 83 9E 2D F9 DA C6  L...........-...
#     00B0: 8C 86 C5 9D D1 63 A8 70   A6 B8 E9 C9 22 E6 98 FB  .....c.p...."...
#     00C0: C4 0C C2 84 2F 70 20 BA   CA EF 59 F7 6E BC 0A 77  ..../p ...Y.n..w
#     00D0: 59 29 0B 19 1D E1 4D C6   9D 60 27 D1 9C 7D 43 D1  Y)....M..`'...C.
#     00E0: F9 CD 56 03 E5 ED C7 C1   7C FF A5 36 9D 3D A3 F3  ..V........6.=..
#     00F0: 9B 1B 74 C2 AC 6B B1 33   43 AC 12 4E 44 3F 5D 12  ..t..k.3C..ND?].
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.631 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 B0 EB 00 A1 AE 86 DD   ED 06 CD 40 B8 E7 3D FD  ...........@..=.
#     0010: F2 D2 57 9B 40 BA 72 60   B5 8F 40 F2 F8 05 C8 C0  ..W.@.r`..@.....
#     0020: 67 86 BD 2C 3D 20 EF 63   43 74 02 F1 A3 9B 59 23  g..,= .cCt....Y#
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.632 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:28.684 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "23 C7 D7 54 D3 BC A1 9B BB 0F 0F 01 9F AF F0 18 F2 8B E5 11 20 F5 6E 06 26 A0 5E 7D 26 15 E9 6F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 03:59:28.978 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 03:59:28.981 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 03:59:40.275; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:40.636 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 3F D2 6F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:53.000 UTC",
#       "not  after"         : "2024-01-01 03:58:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#           0010: A7 15 37 04                                        ..7.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 FE 5F 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 03:58:54.000 UTC",
#       "not  after"         : "2024-01-01 03:58:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 96 6A 54 57 EC 2C A5   52 1D 76 46 41 EE A9 E0  ..jTW.,.R.vFA...
#           0010: A7 15 37 04                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F 97 81 EA 33 DC 7F 8F   85 9F 46 31 5A 92 32 EA  ?...3.....F1Z.2.
#           0010: AF 47 AE 65                                        .G.e
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 03:59:40.653 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:41.003 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:41.004 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:41.004 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 03:59:41.004 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:41.162 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.162 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:41.164 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 03:59:41.165 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.183 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.183 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.183 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 03:59:41.186 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C2 62 C2 06 5F C7 81 F1 82 12 F4 AD 04 57 FA D4 2A 90 EF 4A 5D FA BA 02 D2 49 20 41 38 DD 7E 44",
#     "session id"          : "D5 1B 08 A9 EF 81 7A 1D BC F5 0E 09 66 5C 09 48 6C 19 C7 82 CF 41 90 46 4F 6F 3E F1 B6 08 FD 42",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5C 97 96 85 01 F4 34 EA   8F A8 E4 11 F7 C5 46 C4  \.....4.......F.
#               0010: DE A2 7F 68 FD 15 13 F3   A5 99 7B 3E D2 4E 06 77  ...h.......>.N.w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.205 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F0 9E DB E2 D1 FB F0 5B 02 4F 5D FB C7 B6 AF 95 1D 0D B4 4A 4D B0 98 34 AF 7F AF 3A BA B0 F9 78",
#     "session id"          : "D5 1B 08 A9 EF 81 7A 1D BC F5 0E 09 66 5C 09 48 6C 19 C7 82 CF 41 90 46 4F 6F 3E F1 B6 08 FD 42",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 A1 3A 01 63 EF BB 2C   8C 9E 9B 3B C8 A4 04 AE  e.:.c..,...;....
#             0010: 63 7C 7A 88 E1 F3 33 B1   B9 0E 6F 2F 12 84 51 5D  c.z...3...o/..Q]
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.206 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.206 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.207 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.208 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.208 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.210 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.211 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.211 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.219 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.221 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.222 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.226 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.226 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.226 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.226 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.227 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:41.227 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 03:59:41.227 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 03:59:41.229 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 04:01:00.797 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 04:01:00.842 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 04:01:00.842 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 04:01:00.842 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 04:01:00.842 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35190/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28380ms
ok 65 stop command for single port in 31107ms
ok 66 status detects locally running solr in 14340ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2169ms
ok 69 copying files around in 6610ms
ok 70 upconfig in 2626ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1209ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1198ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 5s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m30.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5596 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5596/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36603/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-03 00:02:59.709; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 00:02:59.714; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-03 00:03:00.653; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-03 00:03:00.692; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22980ms
ok 61 start solr with client truststore and security manager in 25902ms
not ok 62 start solr with mTLS needed in 58565ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-WbdVcD/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36603.
#
# Started Solr server on port 36603 (pid=200421). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36604.
#
# Started Solr server on port 36604 (pid=200839). Happy searching!
#
# INFO  - 2023-10-03 00:04:24.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 00:04:24.556; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 00:04:24.923; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 00:04:24.926; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 00:04:24.926; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:24.959 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 0D E6 AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:04:00.000 UTC",
#     "not  after"         : "2024-01-01 24:04:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 6A 10 15 BC 32 1A 29   8C 84 E3 6B 0D 46 52 2E  .j...2.)...k.FR.
#         0010: 96 8B 19 B7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:24.963 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 7D 62 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:52.000 UTC",
#     "not  after"         : "2024-01-01 24:03:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:24.977 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:25.068 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:25.069 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:25.069 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:25.069 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:25.215 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:25.217 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:25.217 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.223 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.234 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.234 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.235 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:25.237 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "86 D7 C9 93 1E 89 55 4B F7 68 EE 4D C9 5B DB 50 EF 72 C3 AB CF BF 15 A6 5F 3B 40 67 6F 66 0A 96",
#   "session id"          : "D1 9D 67 48 6E 8A 2B 42 A7 85 DE 95 B8 09 CA 33 4E 61 3F 2F D3 C2 58 C7 0C 47 76 B2 AF 10 62 5E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A4 FF AA 81 99 15 C5 4E   9C C8 F0 AE EA D1 56 EF  .......N......V.
#             0010: 36 88 3C B7 54 E0 BF 7F   E1 31 12 24 EB 22 1C 2E  6.<.T....1.$."..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.358 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 3B 10 E6 C2 FC 9E 0B 0E D6 45 40 E4 80 45 00 AC 31 0F CF 27 7E AA 61 2C A3 CC 3C 47 DE DE 95",
#   "session id"          : "D1 9D 67 48 6E 8A 2B 42 A7 85 DE 95 B8 09 CA 33 4E 61 3F 2F D3 C2 58 C7 0C 47 76 B2 AF 10 62 5E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 F1 7E 91 3D 5F A2 87   4D 87 F9 58 B3 8E 67 61  ....=_..M..X..ga
#           0010: 2F B0 87 B8 49 99 7F 13   82 64 BF 31 C4 61 98 3A  /...I....d.1.a.:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.358 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.358 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.359 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.360 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.362 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.362 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.363 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.364 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.375 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.378 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.383 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.383 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.384 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.385 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.387 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.387 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.387 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.388 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.389 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.393 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D DC CE 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:56.000 UTC",
#       "not  after"         : "2024-01-01 24:03:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 80 F9 62 E9 D1 DE B5   B9 1A 20 23 5A 8D 20 FF  Q..b...... #Z. .
#           0010: B8 25 66 F9                                        .%f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.394 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.475 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.479 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 8D F9 78 2B BF 56 B2   BA F9 EB 51 67 05 B9 12  l..x+.V....Qg...
#     0010: 61 04 0D E7 04 67 05 96   92 F7 35 87 ED 4F 92 6B  a....g....5..O.k
#     0020: B5 F3 45 22 A0 33 FC 3B   F9 5F 37 02 02 8E 0C 6F  ..E".3.;._7....o
#     0030: EA C9 2E 6E 3F 97 1E FE   E6 0B 25 1C 6C 82 18 90  ...n?.....%.l...
#     0040: 4C F9 2E 3C 05 F0 B8 A5   F3 F2 0E 78 74 5A 4A C5  L..<.......xtZJ.
#     0050: 1F 7E 59 0F 4C 11 42 B5   B1 98 D4 37 55 2E E7 ED  ..Y.L.B....7U...
#     0060: 7E FD B4 90 B0 80 20 75   52 2C 2D 78 7A 09 F5 42  ...... uR,-xz..B
#     0070: 25 8B 39 7D D4 75 42 FC   2C 4C 64 80 EC AE A2 DA  %.9..uB.,Ld.....
#     0080: FA FF CA 0B 94 7E ED 1E   BC 50 9F 8E 17 83 24 73  .........P....$s
#     0090: 0A FB 3B F7 31 DD 64 9F   40 59 70 82 6E C0 0F 09  ..;.1.d.@Yp.n...
#     00A0: A1 1C 54 F0 AF EB 1E A5   CB 8B 8D B0 FD E3 50 69  ..T...........Pi
#     00B0: D8 59 41 97 9B 92 99 8A   B3 89 C6 EC 05 DF F2 D6  .YA.............
#     00C0: 7A 8C 10 CB 3B 64 9C FF   FB 54 6D EF BB 65 BE 00  z...;d...Tm..e..
#     00D0: 15 3E E0 42 5D 76 DB 97   46 45 B1 22 FF 65 AC 34  .>.B]v..FE.".e.4
#     00E0: FB A0 98 79 91 32 65 3A   B7 83 85 68 2E C0 0F 3A  ...y.2e:...h...:
#     00F0: B7 AF EB 4D A4 1E C8 99   D0 E5 C2 0F D4 E8 0B FF  ...M............
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.481 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC FB C6 E5 54 83 8F A0   2A 3B EA 01 93 91 EF E4  ....T...*;......
#     0010: 51 41 04 61 A2 3E CF E1   7E B9 19 18 9F 7D 7E 1D  QA.a.>..........
#     0020: AA 4F 72 D1 1D 6D 50 81   F8 E6 74 E3 5C FA 96 74  .Or..mP...t.\..t
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.483 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:25.484 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.484 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:25.485 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.485 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:25.485 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:25.485 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.486 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.488 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 0D E6 AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:04:00.000 UTC",
#       "not  after"         : "2024-01-01 24:04:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 6A 10 15 BC 32 1A 29   8C 84 E3 6B 0D 46 52 2E  .j...2.)...k.FR.
#           0010: 96 8B 19 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 66 A5 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:54.000 UTC",
#       "not  after"         : "2024-01-01 24:03:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#           0010: 9D 20 E6 B5                                        . ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.515 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 0B 8A 73 E1 C3 13 AE   F0 C3 56 70 FC B2 28 7F  ...s......Vp..(.
#     0010: A2 0F 66 86 B1 03 9F C9   D8 B8 83 83 23 13 86 FF  ..f.........#...
#     0020: 9D 81 24 BF 0A E6 05 51   DA 65 8D 1F 3B 53 02 8F  ..$....Q.e..;S..
#     0030: 91 60 9C 67 3B BC C1 2E   53 1E FC 61 9D 47 2C 94  .`.g;...S..a.G,.
#     0040: 19 9F A3 FA 13 6B 15 20   F9 A3 E1 51 B1 C1 E8 1C  .....k. ...Q....
#     0050: 58 FB F8 50 6D F1 1E 62   2F 7D C6 08 49 45 69 21  X..Pm..b/...IEi!
#     0060: 1E 8B 42 1A 9D AF 38 C0   BE 84 7C DF E8 DA A0 27  ..B...8........'
#     0070: 2F 0D FF 5D 30 C2 5F 62   A2 89 87 67 A7 1D FC D0  /..]0._b...g....
#     0080: 17 59 1F 5F C7 9C DB 58   B9 2E CB 21 33 A9 F6 2B  .Y._...X...!3..+
#     0090: AF 8C 05 81 9A 3A 79 B6   FD 32 13 E2 41 BB B0 23  .....:y..2..A..#
#     00A0: 9B 69 A7 97 7B 9B 82 60   35 85 0F A3 9E AC 48 95  .i.....`5.....H.
#     00B0: E1 7A AD 2E BB 44 43 80   1C C9 86 02 96 F3 F3 05  .z...DC.........
#     00C0: FA 84 38 DF 2E AF FD CE   F7 51 46 3D 3F 20 C1 4D  ..8......QF=? .M
#     00D0: D6 C3 C8 FF 61 0B 7D 7E   78 B1 67 F2 FE A3 86 0D  ....a...x.g.....
#     00E0: AF D2 6F 71 1D 3A E4 3A   20 92 F6 51 36 D3 80 4B  ..oq.:.: ..Q6..K
#     00F0: BA 97 E6 05 8F 28 37 10   EC 92 C5 0C E3 F6 5E 60  .....(7.......^`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.516 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B 3E 01 AD B9 8A 7C 7D   23 58 3F 5C 19 35 9A 36  ;>......#X?\.5.6
#     0010: C3 B6 C8 C8 8C 54 46 24   99 52 59 F7 EB B4 C5 02  .....TF$.RY.....
#     0020: 26 D8 43 F8 54 AF 89 CF   59 10 B2 61 1A 50 41 34  &.C.T...Y..a.PA4
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.517 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:25.572 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B4 99 F3 72 97 C2 01 60 C8 B0 C4 21 99 FC BD 63 08 32 4B E3 24 12 AE 49 31 E5 F1 39 50 53 60 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 24:04:25.856 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 24:04:25.857 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-03 00:04:26.823; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-03 00:04:26.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-03 00:04:27.200; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 00:04:27.203; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-03 00:04:27.203; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WbdVcD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:27.236 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 0D E6 AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:04:00.000 UTC",
#     "not  after"         : "2024-01-01 24:04:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 6A 10 15 BC 32 1A 29   8C 84 E3 6B 0D 46 52 2E  .j...2.)...k.FR.
#         0010: 96 8B 19 B7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:27.241 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 7D 62 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:52.000 UTC",
#     "not  after"         : "2024-01-01 24:03:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:27.256 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:27.751 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:27.753 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:27.754 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.759 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.771 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.771 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.772 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:27.774 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F9 23 97 13 BD 60 C5 20 FE 1C 62 31 BB EB CA 38 BC 73 F7 FB 9A DB 7E 93 5A 94 D9 E8 0D 35 D5 AC",
#   "session id"          : "81 74 73 18 84 C9 9B B7 5A C4 A2 DE 70 76 3A B4 15 66 E6 76 D7 4C 47 AF CD 29 DF E8 D0 79 85 A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 87 54 37 3A 25 6D B6   47 7F D3 E9 DE 7B 8B 1C  ..T7:%m.G.......
#             0010: 57 B4 95 86 94 0F 5A 0E   AF A0 E4 BB EE 5A 9B 24  W.....Z......Z.$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.887 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 B1 C6 93 9F 39 1E 51 AE C9 5D B5 B2 3D C7 6E D8 17 64 5A 86 3C F7 A0 C8 AC 3D 09 5F F6 5E 78",
#   "session id"          : "81 74 73 18 84 C9 9B B7 5A C4 A2 DE 70 76 3A B4 15 66 E6 76 D7 4C 47 AF CD 29 DF E8 D0 79 85 A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6D FA B5 AB 68 83 E5 54   2E 6D BC 67 FF F4 2B 62  m...h..T.m.g..+b
#           0010: 07 FB 99 75 B5 D6 E4 91   84 2D A8 A4 E8 8A 89 2B  ...u.....-.....+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.888 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.888 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.890 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.890 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.892 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.892 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.892 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:27.894 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:27.894 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.901 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.902 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.903 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.907 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:27.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.910 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.910 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.910 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.911 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.911 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.912 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:27.912 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.915 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D DC CE 52",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:56.000 UTC",
#       "not  after"         : "2024-01-01 24:03:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 80 F9 62 E9 D1 DE B5   B9 1A 20 23 5A 8D 20 FF  Q..b...... #Z. .
#           0010: B8 25 66 F9                                        .%f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:27.915 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:27.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:27.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:27.963 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:27.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.000 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 66 A5 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-03 24:03:54.000 UTC",
#     "not  after"         : "2024-01-01 24:03:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#         0010: 9D 20 E6 B5                                        . ..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#         0010: 0A 41 21 1A                                        .A!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.004 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 BA B2 B4 68 4E B1 06   EB BB EF 49 BD B8 C1 81  "...hN.....I....
#     0010: 8E 29 DB 0A BE 91 D2 E9   78 64 B9 4A 15 22 B6 1B  .)......xd.J."..
#     0020: C7 75 4B 86 4C 2A 21 87   0D 72 46 E4 AE 6A E8 3F  .uK.L*!..rF..j.?
#     0030: 28 84 D5 17 51 A9 47 DB   B2 2C 3F 5C 11 AD 20 F4  (...Q.G..,?\.. .
#     0040: CB EB 23 60 E4 5F 5C E2   AA 27 13 88 AB 22 FA CE  ..#`._\..'..."..
#     0050: 52 D2 F6 63 94 85 7D 37   F8 C5 BA 4D AF B4 52 95  R..c...7...M..R.
#     0060: 60 CC 84 91 8A A4 91 40   49 84 0D C5 19 63 35 36  `......@I....c56
#     0070: 02 28 4A 1E 36 91 DF 8E   3E E2 81 C0 86 32 8C DE  .(J.6...>....2..
#     0080: BA C4 DF A9 0F D6 0A 09   64 CC FA 60 92 6B 2A 34  ........d..`.k*4
#     0090: 2C CA B4 31 5F 78 85 C8   4B AE 2D 1E 70 16 43 97  ,..1_x..K.-.p.C.
#     00A0: A6 C0 30 72 E0 E1 FF 7B   43 DF 94 77 3D 1A 85 39  ..0r....C..w=..9
#     00B0: 74 33 79 1F 41 5C 6A BF   BF 76 AF 64 F1 3E DF 8B  t3y.A\j..v.d.>..
#     00C0: 24 CC 2F CD E4 5D 58 99   18 99 00 3C 02 AC 92 B0  $./..]X....<....
#     00D0: 58 3E 69 1A 12 E6 DE D6   4E 3F DA FC B9 4B DB 35  X>i.....N?...K.5
#     00E0: F9 3E DF 9A C6 22 2B 67   A5 A5 F6 B7 28 3C C2 01  .>..."+g....(<..
#     00F0: 30 0C A0 E3 50 7A 5A 55   DD 00 E1 0E AF 99 A9 0D  0...PzZU........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.006 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 07 C0 B1 3B AE D8 1D 40   DC 58 78 20 11 13 2D 2F  ...;...@.Xx ..-/
#     0010: D2 C4 49 CB 36 4D DC 12   95 DA 84 99 CA C7 37 6F  ..I.6M........7o
#     0020: DE 58 0E AB 6F C5 53 24   3E 81 4E A1 5F 12 8C 67  .X..o.S$>.N._..g
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.008 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:28.009 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:28.009 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:28.010 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:28.010 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-03 24:04:28.010 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:28.010 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.011 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.013 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 0D E6 AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:04:00.000 UTC",
#       "not  after"         : "2024-01-01 24:04:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 6A 10 15 BC 32 1A 29   8C 84 E3 6B 0D 46 52 2E  .j...2.)...k.FR.
#           0010: 96 8B 19 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 66 A5 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:54.000 UTC",
#       "not  after"         : "2024-01-01 24:03:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#           0010: 9D 20 E6 B5                                        . ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.039 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5B 56 F7 D7 FC 79 AA B6   63 0C 93 9F C5 FC 90 69  [V...y..c......i
#     0010: CD 62 F1 41 21 3C 88 94   A9 33 16 6B 15 94 6F 28  .b.A!<...3.k..o(
#     0020: 29 32 70 AF 7B D1 BD 25   AE 96 B0 3A 87 0D 3C C8  )2p....%...:..<.
#     0030: 41 CC 66 0F E9 F4 46 7F   E2 B8 E9 12 AA 1B 41 DD  A.f...F.......A.
#     0040: BB 73 A3 F3 FD BB 34 4F   99 87 C9 DE D6 80 64 22  .s....4O......d"
#     0050: 87 9A 1B 8A F3 C8 64 99   3F 6B 0C 5F 39 8C 1D DD  ......d.?k._9...
#     0060: 2A B8 E9 B0 1B 90 A1 08   41 0C 6E CD 79 52 06 0E  *.......A.n.yR..
#     0070: 87 50 EB F2 D8 24 1A 6A   16 16 60 D4 CF 61 7D 10  .P...$.j..`..a..
#     0080: 6D B3 94 66 4C EC FC 0A   8B 36 D0 AE A2 02 50 43  m..fL....6....PC
#     0090: A8 98 8D 1C CA EE 35 07   AB 29 2C B8 06 5A EB B8  ......5..),..Z..
#     00A0: 69 97 83 DB 4B CA E5 17   A0 5C B7 9D CD 90 0A 16  i...K....\......
#     00B0: DC 9B 72 08 D9 B1 01 3A   EF A2 61 3C 85 14 A7 CF  ..r....:..a<....
#     00C0: 5B 71 67 E3 96 D3 20 AC   D3 50 F1 31 0F 28 83 C9  [qg... ..P.1.(..
#     00D0: 76 CD 3A EC 01 34 76 C6   BA 76 2C DE 7C 20 D2 8A  v.:..4v..v,.. ..
#     00E0: 03 26 A2 A6 30 BC DA 5A   EB 34 D5 AB 6E 40 52 64  .&..0..Z.4..n@Rd
#     00F0: DB D6 44 8D 7B DF 18 2D   C6 3F 94 E0 02 40 A0 08  ..D....-.?...@..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.040 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B 04 89 E9 F8 33 7F 7A   68 6C 1D 52 85 FD 11 B3  .....3.zhl.R....
#     0010: F4 33 8B 0F E6 F2 3B 6B   C4 A4 02 65 D2 CC 3D 04  .3....;k...e..=.
#     0020: 43 B0 42 C3 9B 1F 40 1C   2E 77 7D 12 FE D4 68 F6  C.B...@..w....h.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:28.041 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|1D|h2sc-1-thread-2|2023-10-03 24:04:28.109 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "97 95 8D 13 59 4B 77 D1 17 ED 64 49 CE CD 33 22 35 0A 1D D3 F8 A5 CC 68 96 16 58 D5 0C 81 F5 EB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-03 24:04:28.376 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-03 24:04:28.377 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-03 00:04:40.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:40.947 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E 7D 62 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:52.000 UTC",
#       "not  after"         : "2024-01-01 24:03:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#           0010: 9D 20 E6 B5                                        . ..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 66 A5 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-03 24:03:54.000 UTC",
#       "not  after"         : "2024-01-01 24:03:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 CF 8D 52 9E 1E 61 EC   AA 2A 03 0D 21 97 8B 1D  (..R..a..*..!...
#           0010: 9D 20 E6 B5                                        . ..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 29 8C B3 A2 36 94 0B   EB 72 37 70 E7 A7 35 02  .)...6...r7p..5.
#           0010: 0A 41 21 1A                                        .A!.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-03 24:04:40.964 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:41.292 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:41.304 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:41.304 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:04:41.304 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:41.466 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:41.468 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-03 24:04:41.469 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.475 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.487 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-03 24:04:41.490 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6F 11 DB 23 8A 75 43 6C 59 C5 69 5D A3 32 1E DD BC E5 62 06 71 11 8D DD 7E 54 78 E1 28 AE 01 11",
#     "session id"          : "62 00 B7 10 01 24 AF 18 52 70 E4 C4 E8 69 6F 82 3F 74 CE 08 C3 0F 21 11 F6 E3 10 B5 A9 CD 6D B8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 15 64 2D C6 E6 64 F2 F7   A2 C7 AA B0 20 77 B4 C5  .d-..d...... w..
#               0010: D2 89 A9 96 A7 14 71 25   B3 97 77 DF 54 C8 A9 01  ......q%..w.T...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.510 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "33 CE E6 86 F2 1F DB 6E 1D 93 00 A7 34 4F 9C B0 F1 08 CA 59 E4 CE A2 5C AF 72 FD E3 F6 62 6E 3A",
#     "session id"          : "62 00 B7 10 01 24 AF 18 52 70 E4 C4 E8 69 6F 82 3F 74 CE 08 C3 0F 21 11 F6 E3 10 B5 A9 CD 6D B8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4C 66 1C 62 FB 9A 20 30   0A 61 86 9B 1F C6 DB 3A  Lf.b.. 0.a.....:
#             0010: 04 74 F3 08 08 DD A4 4C   C2 7F D8 AA D4 6F 81 0E  .t.....L.....o..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.511 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.511 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.513 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.515 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.516 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.518 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.525 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.527 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.528 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.532 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.532 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.532 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.532 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.533 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:41.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:04:41.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-03 24:04:41.535 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sche

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-03 24:06:02.846 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:06:02.893 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:06:02.894 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:06:02.894 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-03 24:06:02.894 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36604/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28512ms
ok 65 stop command for single port in 31271ms
ok 66 status detects locally running solr in 14391ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2184ms
ok 69 copying files around in 6641ms
ok 70 upconfig in 2645ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1207ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 31s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m56.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5595 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5595/

All tests passed

Build Log:
[...truncated 1319 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43441/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 21:58:14.504; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 21:58:14.511; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 21:58:15.419; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 21:58:15.458; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23347ms
ok 61 start solr with client truststore and security manager in 25073ms
not ok 62 start solr with mTLS needed in 59189ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-R3KwQN/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43441.
#
# Started Solr server on port 43441 (pid=199232). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43442.
#
# Started Solr server on port 43442 (pid=199688). Happy searching!
#
# INFO  - 2023-10-02 21:59:39.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 21:59:39.370; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 21:59:39.743; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 21:59:39.746; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 21:59:39.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:39.779 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 88 9D 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:15.000 UTC",
#     "not  after"         : "2023-12-31 21:59:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 84 58 23 73 67 ED E4   A8 30 71 4C DF 0A F7 3A  ..X#sg...0qL...:
#         0010: 50 CD 05 8A                                        P...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:39.784 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 4B D6 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:07.000 UTC",
#     "not  after"         : "2023-12-31 21:59:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:39.798 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:39.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:39.893 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:39.893 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:39.893 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:40.039 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.039 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:40.041 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:40.041 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.058 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.058 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:40.061 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DB B1 EB 18 45 ED E2 FD C5 EA 99 9B 0F F3 14 14 81 0A 62 31 B9 14 D9 B8 87 98 EC 9E 75 0C 35 9D",
#   "session id"          : "05 D6 BF 6E A5 35 7E 91 7E 78 E2 E7 C8 90 35 9B 75 3A F3 38 90 58 44 6C EC 5D A4 86 19 DC 91 05",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 42 A8 3C 21 F6 AE B5 86   8F 16 D7 BE 84 96 85 FB  B.<!............
#             0010: 19 DF C1 73 F4 89 E3 7D   2B 66 9B 8D 14 45 EF 26  ...s....+f...E.&
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.199 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D8 FF B2 B4 18 86 56 3B 6A 70 97 CE A9 D7 F2 02 F5 79 64 83 26 A0 49 71 C1 82 48 7D 6B B2 3A 2C",
#   "session id"          : "05 D6 BF 6E A5 35 7E 91 7E 78 E2 E7 C8 90 35 9B 75 3A F3 38 90 58 44 6C EC 5D A4 86 19 DC 91 05",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4F FF 81 1B 96 4D 48 F3   D2 59 F7 4F 3B 6B 9A 3E  O....MH..Y.O;k.>
#           0010: A1 0B 53 5A 5B A8 99 63   45 77 08 6E 6A 00 9A 61  ..SZ[..cEw.nj..a
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.199 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.199 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.200 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.201 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.203 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.203 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.205 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.205 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.212 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.214 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.215 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.218 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.219 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.219 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.219 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.219 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.222 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.222 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.222 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.223 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.224 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.224 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.224 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.227 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 EE 76 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:11.000 UTC",
#       "not  after"         : "2023-12-31 21:59:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 24 0D F7 B4 DE BB CB   78 C9 D4 79 C9 3E 78 C0  .$......x..y.>x.
#           0010: AE 9C F2 70                                        ...p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.228 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.305 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.308 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 9D CE 32 A8 31 13 08   2C D7 1D 20 20 FC 88 A7  F..2.1..,..  ...
#     0010: 9F 90 E4 70 2A 29 0A E7   8A CB CA D1 1F 00 6A 4D  ...p*)........jM
#     0020: CC 59 1F 3F 22 7B E1 7A   47 BB D0 BA 1B 78 13 A7  .Y.?"..zG....x..
#     0030: 83 1F 45 AD 22 3E 21 9E   97 E2 62 BC C7 99 13 A7  ..E.">!...b.....
#     0040: 52 90 39 3E FB 60 53 8C   FF 5B 06 50 87 B2 A0 D6  R.9>.`S..[.P....
#     0050: 56 01 4A BE 04 FC 54 ED   22 FA F3 5A 0A 2B 65 A0  V.J...T."..Z.+e.
#     0060: BF ED CF 49 C5 23 E8 B5   AF 75 6C 61 A7 20 0C 22  ...I.#...ula. ."
#     0070: DF B7 D7 4F 73 E2 5D 18   55 2F 6A 8D 9B 2B 54 4C  ...Os.].U/j..+TL
#     0080: 85 7D 68 3E 61 B4 E2 86   CB C1 54 86 50 D7 C9 1A  ..h>a.....T.P...
#     0090: 4D F1 16 87 9B 8B 2B A4   7A 5E F4 C0 A9 AC C8 3C  M.....+.z^.....<
#     00A0: A5 8F 66 DD F6 79 0C 54   B8 C2 CA 02 79 8B FD 25  ..f..y.T....y..%
#     00B0: BB 1B 71 48 A3 84 25 F2   3A 83 CE D9 D1 F0 66 68  ..qH..%.:.....fh
#     00C0: 5C 59 02 5E AE 69 E8 62   D5 F9 6A 4E F7 6C A7 0B  \Y.^.i.b..jN.l..
#     00D0: 5F 80 1A D6 4C 42 8D 12   8D D2 93 AE 5D 7E EF 5F  _...LB......].._
#     00E0: AB 2C EF C2 C7 B6 7F 0F   0D 69 12 3C 0F FB 16 5B  .,.......i.<...[
#     00F0: 04 25 A4 EB A7 4C 2E F8   31 70 8E C5 5D AD D7 77  .%...L..1p..]..w
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.310 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 74 B7 27 85 0F 4E D6   57 4C C9 FA 89 21 76 91  .t.'..N.WL...!v.
#     0010: F8 9D 33 38 BD 7C A6 CE   83 27 4B 01 D6 5A D0 58  ..38.....'K..Z.X
#     0020: BA 26 DB 98 0D 19 9A 3D   63 5F A0 7D 2F 78 7B 93  .&.....=c_../x..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.312 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:40.313 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.313 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:40.314 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.314 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:40.314 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:40.314 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.315 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.317 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 88 9D 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:15.000 UTC",
#       "not  after"         : "2023-12-31 21:59:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 84 58 23 73 67 ED E4   A8 30 71 4C DF 0A F7 3A  ..X#sg...0qL...:
#           0010: 50 CD 05 8A                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 2C 2B D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:08.000 UTC",
#       "not  after"         : "2023-12-31 21:59:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#           0010: 3F 14 F0 F3                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.342 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A5 2A E8 9E 6B B5 B7 FD   7E D4 AC F1 01 5D 2C 79  .*..k........],y
#     0010: 58 23 25 80 9C D0 F4 B4   B8 47 29 93 C9 7F 79 51  X#%......G)...yQ
#     0020: 68 4D C1 67 D7 F1 70 D8   6F 9A 39 CF EF F3 DC 66  hM.g..p.o.9....f
#     0030: 9A 71 69 A5 70 FA D4 ED   9B 44 A3 FD 3B BE 26 B5  .qi.p....D..;.&.
#     0040: 65 76 96 8D 7B DC C9 6C   FB 39 BB 94 A5 32 22 AE  ev.....l.9...2".
#     0050: E9 8C 1A 99 14 18 5C B1   3D 2F D6 E4 60 F3 93 7A  ......\.=/..`..z
#     0060: A3 9B F6 43 59 C0 F8 9E   A1 EE 71 0D 34 68 41 25  ...CY.....q.4hA%
#     0070: C6 6B 1C 1B 09 76 41 01   E5 AC 90 A7 51 3A 02 07  .k...vA.....Q:..
#     0080: AE 04 F9 CF E4 4D 0A 55   DB 64 5D E0 19 82 6B CE  .....M.U.d]...k.
#     0090: E3 F4 60 58 61 D2 3F 93   34 02 C7 12 90 4F AC D8  ..`Xa.?.4....O..
#     00A0: 80 14 BE 73 7D DB 87 70   1E BD 73 4C 16 4D 63 66  ...s...p..sL.Mcf
#     00B0: B6 3A 1B 13 26 27 00 2C   27 A6 36 C2 BF A9 7F 03  .:..&'.,'.6.....
#     00C0: EC 1C 73 95 03 82 D5 80   B5 27 4F 03 A6 93 9C 2E  ..s......'O.....
#     00D0: 24 53 FF 7D F9 2D 82 7D   BD B6 B0 77 39 B2 3C 58  $S...-.....w9.<X
#     00E0: 4C E9 30 75 31 56 90 FA   B7 BF 3A 21 F7 90 FB E1  L.0u1V....:!....
#     00F0: 49 AD 30 62 BC 1A AA 4E   1D C5 B6 27 D5 BB 71 D9  I.0b...N...'..q.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.343 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 3F 82 30 23 E8 C7 87   90 EF 14 3C 25 75 97 1B  .?.0#......<%u..
#     0010: 59 59 76 3E 0E C7 C2 E8   24 65 88 73 A2 EC B8 16  YYv>....$e.s....
#     0020: 71 BF 38 D9 0E 2A BB 86   54 77 6D 2F 8F 7F F7 7F  q.8..*..Twm/....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.344 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:40.392 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CA 2B E9 F1 ED 71 BB 8C C7 EC 62 9B 41 A3 A1 9C 46 0B DA 76 38 C4 44 2A D6 5A 33 20 B8 20 F6 50",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 21:59:40.685 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 21:59:40.686 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 21:59:41.629; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 21:59:41.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 21:59:42.013; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 21:59:42.016; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 21:59:42.016; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-R3KwQN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:42.048 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 88 9D 21",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:15.000 UTC",
#     "not  after"         : "2023-12-31 21:59:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 84 58 23 73 67 ED E4   A8 30 71 4C DF 0A F7 3A  ..X#sg...0qL...:
#         0010: 50 CD 05 8A                                        P...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:42.052 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 4B D6 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:07.000 UTC",
#     "not  after"         : "2023-12-31 21:59:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:42.066 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:42.292 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.293 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:42.295 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:42.295 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.300 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.312 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.312 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.312 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:42.315 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "74 CB F7 56 C8 F6 6E 89 7C 1C 87 66 AC 0D 5C 51 DE 79 85 DA 98 DD 41 35 CC 60 4F B0 1D BB D7 63",
#   "session id"          : "01 64 3C 1A 98 18 84 60 60 63 28 08 2F 8C DB 74 51 2A 4D EC 4B 96 C9 E5 D4 94 2C 1E 7F FA C3 5F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 74 CD BA AD 9A 7A 16 45   5C 41 20 33 B1 4F DC D8  t....z.E\A 3.O..
#             0010: B2 00 CC B0 64 09 63 01   FA 9C 0B 53 EA 47 D5 76  ....d.c....S.G.v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.436 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3A AD E9 F6 9A 2F F3 24 73 A4 FC 79 2B 35 C9 BC DE C8 FA 89 99 30 19 96 FF 94 75 8E 1E AB 5A 49",
#   "session id"          : "01 64 3C 1A 98 18 84 60 60 63 28 08 2F 8C DB 74 51 2A 4D EC 4B 96 C9 E5 D4 94 2C 1E 7F FA C3 5F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CB 0C 79 E0 30 4D 22 63   F2 41 B8 5F 7D A3 04 93  ..y.0M"c.A._....
#           0010: 0E A4 40 52 A9 91 20 51   8C B6 36 CA A0 DA AE 49  ..@R.. Q..6....I
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.436 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.436 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.437 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.437 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.439 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.440 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.441 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.441 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.442 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.443 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.450 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.451 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.452 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.456 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.456 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.456 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.457 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.459 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.459 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.459 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.460 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.460 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.461 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.461 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.464 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 EE 76 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:11.000 UTC",
#       "not  after"         : "2023-12-31 21:59:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 24 0D F7 B4 DE BB CB   78 C9 D4 79 C9 3E 78 C0  .$......x..y.>x.
#           0010: AE 9C F2 70                                        ...p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.464 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:42.505 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:42.505 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:42.505 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:42.505 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.541 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 2C 2B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 21:59:08.000 UTC",
#     "not  after"         : "2023-12-31 21:59:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#         0010: 3F 14 F0 F3                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#         0010: A8 80 03 E1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.545 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C2 FC 67 04 AE DF E4 CC   5F AB F7 59 F5 0C 6B 6D  ..g....._..Y..km
#     0010: C8 69 3F 55 5C CE 3B BB   C7 EF F5 D9 37 FD 69 F1  .i?U\.;.....7.i.
#     0020: 3B 5C FC 8C 55 E9 C2 89   94 25 45 C9 D0 C6 7D 13  ;\..U....%E.....
#     0030: 90 BD 28 5C FE 51 AD 75   66 F4 65 D8 AA EB CA D4  ..(\.Q.uf.e.....
#     0040: D6 3F D6 34 B6 39 C0 6F   91 C8 5F 33 27 C1 9E 90  .?.4.9.o.._3'...
#     0050: B4 2E 99 33 E2 CA 3D 98   E7 21 41 85 30 D7 28 84  ...3..=..!A.0.(.
#     0060: 18 06 81 29 C2 64 1D CE   C7 78 61 76 C1 7F A7 B8  ...).d...xav....
#     0070: 89 F2 91 19 0D 00 49 11   07 70 02 AF C5 FA 34 BB  ......I..p....4.
#     0080: 76 E4 B7 7A DD 36 E3 26   31 82 18 5A 10 09 6F 06  v..z.6.&1..Z..o.
#     0090: 8F C6 3F 76 4F FF 2E 91   B1 87 8D E0 BD 68 B6 1E  ..?vO........h..
#     00A0: 49 C4 C0 98 9B 44 CA 15   6E 28 6A C7 11 ED 37 BD  I....D..n(j...7.
#     00B0: 7E 1F 90 80 67 EA 25 5E   8B BB 42 4A 04 E5 FD 33  ....g.%^..BJ...3
#     00C0: 72 F2 D8 41 7F 71 F5 9D   59 BB E3 FF 2B 3B C0 D7  r..A.q..Y...+;..
#     00D0: 6B 20 32 54 94 41 13 D1   33 F7 FB 20 03 B9 64 43  k 2T.A..3.. ..dC
#     00E0: 64 00 06 5E 5D F8 5B 30   A7 5E 91 38 A3 74 EC 04  d..^].[0.^.8.t..
#     00F0: AA FF 4D 4D 08 66 D1 10   A3 D6 A3 E7 42 E9 D0 74  ..MM.f......B..t
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.547 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 87 50 FE E6 FF B7 F7   F0 0B 1D 52 99 72 DD C8  ..P........R.r..
#     0010: DD A4 2D DB 9A 6C F2 9B   EB 18 2F 4B 5D A4 98 EB  ..-..l..../K]...
#     0020: 24 20 A0 59 88 6D 20 38   C5 77 1A 38 23 10 BF 87  $ .Y.m 8.w.8#...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.549 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:42.551 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.551 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:42.551 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.551 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 21:59:42.551 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:42.552 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.552 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.555 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 88 9D 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:15.000 UTC",
#       "not  after"         : "2023-12-31 21:59:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 84 58 23 73 67 ED E4   A8 30 71 4C DF 0A F7 3A  ..X#sg...0qL...:
#           0010: 50 CD 05 8A                                        P...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 2C 2B D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:08.000 UTC",
#       "not  after"         : "2023-12-31 21:59:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#           0010: 3F 14 F0 F3                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.581 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 9F 9D D0 EF 2C 8C 7C   9D C5 80 5F 6C 31 3C 97  .....,....._l1<.
#     0010: 0A 8C 46 50 AB 88 3A 6F   EE A9 A9 A5 A9 42 9B DA  ..FP..:o.....B..
#     0020: DC 63 BE 9E 52 1B E2 D5   F3 1A D3 0F 59 2C 0C 0E  .c..R.......Y,..
#     0030: DA A2 EA 42 E9 0E 75 33   49 05 B9 8A C0 36 77 B6  ...B..u3I....6w.
#     0040: 71 32 3A 1E D8 B1 28 57   DB 54 F9 63 56 EF 26 BC  q2:...(W.T.cV.&.
#     0050: 73 4B 73 B8 E2 70 80 F0   96 80 F1 54 7A FC 04 DD  sKs..p.....Tz...
#     0060: 19 B4 4F F0 FB 2A 11 8B   EF 1A E1 A2 7F 70 3F 31  ..O..*.......p?1
#     0070: D6 22 2E C8 E3 AE DE 1D   21 15 73 39 6A 64 44 57  ."......!.s9jdDW
#     0080: 9E F1 F2 2F FE 23 C0 7C   93 63 69 C4 09 7A 5A E0  .../.#...ci..zZ.
#     0090: 44 03 84 97 20 3E F9 44   CC F8 46 93 48 D5 BE 8E  D... >.D..F.H...
#     00A0: 2D C4 4B E5 CD 0B D0 04   EB A8 DE 1A F8 73 64 03  -.K..........sd.
#     00B0: 46 56 99 22 B1 A6 57 9D   5D 2C DC A3 2E 88 B4 2C  FV."..W.],.....,
#     00C0: 21 06 3C CE 2A 9C 14 5F   22 3F 7D EC E6 9A CD 12  !.<.*.._"?......
#     00D0: 35 17 0C 01 1C 0D 15 23   74 87 65 69 C2 D7 3A 66  5......#t.ei..:f
#     00E0: 98 1F 10 E0 32 39 DB 03   C1 35 4E 04 0A 68 8F BC  ....29...5N..h..
#     00F0: 0D 61 F4 93 1F CD CD F1   09 25 B2 6A 04 5C DC 30  .a.......%.j.\.0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.582 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 96 8E EE B9 83 4F 1C B4   CC 25 1C 86 E2 F9 80 90  .....O...%......
#     0010: A0 62 DF 1F 34 1D 62 D8   7F BF 7A D5 59 FD 96 16  .b..4.b...z.Y...
#     0020: 54 E2 E9 D8 1F C9 07 20   66 6E 2D C5 3A D3 A5 4D  T...... fn-.:..M
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.582 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:42.631 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 BF 20 EE CA A9 94 2C A0 74 34 85 B6 A3 00 DF 65 70 3A 93 83 C4 86 BC F3 38 6A 72 36 35 56 58",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 21:59:42.909 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 21:59:42.910 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 21:59:54.281; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:54.623 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 4B D6 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:07.000 UTC",
#       "not  after"         : "2023-12-31 21:59:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#           0010: 3F 14 F0 F3                                        ?...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 2C 2B D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 21:59:08.000 UTC",
#       "not  after"         : "2023-12-31 21:59:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE EE 88 88 BF 0B 0F 1F   DA 46 F8 E1 07 F3 A5 D0  .........F......
#           0010: 3F 14 F0 F3                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9E F0 79 35 D4 0D C1 E9   59 52 83 ED 6B 1A 93 B3  ..y5....YR..k...
#           0010: A8 80 03 E1                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 21:59:54.639 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:54.731 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:54.732 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:54.733 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 21:59:54.733 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:54.874 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:54.876 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 21:59:54.876 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.881 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.894 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 21:59:54.896 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "1E D8 22 8C F4 EE 98 D5 CC BE AA 59 52 16 75 3A 2E 45 25 37 83 4E 61 EE 1F 2B 11 19 C3 B0 DC 52",
#     "session id"          : "68 D4 0E 71 D8 3D C2 0D 15 CF A8 99 28 82 72 D9 95 98 40 EF F3 80 45 81 82 37 0C 1C E8 8B DB 93",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 35 ED 3C 5A 34 EA 9C B6   AD 86 B0 9C A7 99 28 89  5.<Z4.........(.
#               0010: 58 3F E1 5C 98 45 B8 62   1A 6E 67 D9 E1 7A 32 73  X?.\.E.b.ng..z2s
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.916 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B5 04 2F 8D 21 00 C1 E7 27 2F 5F A4 1B 24 44 06 EB 79 DE 60 12 61 D1 15 E4 67 74 C2 0F 76 02 06",
#     "session id"          : "68 D4 0E 71 D8 3D C2 0D 15 CF A8 99 28 82 72 D9 95 98 40 EF F3 80 45 81 82 37 0C 1C E8 8B DB 93",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 45 99 59 E0 0B B9 57 86   B6 94 C5 70 25 ED AE EB  E.Y...W....p%...
#             0010: F0 02 34 5C EE E8 AB 47   49 6C 7A F1 E9 01 BA 19  ..4\...GIlz.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.917 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.917 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.918 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.918 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.919 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.922 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.922 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.922 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.923 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:54.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:54.924 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.924 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.925 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.934 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.936 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.937 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:54.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 21:59:54.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 21:59:54.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sche

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 22:01:16.392 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 22:01:16.446 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 22:01:16.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 22:01:16.447 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 22:01:16.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43442/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28545ms
ok 65 stop command for single port in 31491ms
ok 66 status detects locally running solr in 14451ms
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2207ms
ok 69 copying files around in 6747ms
ok 70 upconfig in 2696ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 24m 44s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 25m11s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5594 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5594/

All tests passed

Build Log:
[...truncated 1329 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42387/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 16:34:18.890; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 16:34:18.895; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 16:34:19.771; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 16:34:19.808; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22545ms
ok 61 start solr with client truststore and security manager in 25753ms
not ok 62 start solr with mTLS needed in 57952ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-mKHmvB/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42387.
#
# Started Solr server on port 42387 (pid=200826). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42388.
#
# Started Solr server on port 42388 (pid=201252). Happy searching!
#
# INFO  - 2023-10-02 16:35:42.904; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 16:35:42.909; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 16:35:43.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 16:35:43.304; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 16:35:43.304; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:43.334 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 B1 1A 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:19.000 UTC",
#     "not  after"         : "2023-12-31 16:35:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F D3 ED 95 94 CA F1 24   65 8A D3 B5 CD C2 93 BC  .......$e.......
#         0010: 8D 94 C3 23                                        ...#
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:43.338 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 9E 81 61",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:11.000 UTC",
#     "not  after"         : "2023-12-31 16:35:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:43.351 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:43.533 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.533 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:43.535 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:43.535 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.540 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.550 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.551 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.551 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:43.553 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED 14 EF 5D B8 9C EF B6 5F D7 84 4B DD F9 76 36 A2 9D 82 B2 2D A3 56 73 90 13 BC 63 E2 17 FD 77",
#   "session id"          : "FE 78 A8 8B B0 E6 6B 46 A4 9D D8 90 1E B5 CC 34 1A 3B 7F 35 38 8D E1 F2 1E F2 C5 87 EB F7 BC BA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AD 86 75 5E 62 CE 36 95   B6 80 04 49 F2 B0 28 B9  ..u^b.6....I..(.
#             0010: EA 12 9B 82 D2 61 1F 3D   96 75 6C 28 79 C8 FB 53  .....a.=.ul(y..S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.662 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "29 B3 8E 25 46 02 38 D8 65 15 93 40 D1 EF 6E 37 75 92 B1 FF 17 CF 21 9B 7D 3B A8 77 B0 78 3F 43",
#   "session id"          : "FE 78 A8 8B B0 E6 6B 46 A4 9D D8 90 1E B5 CC 34 1A 3B 7F 35 38 8D E1 F2 1E F2 C5 87 EB F7 BC BA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AD 50 61 BB 22 45 EA D1   68 9F DE 27 60 CE FB FF  .Pa."E..h..'`...
#           0010: BB 8B 86 26 70 A9 EE 90   0A 1C EB 16 B3 3E 92 7C  ...&p........>..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.662 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.663 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.664 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.666 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.666 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.667 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.675 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.676 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.677 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.682 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.683 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.683 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.683 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.684 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.684 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.685 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.685 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.688 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 00 C4 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:15.000 UTC",
#       "not  after"         : "2023-12-31 16:35:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 71 8A 7B 7A 3A 44 07   83 AE B4 DB 27 CD 8E A4  .q..z:D.....'...
#           0010: 2B DA E8 08                                        +...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.688 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:43.738 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:43.740 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:43.740 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:43.740 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.763 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.768 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 7E 39 94 E3 BD 37 5E   D2 57 95 AE 55 33 63 F2  -.9...7^.W..U3c.
#     0010: EB 3B A1 A2 9E 6A B0 21   B7 5B A4 81 40 6A 0C 74  .;...j.!.[..@j.t
#     0020: D9 20 C2 BE FB DC 83 E9   54 87 15 D8 EF AB E0 3B  . ......T......;
#     0030: E3 A4 22 76 29 40 C7 94   43 68 32 A2 7A 4A 01 67  .."v)@..Ch2.zJ.g
#     0040: EC 2B 61 55 CD 76 9D B3   99 26 47 2D 01 DD 05 39  .+aU.v...&G-...9
#     0050: F9 4A 2B 61 50 8B 8E 01   DB 67 58 97 8F EF A0 5A  .J+aP....gX....Z
#     0060: 33 96 07 8A 83 3C 6B 68   A3 D8 54 DB 24 7B E9 6D  3....<kh..T.$..m
#     0070: F5 F2 1C 34 D5 EA 22 A6   A4 BC ED 50 EE E7 72 08  ...4.."....P..r.
#     0080: 3B 6B 47 55 7C 50 D5 0C   FB D0 73 33 60 84 A5 53  ;kGU.P....s3`..S
#     0090: 45 FB A4 4D 2D F9 C0 8E   87 B7 E4 6F F4 FD F0 E1  E..M-......o....
#     00A0: 13 78 0B 2C 68 3A 92 A9   FF F1 7E DE 90 2A 97 F8  .x.,h:.......*..
#     00B0: F2 BF 16 7A D7 83 E4 D3   BA F2 3C DB 4C 71 17 0B  ...z......<.Lq..
#     00C0: 31 6F A9 26 1E 65 51 B1   74 F5 C4 CE 81 BA 99 4F  1o.&.eQ.t......O
#     00D0: 61 3C D3 78 83 97 17 0A   C5 10 8C BD CD A2 14 C1  a<.x............
#     00E0: 22 66 1C 57 66 4D F4 AC   92 43 F5 9E B9 D6 43 2D  "f.WfM...C....C-
#     00F0: BE 5C 12 CF 68 10 A1 2A   C8 4F 19 82 7E EA 68 95  .\..h..*.O....h.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.770 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 38 5A 57 1B 54 23 30   C7 D5 80 57 42 0D A0 1C  .8ZW.T#0...WB...
#     0010: 20 24 4D D8 1B DB A7 C8   96 E4 D3 6D 55 2A 15 90   $M........mU*..
#     0020: 04 D6 6A 96 48 8C C9 F8   0E 83 5B 41 DA 8F 08 C2  ..j.H.....[A....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.772 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:43.773 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.773 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:43.773 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.773 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:43.774 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:43.774 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.774 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.777 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 B1 1A 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:19.000 UTC",
#       "not  after"         : "2023-12-31 16:35:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F D3 ED 95 94 CA F1 24   65 8A D3 B5 CD C2 93 BC  .......$e.......
#           0010: 8D 94 C3 23                                        ...#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 74 9A C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:13.000 UTC",
#       "not  after"         : "2023-12-31 16:35:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#           0010: 02 9B 44 D7                                        ..D.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.802 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D 57 17 F4 0B 69 56 87   13 D8 E0 76 8A F4 D8 D3  mW...iV....v....
#     0010: E8 F1 32 56 0C AC F2 DB   B0 B9 81 58 48 B6 32 1D  ..2V.......XH.2.
#     0020: D5 AA 88 83 51 F5 AA 43   61 E0 AF DC BC 58 B4 DB  ....Q..Ca....X..
#     0030: 97 FF 31 AC 5C D1 EF 1B   9F A1 49 18 5A ED 58 42  ..1.\.....I.Z.XB
#     0040: 86 5F 97 83 A3 AA 7B 4B   36 59 0F BC B5 36 11 A7  ._.....K6Y...6..
#     0050: 25 AF A7 C9 A9 11 53 79   0D 40 7A E7 88 C2 9D 95  %.....Sy.@z.....
#     0060: 06 6E F8 2B 5F B9 50 53   58 CD 53 F1 FB 06 88 D4  .n.+_.PSX.S.....
#     0070: A2 1A BD A5 48 2C 81 43   CB AE 1A 82 7F 88 2B 1A  ....H,.C......+.
#     0080: EC 84 51 14 AB 1E DF BD   46 7C 67 8B EA C2 25 FE  ..Q.....F.g...%.
#     0090: 0A F7 5A 83 EA BA 72 A9   20 C0 39 03 48 58 5A 08  ..Z...r. .9.HXZ.
#     00A0: B0 3D D3 E9 42 4B 75 D2   0A 0D 9E 8D B7 BB 2A 18  .=..BKu.......*.
#     00B0: 34 6F B5 08 6E 69 A0 62   A1 A8 2E C9 6B 31 85 29  4o..ni.b....k1.)
#     00C0: 9C 6A EC 1C F8 1A 3B 4C   25 31 D8 F9 EB 45 B9 FB  .j....;L%1...E..
#     00D0: 35 BA DC E0 42 14 DC 86   D8 73 75 C9 FB 44 E4 F6  5...B....su..D..
#     00E0: 4E 37 05 7E 50 7C 55 43   5B D8 87 1E DA 01 92 F9  N7..P.UC[.......
#     00F0: 10 98 8C D7 16 AA C0 73   2F 99 65 22 26 71 DE AF  .......s/.e"&q..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.803 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 D7 71 28 24 EF D9 00   1A 3B 09 4E E1 CB 27 81  ..q($....;.N..'.
#     0010: BD 5F 88 35 78 47 2E C2   C6 1D 17 87 86 47 DE F8  ._.5xG.......G..
#     0020: EA 35 92 EF FC 17 FF B3   8E 5F A8 A2 74 FD 26 B8  .5......._..t.&.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.804 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:43.851 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA B4 1D 2C 31 8D D9 59 FA 12 78 D4 AD 31 32 50 E8 59 7F 31 15 9A 53 F3 8E 21 05 D9 61 D8 90 98",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 16:35:44.131 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 16:35:44.132 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 16:35:45.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 16:35:45.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 16:35:45.420; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 16:35:45.422; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 16:35:45.423; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mKHmvB/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:45.453 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 B1 1A 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:19.000 UTC",
#     "not  after"         : "2023-12-31 16:35:19.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7F D3 ED 95 94 CA F1 24   65 8A D3 B5 CD C2 93 BC  .......$e.......
#         0010: 8D 94 C3 23                                        ...#
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:45.457 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 9E 81 61",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:11.000 UTC",
#     "not  after"         : "2023-12-31 16:35:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:45.471 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:45.533 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:45.534 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:45.535 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:45.535 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:45.695 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.696 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:45.697 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:45.697 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.702 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.714 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:45.717 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "01 9E 68 FC 62 54 D5 89 FC 83 AF 5C 92 60 66 9F 33 F0 1D 94 62 10 EF A3 F3 18 82 08 45 F8 F8 75",
#   "session id"          : "D8 9C 6D 5F 64 F8 84 7E 50 9D 8A 8D A2 CD 09 47 FE ED A7 FE A6 8D 12 AD 42 A8 34 D0 E4 8E 23 F5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 95 7B 60 3C 60 05 63 27   06 D9 B0 92 85 AE 57 9A  ..`<`.c'......W.
#             0010: 99 9A CB CD 7F C8 91 DE   58 3F C0 95 38 C6 CD 16  ........X?..8...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.822 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A9 A9 35 B3 07 C3 C7 63 FF E2 91 7A DB 39 20 0F F4 CC 13 72 E2 90 9A 75 4E 9F D9 51 32 86 5C DE",
#   "session id"          : "D8 9C 6D 5F 64 F8 84 7E 50 9D 8A 8D A2 CD 09 47 FE ED A7 FE A6 8D 12 AD 42 A8 34 D0 E4 8E 23 F5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 64 74 66 D4 FE 42 77   2B F4 A8 AC 99 A8 D2 C5  `dtf..Bw+.......
#           0010: C0 CB 31 00 5C 35 CD 43   89 51 B3 E8 3D B7 AC 2C  ..1.\5.C.Q..=..,
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.823 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.824 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.826 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.826 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.826 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.827 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.834 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.836 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.837 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.840 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.840 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.841 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.843 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.843 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.843 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.843 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.844 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.845 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.845 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.848 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 00 C4 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:15.000 UTC",
#       "not  after"         : "2023-12-31 16:35:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 71 8A 7B 7A 3A 44 07   83 AE B4 DB 27 CD 8E A4  .q..z:D.....'...
#           0010: 2B DA E8 08                                        +...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.848 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.928 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 74 9A C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 16:35:13.000 UTC",
#     "not  after"         : "2023-12-31 16:35:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#         0010: 02 9B 44 D7                                        ..D.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#         0010: 3C C7 70 09                                        <.p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.931 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 1F 70 A0 5D B5 9E 10   68 AC C5 E8 AE 83 76 12  5.p.]...h.....v.
#     0010: 6E 2D CC 60 CC BE 69 2C   23 11 20 4F 61 41 66 A8  n-.`..i,#. OaAf.
#     0020: F3 55 2C 17 F6 A5 52 58   EE 08 93 1F 83 AE 4D 17  .U,...RX......M.
#     0030: DD 4E E1 23 4B 5A F7 AF   85 18 4D 66 0E 03 F1 8D  .N.#KZ....Mf....
#     0040: B2 4A CA 73 7D BD 3B 29   B6 5F BB 67 6A 2A 04 57  .J.s..;)._.gj*.W
#     0050: B1 3A F8 99 2B 41 87 09   D7 A3 43 52 F5 48 47 09  .:..+A....CR.HG.
#     0060: 7A FB 53 D1 29 ED 7B BE   A9 17 9B DA 12 1B 0A 4C  z.S.)..........L
#     0070: 27 32 2D 3E 08 F8 76 1B   AE D1 D9 CD 36 7A E6 13  '2->..v.....6z..
#     0080: 0A B8 2F 9D 53 C9 89 71   B3 CC 2E 5F 1D 18 2F B3  ../.S..q..._../.
#     0090: BC CE 98 38 85 26 B1 8D   DA 7F AE BD 68 40 E0 48  ...8.&......h@.H
#     00A0: 82 39 F2 03 84 86 C9 C2   85 32 C6 3A D7 64 59 54  .9.......2.:.dYT
#     00B0: 60 80 0F 51 BC 6F 03 C9   1E C4 52 CD 88 E5 CB 4A  `..Q.o....R....J
#     00C0: E5 33 DB FB 0F E2 B0 C6   D6 FE BE 65 EE 5E ED 9A  .3.........e.^..
#     00D0: D3 13 F8 E8 C3 D1 33 17   B2 D6 DF 31 E1 C6 15 C8  ......3....1....
#     00E0: F3 B2 02 18 71 47 B5 83   E6 48 C1 C9 1A 39 B3 BD  ....qG...H...9..
#     00F0: C1 DD E5 C9 13 D8 A5 20   50 59 B8 FC 69 AB 69 44  ....... PY..i.iD
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.933 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 74 9E 51 B4 B4 70 E4 BE   48 BC D5 6F F1 5E 90 FA  t.Q..p..H..o.^..
#     0010: D9 CE F9 48 BD 1A 08 68   4D 00 CA 7E AE AB F6 BF  ...H...hM.......
#     0020: BD 1E A3 C0 EA CF 6F 7A   35 8F 2B B8 07 FD 20 B7  ......oz5.+... .
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.936 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:45.936 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.937 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:45.937 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.937 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 16:35:45.937 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:45.937 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.938 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.940 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 B1 1A 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:19.000 UTC",
#       "not  after"         : "2023-12-31 16:35:19.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7F D3 ED 95 94 CA F1 24   65 8A D3 B5 CD C2 93 BC  .......$e.......
#           0010: 8D 94 C3 23                                        ...#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 74 9A C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:13.000 UTC",
#       "not  after"         : "2023-12-31 16:35:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#           0010: 02 9B 44 D7                                        ..D.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.965 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E 4E 81 52 FF 58 EA F9   4E 1C 2A 67 5E 10 08 10  .N.R.X..N.*g^...
#     0010: EA 1B D6 57 89 82 E3 61   22 36 A1 DF 45 41 2B A8  ...W...a"6..EA+.
#     0020: B2 6E 8A BF BF 54 AB 95   89 3A D0 3E 90 7B B1 DC  .n...T...:.>....
#     0030: 4A 73 82 D1 09 34 D1 9B   33 54 3E 7B E7 73 44 23  Js...4..3T>..sD#
#     0040: 77 14 A4 AF D5 0C F8 17   3D 91 04 52 CA 9E 0D 37  w.......=..R...7
#     0050: 57 39 45 12 89 86 0F 80   8B B6 24 70 F2 76 BE D1  W9E.......$p.v..
#     0060: 1D E4 C7 30 81 49 B3 48   96 FE 88 70 B6 D7 AA E4  ...0.I.H...p....
#     0070: 47 55 6E A8 78 93 62 D5   AF 8E 02 85 C4 D4 1B 91  GUn.x.b.........
#     0080: 78 73 9B DF A0 16 4C 5D   85 F5 E9 47 78 BD D2 8B  xs....L]...Gx...
#     0090: 14 A8 FA 16 E4 79 FD 6B   9A 7B F4 C5 E5 AC 48 71  .....y.k......Hq
#     00A0: C0 19 64 36 6B DB C6 6B   0D CB 8D A8 6E 1B D3 43  ..d6k..k....n..C
#     00B0: 04 D5 10 DA 6D FD BD 5A   E4 AD 6C F9 B2 F4 2E 96  ....m..Z..l.....
#     00C0: 99 57 C4 D2 E9 BE 04 41   20 FA ED ED CC 49 84 BE  .W.....A ....I..
#     00D0: F7 3B 7C 4E 25 C9 1F C2   6F D9 EB 7C 05 32 F4 08  .;.N%...o....2..
#     00E0: E2 F1 C7 AD 97 4C 73 47   A7 02 76 3D B9 CF 94 F8  .....LsG..v=....
#     00F0: 69 00 35 8F 80 FB 10 B4   30 83 A3 02 C2 82 85 DE  i.5.....0.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.966 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 DC 5D CA 3D 92 22 C2   9D B0 18 C0 87 3A A8 2F  ".].=."......:./
#     0010: BA D9 FD 55 05 16 77 3A   C1 3C 9F F4 75 A1 C6 EE  ...U..w:.<..u...
#     0020: BE 3B AD A8 77 4A 4D A2   F4 45 7A 3F B2 B3 36 D2  .;..wJM..Ez?..6.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:45.967 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:46.014 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "15 1E 3F 84 DC 74 73 21 58 D6 1F FE 6A BB CB F7 DC E2 C1 B7 2F 54 E3 13 4E B0 EA 6B A2 7A 35 23",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 16:35:46.278 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 16:35:46.279 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 16:35:57.033; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:57.342 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 74 9A C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:13.000 UTC",
#       "not  after"         : "2023-12-31 16:35:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#           0010: 02 9B 44 D7                                        ..D.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 51 35 72 B6 61 74 AE F1   FA 06 8A 6A B2 81 A4 68  Q5r.at.....j...h
#           0010: 3C C7 70 09                                        <.p.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 9E 81 61",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 16:35:11.000 UTC",
#       "not  after"         : "2023-12-31 16:35:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 97 B1 C3 61 07 10 A0   F7 3D 86 BB A2 BA C7 FC  ....a....=......
#           0010: 02 9B 44 D7                                        ..D.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 16:35:57.357 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:57.455 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:57.456 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:57.456 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:35:57.457 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:57.593 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.593 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:57.595 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 16:35:57.595 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.611 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 16:35:57.613 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "65 96 B3 48 70 59 04 1C 5F 50 A7 71 63 2A 9E DE 77 39 3A C5 56 28 85 12 84 0B 12 10 1E 90 8C 03",
#     "session id"          : "C6 7F FF 6B 8B 37 4C 3A 71 B7 B1 44 91 04 70 64 26 06 40 0F 0E B7 C3 54 58 46 9D 90 54 D8 B9 76",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 05 72 40 58 54 2A 4D EE   42 14 2D AA 92 10 E3 B1  .r@XT*M.B.-.....
#               0010: 0E DA C7 1B 80 EE F2 2C   1D 4E 71 50 E4 1B 59 08  .......,.NqP..Y.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.631 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "25 3D 82 A0 BD 84 02 67 F2 82 4C 36 99 11 B8 19 7C FC BC 2F 06 AB 7B 9E EF 3B D3 5E 7A 0F 20 6D",
#     "session id"          : "C6 7F FF 6B 8B 37 4C 3A 71 B7 B1 44 91 04 70 64 26 06 40 0F 0E B7 C3 54 58 46 9D 90 54 D8 B9 76",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4B A3 B1 C0 90 5B AD B1   AC D4 16 A0 0E DE D7 AA  K....[..........
#             0010: 35 0C DD 9B 1B 77 23 0E   22 D2 DA 7B 73 D9 5D 41  5....w#."...s.]A
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.632 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.632 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.634 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.636 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.636 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.636 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.644 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.645 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.646 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.650 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.650 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.650 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.650 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.651 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.651 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.651 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:57.651 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:35:57.651 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 16:35:57.652 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 16:37:16.678 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:37:16.719 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:37:16.720 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:37:16.720 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 16:37:16.720 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42388/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28321ms
ok 65 stop command for single port in 30637ms
ok 66 status detects locally running solr in 14605ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2164ms
ok 69 copying files around in 6516ms
ok 70 upconfig in 2591ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1200ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1211ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 6s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m41.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5593 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5593/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33959/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 13:29:16.189; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 13:29:16.194; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 13:29:17.410; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 13:29:17.450; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22637ms
ok 61 start solr with client truststore and security manager in 25265ms
not ok 62 start solr with mTLS needed in 56135ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-e8NVZO/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33959.
#
# Started Solr server on port 33959 (pid=197921). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33960.
#
# Started Solr server on port 33960 (pid=198373). Happy searching!
#
# INFO  - 2023-10-02 13:30:40.375; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 13:30:40.380; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 13:30:40.754; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 13:30:40.758; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 13:30:40.758; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:40.792 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A A9 AA 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:16.000 UTC",
#     "not  after"         : "2023-12-31 13:30:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 60 11 45 1F 3E 8C 8C   7C 65 05 C1 CA 5A 95 A8  0`.E.>...e...Z..
#         0010: 3F FD 5C 4B                                        ?.\K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:40.796 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 C2 E4 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:08.000 UTC",
#     "not  after"         : "2023-12-31 13:30:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:40.811 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:41.298 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.298 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:41.300 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:41.301 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.306 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.318 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:41.321 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4F B6 16 9F 9A FE 89 A5 C2 4D AB A3 1D 11 B1 7B 27 15 DD ED B7 C8 15 5F 28 6D 5F 6F E3 4B CD 74",
#   "session id"          : "C3 2A 69 DA 71 35 48 15 5D 8F 7C 4C 8A 18 44 D7 82 AE 6F 66 20 36 3C 7C 7D 5D CD 22 80 4B 05 77",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 39 64 B0 96 2F 61 32   48 76 16 8B 5F 58 A8 77  .9d../a2Hv.._X.w
#             0010: 33 B7 F4 32 73 24 40 AA   36 CA DF 5F 6B 08 A2 6A  3..2s$@.6.._k..j
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.455 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1B 1A D0 11 1A E1 36 97 43 AE 12 A9 88 9D E1 1D 41 67 88 FF 12 74 C2 8B F2 5C 56 96 4B A6 04 6D",
#   "session id"          : "C3 2A 69 DA 71 35 48 15 5D 8F 7C 4C 8A 18 44 D7 82 AE 6F 66 20 36 3C 7C 7D 5D CD 22 80 4B 05 77",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 58 C9 C2 E2 D9 EB 88 CF   7E E1 6F 02 03 68 27 6D  X.........o..h'm
#           0010: BB 86 4E 01 57 6F 50 BF   B2 43 AA DD 7A 3C 33 39  ..N.WoP..C..z<39
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.456 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.456 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.457 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.457 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.457 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.458 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.458 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.458 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.458 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.458 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.460 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.460 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.461 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.461 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.462 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.470 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.471 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.473 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.476 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.476 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.479 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.479 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.480 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.480 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.481 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.481 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.481 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.484 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A E5 62 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:12.000 UTC",
#       "not  after"         : "2023-12-31 13:30:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 AC 2D 89 FC B1 05 3A   E5 C8 4F 38 ED 34 50 79  t.-....:..O8.4Py
#           0010: 6A D9 DE 06                                        j...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.485 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:41.543 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:41.545 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:41.546 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:41.546 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.582 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.585 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A6 67 13 4D 67 84 3E 10   9B 1C EE 7E 73 C5 CB 97  .g.Mg.>.....s...
#     0010: 0E 2F 28 49 79 2C 93 1C   08 F3 89 B5 F9 E4 D0 FD  ./(Iy,..........
#     0020: 82 A3 72 E2 94 23 7E 96   F1 01 2B FB 5D 42 19 AB  ..r..#....+.]B..
#     0030: CC 41 99 8E 79 0E F2 F2   4E E5 A8 EF 9F D8 5D 79  .A..y...N.....]y
#     0040: 40 E7 2F 8B 92 C8 32 F9   72 81 58 EA 4F 02 59 93  @./...2.r.X.O.Y.
#     0050: A7 02 01 9D 44 3F 60 CC   28 FA 21 8B 6C DA 1C 28  ....D?`.(.!.l..(
#     0060: CB 27 6C CC 59 8E DB 3C   F1 3B 4F F0 0E E3 D1 41  .'l.Y..<.;O....A
#     0070: 46 AB EF 21 1E 5F C1 23   8D D0 BF 30 7F 1F A1 9D  F..!._.#...0....
#     0080: 6B F6 9B D4 CC 4C 37 EF   D2 37 88 23 A6 01 EA 53  k....L7..7.#...S
#     0090: 39 8B C0 70 F4 79 79 64   70 EC 48 48 5B 54 7A 02  9..p.yydp.HH[Tz.
#     00A0: 6B 69 5C 49 EF 91 DB 65   E0 8A E5 84 EA 3C B3 AA  ki\I...e.....<..
#     00B0: 4C 5C 29 C5 5A 29 D8 16   9B 2C D4 DF 79 45 30 C8  L\).Z)...,..yE0.
#     00C0: 47 B6 69 F6 56 CB 4B 69   09 0F B8 8D B0 94 AA 81  G.i.V.Ki........
#     00D0: 62 97 69 88 A5 C1 76 7F   DD 9E E6 06 A0 1D C7 39  b.i...v........9
#     00E0: EC 02 0A 0D BE FA 78 3C   FE CB 18 38 E1 7A AC 85  ......x<...8.z..
#     00F0: 05 2C 51 A3 61 51 98 C2   58 18 B7 A8 E4 B8 F0 86  .,Q.aQ..X.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.587 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 0E D5 A9 9B 9E E1 49   B7 B5 DE 7A A2 B4 60 7D  .......I...z..`.
#     0010: 26 ED 1F 35 91 58 8C D4   47 86 E3 91 98 9C 2D B4  &..5.X..G.....-.
#     0020: FB 3E D9 56 D6 25 C6 4B   91 7E 9E 85 4C BB 38 6E  .>.V.%.K....L.8n
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.590 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:41.591 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.591 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:41.591 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.591 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:41.592 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:41.592 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.592 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.596 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A A9 AA 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:16.000 UTC",
#       "not  after"         : "2023-12-31 13:30:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 60 11 45 1F 3E 8C 8C   7C 65 05 C1 CA 5A 95 A8  0`.E.>...e...Z..
#           0010: 3F FD 5C 4B                                        ?.\K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E AF FC EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:10.000 UTC",
#       "not  after"         : "2023-12-31 13:30:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#           0010: 60 C6 00 28                                        `..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.622 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 93 59 78 29 11 15 6C CE   3F 0D 8D 44 53 EC C8 14  .Yx)..l.?..DS...
#     0010: 9A C1 7F 1C B7 52 46 77   F7 EE D9 97 AE 22 14 68  .....RFw.....".h
#     0020: 16 47 7C C2 DD 23 2A D5   27 E3 CD CE FD 8F 6D 3B  .G...#*.'.....m;
#     0030: C0 AB D2 A6 C6 62 8A F6   C7 68 1B 80 B8 33 7A 7F  .....b...h...3z.
#     0040: 4F 5A A8 B1 16 98 A5 17   72 53 61 06 1F AA A3 A0  OZ......rSa.....
#     0050: 74 32 BA CC CC 87 DF 1D   EC BA 56 D6 ED 2A 74 19  t2........V..*t.
#     0060: BF 52 5A 95 90 2D B2 A9   42 31 8C 6F E3 64 11 B9  .RZ..-..B1.o.d..
#     0070: BB F8 BD 2F B4 44 CC 7D   2E 0D 89 75 6C 7F 20 89  .../.D.....ul. .
#     0080: 07 5B 50 61 30 0F 05 48   77 5F 4D 7A 46 7A 2D C9  .[Pa0..Hw_MzFz-.
#     0090: 55 96 94 4B FB 1E 38 DB   12 AB 21 27 FC 83 18 8B  U..K..8...!'....
#     00A0: 1D B3 CD 99 73 BF 6C 79   C4 C8 98 22 80 CA 87 5C  ....s.ly..."...\
#     00B0: 65 71 6F 39 6A 36 B3 73   9F 9A D1 E7 61 61 BA 03  eqo9j6.s....aa..
#     00C0: 91 CB B0 46 82 6F 60 CB   41 00 A6 D1 8C 9A A5 E0  ...F.o`.A.......
#     00D0: 82 66 D6 6A 8F E7 1E 45   21 3B CB 96 2E 69 18 E4  .f.j...E!;...i..
#     00E0: 61 27 7A 2B 64 2C 97 F5   FF 9F C4 EB E6 EA 53 1D  a'z+d,........S.
#     00F0: 13 74 43 79 A5 A5 45 4B   84 B6 67 E9 7E 73 FF A3  .tCy..EK..g..s..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.623 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 16 32 1D 73 DB FC A2   02 8A A2 5E E8 A4 27 CA  ..2.s......^..'.
#     0010: FA 20 D9 26 B0 FF F7 09   34 A4 D0 21 E6 60 B4 41  . .&....4..!.`.A
#     0020: 46 18 D0 7E 29 E0 43 5E   B7 2A 45 E3 A1 5F 53 E9  F...).C^.*E.._S.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.624 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:41.673 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "47 2D 01 37 4D C0 5D 84 2F 7E 39 B7 BC D0 30 EC 6A 48 61 F8 CF 3C 4E 10 ED A8 86 3F 43 7F 1F 35",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 13:30:41.966 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 13:30:41.967 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 13:30:42.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 13:30:42.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 13:30:43.268; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 13:30:43.270; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 13:30:43.271; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e8NVZO/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:43.302 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A A9 AA 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:16.000 UTC",
#     "not  after"         : "2023-12-31 13:30:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 30 60 11 45 1F 3E 8C 8C   7C 65 05 C1 CA 5A 95 A8  0`.E.>...e...Z..
#         0010: 3F FD 5C 4B                                        ?.\K
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:43.306 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 C2 E4 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:08.000 UTC",
#     "not  after"         : "2023-12-31 13:30:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:43.321 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:43.407 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:43.407 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:43.407 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:30:43.407 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:43.541 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:43.543 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:43.544 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.549 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.560 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:43.562 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 FC 2D E7 FF FC DC 56 DF 37 82 32 66 05 0E 2E EC C6 81 99 86 C2 E7 29 7F 98 C3 CB B4 56 62 49",
#   "session id"          : "71 93 B7 4A 71 F6 CA D0 3D E3 56 D7 2C 3B 68 68 F0 C4 5A 3D 1D 0E 57 C9 85 E9 67 C8 48 26 FD 13",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 EA 3E 90 A5 36 C8 F7   3E CD C4 83 09 61 E5 33  ..>..6..>....a.3
#             0010: 5E E7 58 86 87 04 AF F4   F1 FD FF 09 A3 70 CE 16  ^.X..........p..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.667 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 03 5D 92 A0 D7 46 DA E7 56 FD 7C C4 E3 F7 68 E4 AC 7D 23 00 CD CE DC A1 2E F8 C9 3F 6B 05 9E",
#   "session id"          : "71 93 B7 4A 71 F6 CA D0 3D E3 56 D7 2C 3B 68 68 F0 C4 5A 3D 1D 0E 57 C9 85 E9 67 C8 48 26 FD 13",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5E E5 30 B7 30 22 F7 3C   91 55 0E 6B D1 0C 7D 8E  ^.0.0".<.U.k....
#           0010: 61 9D 44 8A 0F 13 B0 7C   8E D5 89 D5 70 5B F7 77  a.D.........p[.w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.668 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.668 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.670 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.670 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.681 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.682 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.683 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.686 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.687 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.687 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.687 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.687 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.689 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.690 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.690 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.690 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.691 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.691 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.692 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.694 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A E5 62 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:12.000 UTC",
#       "not  after"         : "2023-12-31 13:30:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 74 AC 2D 89 FC B1 05 3A   E5 C8 4F 38 ED 34 50 79  t.-....:..O8.4Py
#           0010: 6A D9 DE 06                                        j...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.695 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.779 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E AF FC EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 13:30:10.000 UTC",
#     "not  after"         : "2023-12-31 13:30:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#         0010: 60 C6 00 28                                        `..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#         0010: BF B6 F0 7B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.783 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A 83 33 88 19 86 BF 01   C7 FE FD A2 EA 7E D0 DE  ..3.............
#     0010: BE 51 04 14 D9 46 41 7D   D0 43 AD 5D F0 95 A4 77  .Q...FA..C.]...w
#     0020: 5F 88 BD 24 A3 C7 E8 2C   25 26 B8 21 BE D5 F2 C0  _..$...,%&.!....
#     0030: 78 B6 57 BD 6A A6 64 9E   03 27 41 30 AC 69 10 6C  x.W.j.d..'A0.i.l
#     0040: 59 D0 A9 3A C6 88 4D 33   46 8F 81 F8 9A EA 11 94  Y..:..M3F.......
#     0050: 2D 0E EA BE FD 62 DE EF   81 B4 B9 05 1E 21 7C 97  -....b.......!..
#     0060: DA E0 39 06 CB 10 60 18   AA 15 B4 92 5A 4F 33 D5  ..9...`.....ZO3.
#     0070: F5 3B 2F 94 C3 9A AC 56   B7 4A D6 79 AD 1A A2 DB  .;/....V.J.y....
#     0080: F1 CC E7 AD 07 21 49 F9   6F BB 70 3C 85 31 7A 51  .....!I.o.p<.1zQ
#     0090: C0 5B 60 ED 53 76 EF 25   24 1F 5E 4E B7 26 8F 2E  .[`.Sv.%$.^N.&..
#     00A0: 50 9B 99 60 41 84 0D E5   5A 78 B4 4F A5 BE 8D 7B  P..`A...Zx.O....
#     00B0: 73 E2 7D 3B A4 E2 20 04   84 FA 5E 89 47 2F DF 67  s..;.. ...^.G/.g
#     00C0: 13 BA B2 4F BF 87 94 C7   7A E4 24 0D 4B D9 8B EB  ...O....z.$.K...
#     00D0: A7 BE BB 2E 02 EB 3B A8   0D 6E 8D 42 0F E8 0B EF  ......;..n.B....
#     00E0: B0 8E 85 90 F8 4A 81 8B   ED 79 C1 0B 4A FF 04 C4  .....J...y..J...
#     00F0: 57 DA BB 5E 1B BD AA 97   F5 AB CE 99 13 8C 03 10  W..^............
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.785 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD DC F1 ED DF 13 35 A5   DF 4A 78 72 5B 58 18 B9  ......5..Jxr[X..
#     0010: 8C 69 05 8C BD FD 7B F8   D5 9B 5D 51 C1 25 BF D3  .i........]Q.%..
#     0020: 51 A6 E1 44 45 BF D1 EC   AB 47 A4 0C 1D 7A 27 0C  Q..DE....G...z'.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.787 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:43.788 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.788 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:43.788 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.788 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 13:30:43.789 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:43.789 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.789 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.792 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A A9 AA 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:16.000 UTC",
#       "not  after"         : "2023-12-31 13:30:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 30 60 11 45 1F 3E 8C 8C   7C 65 05 C1 CA 5A 95 A8  0`.E.>...e...Z..
#           0010: 3F FD 5C 4B                                        ?.\K
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E AF FC EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:10.000 UTC",
#       "not  after"         : "2023-12-31 13:30:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#           0010: 60 C6 00 28                                        `..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.818 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 92 64 D7 DA FE A9 C5   9D 42 81 69 57 7C 83 96  ..d......B.iW...
#     0010: 2D C7 76 17 D1 6B 6F B7   F2 C6 33 5E B1 42 35 5B  -.v..ko...3^.B5[
#     0020: B3 8F 7B 3C C7 10 65 E8   B6 7E C1 95 0F B1 88 FA  ...<..e.........
#     0030: 8E CD 0A 08 D2 E3 E9 09   F1 BC F2 C1 E7 24 81 14  .............$..
#     0040: F4 03 97 FB 9E 59 33 8F   59 82 3E 2C FD E2 EC 83  .....Y3.Y.>,....
#     0050: AB 64 FE 70 15 9A D0 A6   02 8E 13 A2 62 0C A4 D2  .d.p........b...
#     0060: 4F D9 0B 7A BD 3B 81 16   4F C6 F4 00 51 17 26 40  O..z.;..O...Q.&@
#     0070: 04 14 9F 11 1D 19 35 36   76 EB B2 69 33 AD F4 72  ......56v..i3..r
#     0080: D5 E0 E0 44 F0 37 70 3D   41 83 96 5A 73 5C 74 0B  ...D.7p=A..Zs\t.
#     0090: 79 25 3A 07 32 2C 8D 30   F1 CE 61 24 B1 7A A5 A9  y%:.2,.0..a$.z..
#     00A0: 1E 0E 43 45 51 C2 AE 04   0C CF 7D 02 D1 7A 65 40  ..CEQ........ze@
#     00B0: EE 43 F8 E0 D0 F3 03 C6   57 6A A5 D5 97 73 4B EC  .C......Wj...sK.
#     00C0: DB 60 20 F4 1E 47 89 38   2C 86 8D 94 FA B4 5E BA  .` ..G.8,.....^.
#     00D0: A5 61 D8 08 1B 2F BD 66   BC 38 52 0A FE 37 FB 5D  .a.../.f.8R..7.]
#     00E0: 73 7B 25 C5 56 D9 CB 94   C0 88 FA 90 81 E0 86 61  s.%.V..........a
#     00F0: 22 CF 4F 2C B8 84 43 22   1B 3C 0C 83 35 C2 C5 F9  ".O,..C".<..5...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.819 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC C7 00 72 56 84 D9 45   C4 B2 10 A9 65 25 A5 53  ...rV..E....e%.S
#     0010: 3D B3 C5 2D 02 68 04 C9   63 AE DD 3C D1 E5 03 D9  =..-.h..c..<....
#     0020: 0C D5 92 F7 3F 49 59 C1   E5 21 AA 36 66 89 F9 97  ....?IY..!.6f...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.820 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:43.868 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA 72 D2 CC E5 CC 07 A6 CF E7 03 9F BB 3B 48 B6 FB 73 9C 37 BB 75 0E 29 31 07 FA C4 85 FB F7 67",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 13:30:44.157 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 13:30:44.158 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 13:30:54.836; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:55.157 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E AF FC EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:10.000 UTC",
#       "not  after"         : "2023-12-31 13:30:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#           0010: 60 C6 00 28                                        `..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE A7 62 39 90 17 2A CC   E2 50 AE CE 21 94 6A C2  ..b9..*..P..!.j.
#           0010: BF B6 F0 7B                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 C2 E4 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 13:30:08.000 UTC",
#       "not  after"         : "2023-12-31 13:30:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 5B CE F6 3B 4A 1C C1   F9 0F 73 45 73 90 09 72  %[..;J....sEs..r
#           0010: 60 C6 00 28                                        `..(
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 13:30:55.172 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:55.398 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.399 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:55.400 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 13:30:55.401 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.405 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.416 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.417 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 13:30:55.419 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "7C 76 7E 16 96 3A C6 E3 EB 2E 95 1D 77 81 25 FE 35 EB AB 46 46 8A 87 65 68 7C A6 3A 4F 8D E6 36",
#     "session id"          : "4B 0A 8F 80 AF 79 78 1A BF C8 E2 35 C9 99 A2 39 01 31 FD D8 33 F3 41 E6 3D 43 32 D4 A0 EB CA 33",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 28 97 71 22 34 08 55 31   F4 57 0B B3 81 B7 99 7B  (.q"4.U1.W......
#               0010: DC 6E AC 81 44 DE 84 3D   52 C5 49 FB EC CE 57 20  .n..D..=R.I...W
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.439 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "FE E5 D0 D6 58 4C 47 39 8B 12 0B E7 19 A1 1A 9E C6 4E CC 4B BD 62 FF F3 17 3E 5E D0 58 9C D9 A4",
#     "session id"          : "4B 0A 8F 80 AF 79 78 1A BF C8 E2 35 C9 99 A2 39 01 31 FD D8 33 F3 41 E6 3D 43 32 D4 A0 EB CA 33",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9E CF 5D 98 3E 55 9B 6B   33 0B CB 16 4A 05 A2 FE  ..].>U.k3...J...
#             0010: E2 85 09 A6 65 C9 4F 69   0F 55 3F 8A 5F C5 8C 3A  ....e.Oi.U?._..:
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.440 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.440 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.441 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.442 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.444 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.445 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:55.446 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:55.446 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.446 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.453 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.454 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.455 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.459 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.459 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.459 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.460 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:55.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:30:55.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 13:30:55.461 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 13:32:14.954 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:32:14.995 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:32:14.995 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:32:14.995 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 13:32:14.995 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33960/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28332ms
ok 65 stop command for single port in 31308ms
ok 66 status detects locally running solr in 14345ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2174ms
ok 69 copying files around in 6576ms
ok 70 upconfig in 2603ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1198ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1207ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 33s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m1.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5592 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5592/

1 tests failed.
FAILED:  org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod

Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=302, name=zkConnectionManagerCallback-170-thread-1-EventThread, state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
        at app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:558)
        at app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
        at app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
        at app//org.apache.solr.cloud.ZkController$$Lambda$503/0x000000084039f040.command(Unknown Source)
        at app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
        at app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
        at app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)

Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=302, name=zkConnectionManagerCallback-170-thread-1-EventThread, state=BLOCKED, group=TGRP-TestLeaderElectionZkExpiry]
        at app//org.apache.solr.common.cloud.ZkStateReader.createClusterStateWatchersAndUpdate(ZkStateReader.java:558)
        at app//org.apache.solr.cloud.ZkController.onReconnect(ZkController.java:435)
        at app//org.apache.solr.cloud.ZkController.lambda$new$0(ZkController.java:381)
        at app//org.apache.solr.cloud.ZkController$$Lambda$503/0x000000084039f040.command(Unknown Source)
        at app//org.apache.solr.common.cloud.ConnectionManager$1.update(ConnectionManager.java:199)
        at app//org.apache.solr.common.cloud.DefaultConnectionStrategy.reconnect(DefaultConnectionStrategy.java:59)
        at app//org.apache.solr.common.cloud.ConnectionManager.process(ConnectionManager.java:179)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.processEvent(ClientCnxn.java:563)
        at app//org.apache.zookeeper.ClientCnxn$EventThread.run(ClientCnxn.java:538)
	at __randomizedtesting.SeedInfo.seed([77B27CFAA45B8786]:0)




Build Log:
[...truncated 2285 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39531/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 11:38:17.466; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 11:38:17.472; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 11:38:18.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 11:38:18.421; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23364ms
ok 61 start solr with client truststore and security manager in 25533ms
not ok 62 start solr with mTLS needed in 59604ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fkSFXG/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39531.
#
# Started Solr server on port 39531 (pid=201874). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39532.
#
# Started Solr server on port 39532 (pid=202333). Happy searching!
#
# INFO  - 2023-10-02 11:39:42.482; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 11:39:42.488; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 11:39:42.886; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 11:39:42.889; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 11:39:42.890; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.922 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 67 81 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:18.000 UTC",
#     "not  after"         : "2023-12-31 11:39:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 0C 6A C4 70 62 90 32   99 8D 4C 38 8D C6 64 4F  ..j.pb.2..L8..dO
#         0010: 8D 81 61 0E                                        ..a.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.927 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 FB 56 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:10.000 UTC",
#     "not  after"         : "2023-12-31 11:39:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:42.942 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.246 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.247 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.248 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:43.248 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.422 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.425 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:43.425 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.431 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.443 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.443 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:43.445 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF AE DD 05 B1 8D 63 7B EA 21 2A BF 4A C4 70 F5 FA 89 16 98 C2 97 59 0D D5 53 47 9A 5F 2A 56 BE",
#   "session id"          : "2E A1 B9 B8 D9 9D 2F C2 9D 5D C7 48 47 C2 05 49 66 D9 04 89 F2 68 79 93 24 D8 4A 15 26 66 5D 35",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5D 00 71 76 A2 3D 0E BC   CC D2 50 72 C9 8F 93 14  ].qv.=....Pr....
#             0010: 72 5E FC A3 9D 64 4F 14   3C 14 DA 03 BC FD 57 09  r^...dO.<.....W.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D5 50 86 B7 E6 78 4C C1 1E E9 25 03 9D E7 08 99 87 E3 90 91 52 8C 30 59 E8 AA 05 E0 EB 03 17 73",
#   "session id"          : "2E A1 B9 B8 D9 9D 2F C2 9D 5D C7 48 47 C2 05 49 66 D9 04 89 F2 68 79 93 24 D8 4A 15 26 66 5D 35",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 10 8F 2F 9D D8 03 59   05 87 43 34 96 AB B6 77  .../...Y..C4...w
#           0010: C5 A9 87 1B 1D C5 46 A0   BD 24 EF 22 54 39 3E 59  ......F..$."T9>Y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.567 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.568 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.570 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.570 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.573 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.574 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.582 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.583 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.584 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.588 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.588 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.591 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.592 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.592 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.593 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.594 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.595 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.599 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 78 64 F5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:14.000 UTC",
#       "not  after"         : "2023-12-31 11:39:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 47 3C 22 CD 38 D0 43   23 05 73 77 70 C0 A2 59  .G<".8.C#.swp..Y
#           0010: D0 98 0B 85                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.599 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.682 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.686 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 77 22 D2 68 E4 F8 B4   64 1B E9 20 1A 6B ED 2E  .w".h...d.. .k..
#     0010: A1 61 D6 60 9B 75 00 B0   EB FB 14 49 B6 71 70 06  .a.`.u.....I.qp.
#     0020: 8A EC 36 7D 11 82 F7 8D   6B 0C 12 AA 21 81 9D F0  ..6.....k...!...
#     0030: 9F 03 5F 99 39 F8 8D BA   C2 A6 B3 15 4A DE D2 AE  .._.9.......J...
#     0040: 23 42 39 97 0D 96 FE C9   D3 92 35 73 A6 49 B9 5B  #B9.......5s.I.[
#     0050: 41 94 EE 38 90 23 64 72   9F 48 5D 0E 1A 10 83 FA  A..8.#dr.H].....
#     0060: 6C E1 C9 83 F7 87 79 C5   E7 61 F7 A7 47 3D 4B BE  l.....y..a..G=K.
#     0070: 18 AE 00 B1 D3 98 C9 EB   6F DF 41 1B A7 12 D1 85  ........o.A.....
#     0080: 74 1C CC A0 61 DF 43 ED   1D 8C 68 AF EC A7 6B 4F  t...a.C...h...kO
#     0090: 2E E3 E4 BC 1B 11 8B 66   91 29 C3 C9 E0 A6 8E D9  .......f.)......
#     00A0: 92 32 F8 99 0B 82 97 A4   1D FD D8 3B DB A5 08 78  .2.........;...x
#     00B0: CA 50 97 EC A5 15 73 93   5E 87 30 AE 73 F5 79 7A  .P....s.^.0.s.yz
#     00C0: 5D 31 3B CB 45 CC D0 63   C8 D3 13 37 4A 12 FA F6  ]1;.E..c...7J...
#     00D0: 6C 8D 52 3B F3 80 9F 10   FA 1B 1E F1 7C E5 EB 9C  l.R;............
#     00E0: 15 D5 26 F0 23 A7 9A 12   7F EE D6 C2 44 CA DA D6  ..&.#.......D...
#     00F0: 4F 73 15 B8 90 D8 CA 5A   6D 9C A2 B8 E5 DF 04 58  Os.....Zm......X
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.688 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C9 33 C6 FC 01 9E 96 76   50 63 E0 74 C2 9A CB 40  .3.....vPc.t...@
#     0010: 00 32 CC 93 DB C3 7A D4   C4 D5 A2 E7 B4 9A 3E 56  .2....z.......>V
#     0020: 1C 55 64 EB A7 42 73 87   F5 B8 E6 F5 52 12 DB 20  .Ud..Bs.....R..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.691 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.692 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.692 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.692 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.692 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:43.693 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:43.693 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.693 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.697 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 67 81 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:18.000 UTC",
#       "not  after"         : "2023-12-31 11:39:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 0C 6A C4 70 62 90 32   99 8D 4C 38 8D C6 64 4F  ..j.pb.2..L8..dO
#           0010: 8D 81 61 0E                                        ..a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 DA 4B 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:12.000 UTC",
#       "not  after"         : "2023-12-31 11:39:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#           0010: D1 9C 07 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.723 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 C4 99 63 1E 1E F5 39   AC A2 18 7A A8 36 68 C5  v..c...9...z.6h.
#     0010: BD A8 A4 AF 39 3F 6D 13   73 30 A5 B6 EC 8D AA 9B  ....9?m.s0......
#     0020: 1E 3F BA BD 62 68 F6 F3   36 46 4F 78 70 7D 64 7F  .?..bh..6FOxp.d.
#     0030: 12 54 A3 7A ED B0 24 39   FE A6 2F DF D3 51 F3 2C  .T.z..$9../..Q.,
#     0040: ED 77 A3 D5 50 B6 F1 08   31 3D FD 20 32 E1 47 A2  .w..P...1=. 2.G.
#     0050: DE 24 68 4E 8F 53 2E F2   D8 34 24 0B 4E FC D4 6B  .$hN.S...4$.N..k
#     0060: EC 54 76 24 38 E6 51 C5   EA FC 52 25 FD 64 19 94  .Tv$8.Q...R%.d..
#     0070: 1D B1 11 F4 38 56 72 57   E3 FB 3B C3 7B D6 E3 EF  ....8VrW..;.....
#     0080: 37 D1 B8 02 AF 48 B8 CB   53 7B 3C 09 A9 A8 9F DC  7....H..S.<.....
#     0090: BD 97 41 83 AC B0 D2 BB   A0 31 3E 30 87 65 81 B2  ..A......1>0.e..
#     00A0: A3 38 C9 05 26 4A 7F 64   AE 2E 0F B5 6F 55 54 F1  .8..&J.d....oUT.
#     00B0: 0C C3 57 04 1B E4 80 A3   EA 40 A4 02 E4 8D 62 E4  ..W......@....b.
#     00C0: 2D 73 56 E2 22 BF 20 47   55 B4 D1 85 E2 D1 F5 3E  -sV.". GU......>
#     00D0: 8A 7D 07 5A 35 EE A8 AA   CC 53 EE 1A FE A3 48 23  ...Z5....S....H#
#     00E0: 9E 82 0B 6E B9 54 CF 5A   DA 4A 0F F5 42 02 B6 0D  ...n.T.Z.J..B...
#     00F0: 22 33 79 46 77 D2 B5 65   80 5A 81 27 29 3C 45 53  "3yFw..e.Z.')<ES
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.725 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CE 76 CF A6 4B 56 6B 74   5F 44 EC 31 C1 27 B9 5D  .v..KVkt_D.1.'.]
#     0010: B0 81 4A DB D4 E7 CD E1   E0 C8 85 88 87 C1 34 3E  ..J...........4>
#     0020: 47 D9 45 BE 2C A4 B7 2C   FE EC CD 49 55 30 95 B7  G.E.,..,...IU0..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.725 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:43.777 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "31 28 0C 45 0D 8E 39 66 BE 45 F1 01 D9 F7 83 12 E6 C0 AB 40 34 52 C4 7D DD DF 18 39 D5 F2 7A 5C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 11:39:44.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 11:39:44.074 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 11:39:45.040; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 11:39:45.046; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 11:39:45.415; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 11:39:45.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 11:39:45.418; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fkSFXG/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.450 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 67 81 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:18.000 UTC",
#     "not  after"         : "2023-12-31 11:39:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 0C 6A C4 70 62 90 32   99 8D 4C 38 8D C6 64 4F  ..j.pb.2..L8..dO
#         0010: 8D 81 61 0E                                        ..a.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.454 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 FB 56 D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:10.000 UTC",
#     "not  after"         : "2023-12-31 11:39:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:45.469 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.532 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.541 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:45.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.703 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.703 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.705 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:45.706 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.711 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.723 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.723 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:45.725 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 81 BD 59 5C 54 9E 5F 9A C1 49 4F 2B 04 A2 D6 49 D9 2D 27 4C FD 5A A7 37 AF 0C CA 44 6A 85 59",
#   "session id"          : "5C 02 1F C3 3D 76 51 8E BB 44 41 10 C7 C4 E9 0A A8 B0 F2 35 EE 04 AC 4A 6D 4D 3E 10 CE 14 BD BA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A1 17 7E D4 65 A9 B3 0F   27 05 72 AB 12 9C 2A 53  ....e...'.r...*S
#             0010: 9F 16 66 A6 5F 30 09 33   D2 B9 47 8F AC 4C 71 1B  ..f._0.3..G..Lq.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.845 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 04 36 DA 6E 09 6B F1 9E 44 7B 40 43 4F 04 03 E2 AC 19 B3 0C A5 30 97 8E 23 93 3B 1A 71 89 D2",
#   "session id"          : "5C 02 1F C3 3D 76 51 8E BB 44 41 10 C7 C4 E9 0A A8 B0 F2 35 EE 04 AC 4A 6D 4D 3E 10 CE 14 BD BA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A9 AA 01 31 56 5A B0 28   40 43 A6 40 6A C2 8D 62  ...1VZ.(@C.@j..b
#           0010: 2E BD 5A 08 CF 81 E2 55   E7 52 BD B0 41 0E 6C 0A  ..Z....U.R..A.l.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.846 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.846 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.848 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.850 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.851 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.859 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.861 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.862 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.865 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.866 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.867 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.867 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.867 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.869 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.871 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.874 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 78 64 F5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:14.000 UTC",
#       "not  after"         : "2023-12-31 11:39:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 47 3C 22 CD 38 D0 43   23 05 73 77 70 C0 A2 59  .G<".8.C#.swp..Y
#           0010: D0 98 0B 85                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.874 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.955 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 DA 4B 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 11:39:12.000 UTC",
#     "not  after"         : "2023-12-31 11:39:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#         0010: D1 9C 07 CC                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#         0010: 67 3E D5 AB                                        g>..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.959 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D F1 C7 61 5E 66 79 F5   34 54 06 DA 85 6A 5E F9  ...a^fy.4T...j^.
#     0010: 21 0C F1 D2 CB 48 52 D8   DC 0D ED 11 A6 FF 57 1D  !....HR.......W.
#     0020: 99 C2 C5 89 36 A8 E6 CE   58 FB 41 75 C3 22 4A 89  ....6...X.Au."J.
#     0030: F8 46 36 4F AC A9 59 E8   DA 70 9D 55 37 35 93 C7  .F6O..Y..p.U75..
#     0040: 70 50 89 80 C2 EA 4F 15   EB 19 0F FC B6 EE 09 1D  pP....O.........
#     0050: A4 26 B2 50 62 2D AD 28   3B 83 A6 51 73 C1 70 6D  .&.Pb-.(;..Qs.pm
#     0060: EE EC 77 9D 36 91 07 AB   27 06 CC 82 CC 03 14 71  ..w.6...'......q
#     0070: B5 39 26 83 B7 EB 2B E5   09 FE 55 D2 6C 6E F1 CE  .9&...+...U.ln..
#     0080: 02 5C FF 0C F6 D6 9B 79   10 2F 47 F1 40 DF 69 AF  .\.....y./G.@.i.
#     0090: C4 B7 C3 8D C5 C6 E2 C6   43 88 ED 10 1B 33 CC B4  ........C....3..
#     00A0: 35 BF 6B 35 0D 75 C8 AF   77 F4 E2 85 3C 62 57 D0  5.k5.u..w...<bW.
#     00B0: F8 1D C0 10 F1 23 41 9B   AB B8 16 09 B1 8E 7C DD  .....#A.........
#     00C0: F3 62 3D C4 DE B1 BA 65   91 8D 96 13 62 12 6D 18  .b=....e....b.m.
#     00D0: C6 74 F5 BC C2 25 EE 0D   F5 BC 8F 6C BC AF 15 26  .t...%.....l...&
#     00E0: 9F 4A 6B 36 52 40 46 EC   78 2A 71 6F 50 DB E6 33  .Jk6R@F.x*qoP..3
#     00F0: B5 0B 8B DE CE 84 27 B4   D6 5D 91 E1 97 F7 C7 A9  ......'..]......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.961 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 80 00 A4 09 CC C6 BA 89   26 B5 C4 CE 9B B6 AA FD  ........&.......
#     0010: 5A C6 B3 50 D9 58 4B 19   87 37 C1 3B 2E 0A 2A FD  Z..P.XK..7.;..*.
#     0020: DA 9E B8 8A DC 45 AE 51   3A 62 22 7C BD C9 F4 E1  .....E.Q:b".....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.964 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.965 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.965 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 11:39:45.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:45.966 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.966 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.969 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 67 81 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:18.000 UTC",
#       "not  after"         : "2023-12-31 11:39:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 0C 6A C4 70 62 90 32   99 8D 4C 38 8D C6 64 4F  ..j.pb.2..L8..dO
#           0010: 8D 81 61 0E                                        ..a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 DA 4B 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:12.000 UTC",
#       "not  after"         : "2023-12-31 11:39:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#           0010: D1 9C 07 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.994 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 0B 94 06 A6 FD 3B 11   7F 8D 3B C9 19 B9 FA E2  `.....;...;.....
#     0010: 1D 95 4F 98 26 AD A4 7D   21 00 2C 85 07 1B B8 AF  ..O.&...!.,.....
#     0020: 29 56 9A F3 D7 CF C0 99   C4 19 51 D7 7A CA 69 B7  )V........Q.z.i.
#     0030: C5 90 03 E0 52 71 AE 07   EA 5A 2E E3 E6 BC EC 51  ....Rq...Z.....Q
#     0040: 12 6A AF 59 F1 70 81 92   E9 AC B7 CA 11 E9 38 7F  .j.Y.p........8.
#     0050: 10 9F 39 13 46 6B 42 AA   3D EB 8B 83 6B 8C FE 0D  ..9.FkB.=...k...
#     0060: 2B 66 90 ED 3B 96 B5 FC   EF B4 23 3B 47 1E 01 1E  +f..;.....#;G...
#     0070: 80 BF CE 7B AF 0F 74 C0   49 16 24 BA 68 7C D2 1D  ......t.I.$.h...
#     0080: F3 97 E7 33 C4 B4 CB 79   E3 68 9B AD CC 45 C6 54  ...3...y.h...E.T
#     0090: 38 4F 82 DD F3 80 4C A7   7F 91 72 20 27 67 7C 0A  8O....L...r 'g..
#     00A0: B3 2E F1 41 18 50 0C 29   CF 7C BE 5D D3 F1 B8 90  ...A.P.)...]....
#     00B0: 4B 24 BF 71 60 20 48 69   37 A2 A1 5C D1 21 7C 00  K$.q` Hi7..\.!..
#     00C0: 83 17 90 18 F5 94 AE 81   75 8D 47 B2 DF 7D FB CB  ........u.G.....
#     00D0: E1 86 20 CD 7C 50 EE 2C   88 08 B9 D6 15 E6 34 D6  .. ..P.,......4.
#     00E0: 85 EF CF F8 89 16 A6 6A   17 CD 9B 0C 65 3F 74 81  .......j....e?t.
#     00F0: D8 A4 30 EF 49 7E 59 98   5B BC 9E 5D 0B CD 83 A2  ..0.I.Y.[..]....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.995 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 FA BF AD EF 2B B0 13   13 90 D6 AF 16 D5 05 CB   ....+..........
#     0010: 58 0F 7C 43 0D EF C1 26   33 79 34 A3 84 D9 E6 A1  X..C...&3y4.....
#     0020: A5 95 F3 4B 75 5C 11 BA   11 71 1C 44 E1 16 12 94  ...Ku\...q.D....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:45.996 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:46.045 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E A8 36 75 3D F2 0A 98 4F 61 EF ED BB 17 3C F1 F4 DE 33 A2 29 F3 F5 86 DB F9 3B DC FF 2F 0A 16",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 11:39:46.328 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 11:39:46.329 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 11:39:57.777; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:58.117 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 FB 56 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:10.000 UTC",
#       "not  after"         : "2023-12-31 11:39:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#           0010: D1 9C 07 CC                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 DA 4B 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 11:39:12.000 UTC",
#       "not  after"         : "2023-12-31 11:39:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 D7 FE 11 43 65 D0 5D   97 86 8D FE 8C 71 72 FB  ....Ce.].....qr.
#           0010: D1 9C 07 CC                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 72 CD EA 2C 3E 62 0F   52 15 95 39 21 EC 9E 34  Er..,>b.R..9!..4
#           0010: 67 3E D5 AB                                        g>..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 11:39:58.134 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.494 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.495 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.496 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:39:58.496 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.641 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.643 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 11:39:58.644 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.651 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.663 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 11:39:58.666 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E9 3E F3 41 A8 8E 7E 72 79 0F 4C 2B 63 07 14 C2 B2 2A C6 7F FF A4 9C 75 9E 3D 7F 84 F1 0D 5F 6C",
#     "session id"          : "74 A9 87 FA F3 89 A3 95 79 7C 78 C4 DD F3 CA 59 01 E2 67 CA CB AC 59 38 BD 04 4B 87 70 C8 D8 FC",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E1 C5 26 A4 04 EA 72 93   0B 40 E3 43 C9 50 9A 34  ..&...r..@.C.P.4
#               0010: E5 D1 25 D6 D6 0A 48 88   30 32 46 A4 A4 0C 5C 78  ..%...H.02F...\x
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "81 67 BD 17 C0 F6 1A 7B AD F7 80 63 76 0E 38 AA 10 A2 CA 70 AB AB B2 67 47 20 0E ED 21 65 91 A1",
#     "session id"          : "74 A9 87 FA F3 89 A3 95 79 7C 78 C4 DD F3 CA 59 01 E2 67 CA CB AC 59 38 BD 04 4B 87 70 C8 D8 FC",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 5D 4E BC 02 2F 06 2D   3B D5 FF C9 65 68 82 9E  .]N../.-;...eh..
#             0010: 9E 7B 90 00 B1 AF 45 B1   9D BF 1E B6 00 7F 72 0B  ......E.......r.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.691 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.692 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.693 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.694 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.696 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.696 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 11:39:58.698 UTC|SSLExtensions.j

[...truncated too long message...]

rtPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 11:41:21.067 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 11:41:21.123 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39532/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28204ms
ok 65 stop command for single port in 31472ms
ok 66 status detects locally running solr in 14393ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2201ms
ok 69 copying files around in 6699ms
ok 70 upconfig in 2665ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1204ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=77B27CFAA45B8786 -Ptests.file.encoding=UTF-8


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 9s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m34.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5591 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5591/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40287/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 09:32:09.268; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 09:32:09.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 09:32:10.522; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 09:32:10.563; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22572ms
ok 61 start solr with client truststore and security manager in 25730ms
not ok 62 start solr with mTLS needed in 57010ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Cxw3B6/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40287.
#
# Started Solr server on port 40287 (pid=200243). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40288.
#
# Started Solr server on port 40288 (pid=200669). Happy searching!
#
# INFO  - 2023-10-02 09:33:33.871; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 09:33:33.877; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 09:33:34.253; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 09:33:34.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 09:33:34.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:34.287 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 4E E7 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:10.000 UTC",
#     "not  after"         : "2023-12-31 09:33:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 4D B4 D1 B4 FF 49 E3   87 2B 12 46 07 B6 C0 05  .M....I..+.F....
#         0010: 11 C2 C9 6F                                        ...o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:34.292 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 13 5D 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:01.000 UTC",
#     "not  after"         : "2023-12-31 09:33:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:34.305 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:34.533 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.533 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:34.535 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:34.535 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.553 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.553 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.553 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:34.555 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A1 16 78 4E 48 E5 09 A1 3E 2B 08 0A D7 BC F5 49 95 C3 01 CD CF 63 8D 28 9E 50 89 D5 3C 07 F1 F8",
#   "session id"          : "77 60 2E EF E6 FB 4A E5 EA 94 6C 7D 11 46 71 A8 DC D0 B8 CF F9 41 C5 D7 8F 3C DC 90 08 90 CA 27",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B8 DE A3 A8 DC 3B F3 06   DF 5A CF 67 C7 AD 39 CC  .....;...Z.g..9.
#             0010: 41 96 D3 B0 14 76 72 7F   F4 4F C3 76 BC 86 84 21  A....vr..O.v...!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.681 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C8 17 F7 BB 43 C7 A8 BD B0 30 CC 84 20 24 0E 34 E1 0B D4 9C 3E 4F E8 7E CF 9A 57 17 AA DC 50 C6",
#   "session id"          : "77 60 2E EF E6 FB 4A E5 EA 94 6C 7D 11 46 71 A8 DC D0 B8 CF F9 41 C5 D7 8F 3C DC 90 08 90 CA 27",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4F E5 4D A0 05 DC C4 F3   E2 78 E6 19 67 62 95 E7  O.M......x..gb..
#           0010: 67 B5 9C 81 0F 7A 75 1E   BE 35 8A 25 CA 18 B5 50  g....zu..5.%...P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.681 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.682 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.682 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.684 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.685 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.686 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.694 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.696 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.697 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.700 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.700 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.701 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.703 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.703 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.703 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.704 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.705 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.705 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.705 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.708 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 51 22 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:06.000 UTC",
#       "not  after"         : "2023-12-31 09:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D A0 5C 30 01 F8 B8 E4   61 DB FC B7 24 A4 10 67  ..\0....a...$..g
#           0010: CA C6 B9 44                                        ...D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.708 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:34.744 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:34.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:34.745 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:34.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.793 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.797 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 3C 8E 41 B8 26 89 66   F0 76 71 A0 6E 97 B9 F0  .<.A.&.f.vq.n...
#     0010: 29 EA 27 78 D7 2D 14 EB   5A EB 41 28 03 CF 8E 81  ).'x.-..Z.A(....
#     0020: 79 A5 D2 F1 06 D3 BB 20   30 E7 9A A9 9D AA 16 1C  y...... 0.......
#     0030: 09 05 F8 61 63 F5 5A 80   BE BE E5 C6 89 B0 70 51  ...ac.Z.......pQ
#     0040: F8 1E 02 8D 59 5B 86 32   53 C9 B5 60 5E 26 41 62  ....Y[.2S..`^&Ab
#     0050: 73 B2 5A 22 94 E2 42 AF   FB B8 2D 8A 33 21 15 AD  s.Z"..B...-.3!..
#     0060: DC DB F5 E5 2F 07 60 7E   62 7C C1 B9 B2 D4 64 11  ..../.`.b.....d.
#     0070: 85 30 3D 9F 39 8D 71 42   56 D0 4C FB 0F 86 CF EB  .0=.9.qBV.L.....
#     0080: 46 CA 0D BE 9C 86 4D E1   5A A5 D8 92 BA 98 1B C2  F.....M.Z.......
#     0090: B1 C4 52 4B 89 25 C3 87   0C 33 C5 AA 83 33 C7 9A  ..RK.%...3...3..
#     00A0: CA BC D7 80 3D 54 B8 F7   2B 30 04 42 06 50 71 2B  ....=T..+0.B.Pq+
#     00B0: D3 AA 9D F1 17 6A 82 A5   1A 16 DA F1 9A 0E 98 D3  .....j..........
#     00C0: C4 A7 C1 83 47 8F 22 56   D4 BD B9 BD 87 0E E1 84  ....G."V........
#     00D0: 95 3A 4C C6 CB 96 A4 60   02 3A 95 13 CB 77 05 33  .:L....`.:...w.3
#     00E0: F6 7C 40 AF 17 14 00 3A   E8 E4 EE BB E7 A5 28 F8  ..@....:......(.
#     00F0: F7 A1 2B CC 16 0A FC D1   CD 58 01 22 4E 66 73 EB  ..+......X."Nfs.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.798 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9B B1 78 C3 E6 15 EE B5   11 B2 7F B5 85 06 DC AB  ..x.............
#     0010: 47 46 87 36 49 CD 43 CA   33 07 D4 C3 CC F3 E9 71  GF.6I.C.3......q
#     0020: 43 18 CD 47 0B 83 B7 4F   C5 AD 0A 42 11 8E 3A 00  C..G...O...B..:.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.800 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:34.801 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.802 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:34.802 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.802 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:34.802 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:34.803 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.803 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.805 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 4E E7 7E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:10.000 UTC",
#       "not  after"         : "2023-12-31 09:33:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 4D B4 D1 B4 FF 49 E3   87 2B 12 46 07 B6 C0 05  .M....I..+.F....
#           0010: 11 C2 C9 6F                                        ...o
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 6B 0E 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:03.000 UTC",
#       "not  after"         : "2023-12-31 09:33:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#           0010: FB BC 7D 10                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.832 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 8D C8 DF 09 B1 CB 78   B9 96 8B 90 40 D5 AC AD  X......x....@...
#     0010: 7A 08 D4 D3 9D E7 C2 03   8C 02 82 D1 7D 54 54 7E  z............TT.
#     0020: 4D 06 C1 71 A3 3A B6 3B   CC 41 10 FF E4 D8 4A C0  M..q.:.;.A....J.
#     0030: C6 D2 A9 00 9F EF 51 26   49 9F DB 7A D9 93 16 7A  ......Q&I..z...z
#     0040: E6 A0 CA EF A6 96 E9 A5   90 D7 D7 B5 14 1E 69 08  ..............i.
#     0050: 8E 75 FA AD B5 25 0C 97   61 D4 7A D8 CB 1D BE 39  .u...%..a.z....9
#     0060: D0 4D 84 0D B5 5F 52 D6   3C E8 7A BE AE B9 6E 36  .M..._R.<.z...n6
#     0070: EF EE BC 9D C5 F9 C4 9D   B9 4E 4B 43 E8 79 EB 3B  .........NKC.y.;
#     0080: 4E 4B D8 1B E8 64 29 F5   A2 D2 88 17 E9 E6 A5 E9  NK...d).........
#     0090: F3 28 C8 48 C3 39 F7 AA   8A 3D 54 7D 3D 46 A3 6E  .(.H.9...=T.=F.n
#     00A0: 1B A4 5E A6 E5 C5 04 71   44 FC 82 0E 23 1F 5C DA  ..^....qD...#.\.
#     00B0: 85 11 3E 83 8C 9D 5E 9A   5E 52 E8 61 A2 8E 5E 90  ..>...^.^R.a..^.
#     00C0: DF 56 72 78 E3 84 DA 5E   33 48 E0 54 16 52 3C 91  .Vrx...^3H.T.R<.
#     00D0: B5 15 AE D6 27 5C D2 B4   B1 6C 25 4E 8F 53 23 03  ....'\...l%N.S#.
#     00E0: B2 81 E9 1C AC A1 1F E6   17 2E F8 33 DE A7 7A 48  ...........3..zH
#     00F0: 68 15 15 02 0E E9 36 25   53 83 8E 2F C1 8F E5 21  h.....6%S../...!
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.833 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DC 43 4E 0C C9 B7 77 BD   25 36 25 1E 05 2F DC 51  .CN...w.%6%../.Q
#     0010: ED A9 A5 41 FF 83 B7 2D   3D B0 7A 5F F7 50 45 31  ...A...-=.z_.PE1
#     0020: 9D 55 CB 8D 58 B2 21 6F   42 77 2E D7 78 9C B5 DA  .U..X.!oBw..x...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.833 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:34.881 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8F 4C F0 EA 67 A7 BC 56 FC 20 ED 7B 1E 29 36 50 D1 61 02 49 6E 49 6C 59 4E E1 FB 41 2C DE 0F 14",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 09:33:35.200 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 09:33:35.200 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 09:33:36.155; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 09:33:36.161; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 09:33:36.558; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 09:33:36.560; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 09:33:36.561; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cxw3B6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:36.593 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4A 4E E7 7E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:10.000 UTC",
#     "not  after"         : "2023-12-31 09:33:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 4D B4 D1 B4 FF 49 E3   87 2B 12 46 07 B6 C0 05  .M....I..+.F....
#         0010: 11 C2 C9 6F                                        ...o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:36.598 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 13 5D 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:01.000 UTC",
#     "not  after"         : "2023-12-31 09:33:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:36.612 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:36.836 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.837 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:36.839 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:36.839 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.844 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.856 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:36.858 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 2A 9C DA 00 09 9E A8 CF C2 11 B5 28 95 70 9E 34 32 78 8B 62 C8 9E F1 EE 28 CE 67 18 EA AA F5",
#   "session id"          : "CD 60 64 3A 04 18 F4 D3 01 1C F9 9A D5 1D E1 D4 30 AD 6F 56 E6 F5 1C 7B 40 19 9C 0D 3B 14 D6 04",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8A C7 50 C4 7B BB 43 1E   51 34 BF 72 7F 59 D6 F9  ..P...C.Q4.r.Y..
#             0010: 04 5F 00 3E 0E F6 12 9A   A7 05 F0 7C 3F E0 20 34  ._.>........?. 4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.966 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "04 D9 C6 A1 EF A5 71 08 9B 6E 60 20 E1 7E 3F 63 BE 01 B5 14 B9 D2 3F A5 EE A3 0F A1 6F CC F1 EC",
#   "session id"          : "CD 60 64 3A 04 18 F4 D3 01 1C F9 9A D5 1D E1 D4 30 AD 6F 56 E6 F5 1C 7B 40 19 9C 0D 3B 14 D6 04",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 91 76 07 44 4F 8F DA 36   31 BA 31 08 52 53 1A C2  .v.DO..61.1.RS..
#           0010: B4 98 2E 0B 54 EE 2E 7E   A9 48 79 2B 6C 65 D0 40  ....T....Hy+le.@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.967 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.967 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.968 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.969 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.971 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.971 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.971 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.972 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:36.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:36.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.981 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.982 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.986 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.986 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.986 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.987 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.987 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.987 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.987 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:36.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:36.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.989 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.989 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.990 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.990 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.991 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.991 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:36.991 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.994 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 51 22 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:06.000 UTC",
#       "not  after"         : "2023-12-31 09:33:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D A0 5C 30 01 F8 B8 E4   61 DB FC B7 24 A4 10 67  ..\0....a...$..g
#           0010: CA C6 B9 44                                        ...D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:36.994 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:37.044 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:37.044 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:37.045 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:37.045 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.085 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 6B 0E 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 09:33:03.000 UTC",
#     "not  after"         : "2023-12-31 09:33:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#         0010: FB BC 7D 10                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#         0010: 58 DA 31 42                                        X.1B
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.089 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8B 3C 9C B5 CC B7 08 9C   A1 1A 59 56 2F EB 78 04  .<........YV/.x.
#     0010: B0 35 E4 47 9D D1 03 40   38 ED 08 1A BF 13 83 AB  .5.G...@8.......
#     0020: 94 A3 33 6E 1A 9D D1 A9   D9 D6 0F 5F 85 E2 C1 4C  ..3n......._...L
#     0030: 00 62 75 0A EC 36 7E A7   98 97 4A 30 DF EE 2E B7  .bu..6....J0....
#     0040: 2D 0E E7 A1 DF C9 B9 A4   CB 7F 51 D0 98 D2 53 14  -.........Q...S.
#     0050: 07 5A 36 99 E2 A6 5B 1D   D2 99 B0 BC 48 C1 1D 01  .Z6...[.....H...
#     0060: B4 CE BE E4 37 A8 44 B5   CF 4B 74 0E 15 27 A7 C7  ....7.D..Kt..'..
#     0070: B4 40 EB 03 9E F0 90 9F   9C 7A F9 E2 48 20 84 FC  .@.......z..H ..
#     0080: 2F 00 C1 64 0D 5D 05 51   50 D3 C5 98 1B 92 47 38  /..d.].QP.....G8
#     0090: F9 59 62 D8 37 B9 61 AB   DD C2 90 91 E7 4B 9D 38  .Yb.7.a......K.8
#     00A0: 9C 9A 34 0D 93 C4 55 D9   93 00 6D 0E E9 61 DD 51  ..4...U...m..a.Q
#     00B0: 8E 9D 56 94 2C 9C 82 92   0F 6C 73 BE 65 DD 19 9C  ..V.,....ls.e...
#     00C0: 76 D8 47 F3 06 FD E8 69   5C F8 D9 63 EF 11 44 68  v.G....i\..c..Dh
#     00D0: A8 47 AE 58 94 1A 36 B2   46 C8 8B EE 63 0E CD 94  .G.X..6.F...c...
#     00E0: 2C 1D 79 C5 74 3A 42 DD   37 37 BD 55 71 27 A2 83  ,.y.t:B.77.Uq'..
#     00F0: 04 13 EC 78 CB 06 1D 05   DF 65 56 F0 CD 6C 64 9C  ...x.....eV..ld.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.091 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E6 89 F0 27 79 6A 66 CB   34 A5 FC F9 5C A8 73 65  ...'yjf.4...\.se
#     0010: 8E AA B6 D2 0D E2 C9 8C   C8 BD 13 84 12 71 D9 1E  .............q..
#     0020: 26 0F 17 48 A9 2F 59 7C   01 BC F1 C7 04 C2 04 7E  &..H./Y.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.093 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:37.094 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:37.095 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:37.095 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:37.095 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 09:33:37.095 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:37.096 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.096 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.098 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4A 4E E7 7E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:10.000 UTC",
#       "not  after"         : "2023-12-31 09:33:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 4D B4 D1 B4 FF 49 E3   87 2B 12 46 07 B6 C0 05  .M....I..+.F....
#           0010: 11 C2 C9 6F                                        ...o
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 6B 0E 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:03.000 UTC",
#       "not  after"         : "2023-12-31 09:33:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#           0010: FB BC 7D 10                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.125 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C0 AE D7 32 54 42 A2 A2   33 B5 AF 5E C7 9B 31 10  ...2TB..3..^..1.
#     0010: C0 66 E8 D6 F6 9B 12 FE   42 6F D8 1E 61 41 CE 87  .f......Bo..aA..
#     0020: 2E 57 24 F6 54 01 85 61   32 F9 70 0D EA 56 98 B7  .W$.T..a2.p..V..
#     0030: 4C 60 CA B4 96 4E 95 B0   46 D4 6B 12 77 5C BB FE  L`...N..F.k.w\..
#     0040: 2D F4 6E A9 97 0C A4 66   0C 5C EB 1A 9A A8 53 8F  -.n....f.\....S.
#     0050: 97 BF 15 E4 74 39 74 3D   07 FD 45 C1 AE E7 B7 3D  ....t9t=..E....=
#     0060: 7A 95 94 07 24 B7 69 DC   77 11 61 23 87 20 8E 66  z...$.i.w.a#. .f
#     0070: B3 72 05 FE 56 B7 FD C3   04 8D DF FE D5 78 41 EB  .r..V........xA.
#     0080: AB 58 CB 58 1C 16 55 6F   C7 1B D2 56 29 11 85 CD  .X.X..Uo...V)...
#     0090: 54 1A E7 42 FD 37 D0 42   6A BA A0 29 6B 35 52 61  T..B.7.Bj..)k5Ra
#     00A0: CE E3 7D 20 AF 87 53 C9   28 65 BC 78 DC CD 6B B1  ... ..S.(e.x..k.
#     00B0: 49 03 DD EC B7 89 8B 58   83 6C 82 EE 03 E9 D9 97  I......X.l......
#     00C0: 63 CE 07 DC F5 00 AD 90   79 9D 6A 8B 3C F2 AB 5F  c.......y.j.<.._
#     00D0: A8 45 F0 A2 F5 44 E6 22   C9 CA 8D 9D 76 D8 4A 8D  .E...D."....v.J.
#     00E0: 23 CB C4 95 4C E9 7C 2A   0D 41 11 D3 B5 AC DB CA  #...L..*.A......
#     00F0: 1B A5 30 AA B8 7A DE 8F   EA BD 0E 09 1C 33 4D E1  ..0..z.......3M.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.126 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 89 1D 52 22 39 F9 CE   59 77 F7 43 D6 1B 81 62  ...R"9..Yw.C...b
#     0010: 42 C8 C1 F3 E8 61 3C 72   09 75 98 9C B7 E9 80 DA  B....a<r.u......
#     0020: 5D BE B4 12 58 21 0A 7E   6A FB 46 AC 29 62 BB 0A  ]...X!..j.F.)b..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.126 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:37.173 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "61 AC 65 B8 E1 C7 B5 48 02 E5 48 E2 34 3C EF 82 67 58 59 B0 3F 5E A6 4C 80 1F AA B1 DB 86 84 05",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 09:33:37.453 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 09:33:37.454 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 09:33:49.158; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:49.484 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 13 5D 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:01.000 UTC",
#       "not  after"         : "2023-12-31 09:33:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#           0010: FB BC 7D 10                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 6B 0E 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 09:33:03.000 UTC",
#       "not  after"         : "2023-12-31 09:33:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 9E 7D 96 48 07 0C A9   60 3A 8F 3B 02 9F 3A B2  k...H...`:.;..:.
#           0010: FB BC 7D 10                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 46 A5 01 B9 81 1F C0   D2 F9 39 50 A0 41 2D 34  .F........9P.A-4
#           0010: 58 DA 31 42                                        X.1B
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 09:33:49.499 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:49.606 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:49.606 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:49.606 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:33:49.607 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:49.747 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.748 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:49.749 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 09:33:49.750 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.755 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.768 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 09:33:49.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B6 B2 36 57 1D 48 B3 B9 47 FC EB 5B 7B 1E 4A F8 37 07 CE 1A EA A8 41 F1 2D 68 03 9E E2 00 3E 66",
#     "session id"          : "67 01 F3 3F 97 55 79 A7 D6 AC F1 FB 8E AE D6 49 64 66 87 76 50 76 F3 97 72 A0 F0 D3 19 6A E8 66",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D7 F5 7B A6 A6 FE E2 E5   E3 FA 1B 8A AA B3 70 8B  ..............p.
#               0010: D7 38 7E D2 71 1F FA B7   C1 77 21 F1 2C 25 F6 40  .8..q....w!.,%.@
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.791 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3B E6 5B 54 7C 71 51 63 EB 76 C3 CE B2 87 16 FF 53 40 F1 5D F9 20 78 2C EE 31 8B 15 26 46 04 3B",
#     "session id"          : "67 01 F3 3F 97 55 79 A7 D6 AC F1 FB 8E AE D6 49 64 66 87 76 50 76 F3 97 72 A0 F0 D3 19 6A E8 66",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BD A0 6B 47 8D 34 AD 3F   C9 88 3E 1B B7 9D 72 BB  ..kG.4.?..>...r.
#             0010: CF AC 81 66 7B A4 36 CD   33 61 A9 29 71 BB E8 06  ...f..6.3a.)q...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.791 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.791 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.793 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.795 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.804 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.806 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.807 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.810 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:33:49.811 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 09:33:49.813 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 09:35:08.878 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:35:08.917 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:35:08.918 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:35:08.918 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 09:35:08.919 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40288/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28108ms
ok 65 stop command for single port in 31481ms
ok 66 status detects locally running solr in 14347ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2172ms
ok 69 copying files around in 6624ms
ok 70 upconfig in 2626ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1200ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 57s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m21.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5590 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5590/

All tests passed

Build Log:
[...truncated 1331 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38787/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 07:36:07.191; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 07:36:07.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 07:36:08.405; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 07:36:08.445; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22853ms
ok 61 start solr with client truststore and security manager in 25561ms
not ok 62 start solr with mTLS needed in 57134ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wj0wNp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38787.
#
# Started Solr server on port 38787 (pid=201528). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38788.
#
# Started Solr server on port 38788 (pid=201940). Happy searching!
#
# INFO  - 2023-10-02 07:37:32.109; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 07:37:32.115; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 07:37:32.487; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 07:37:32.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 07:37:32.490; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:32.522 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E ED 40 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:08.000 UTC",
#     "not  after"         : "2023-12-31 07:37:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E BE ED 2D 4A 68 EA 3A   A9 BC ED 60 FF C2 99 64  ...-Jh.:...`...d
#         0010: 0F 32 2E 92                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:32.526 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F DA AC 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:00.000 UTC",
#     "not  after"         : "2023-12-31 07:37:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:32.540 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:32.767 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:32.769 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:32.770 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.775 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.786 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.787 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.787 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:32.789 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "04 FE 6A EE E9 72 5C 18 D6 AD FD 69 43 18 06 C1 36 53 7F 9F FB E4 1A 5E BA D4 4B 7E B7 DB 2F 88",
#   "session id"          : "9C 34 38 AD 9C 37 81 B6 BA BF A7 F1 60 F0 50 D6 79 A0 7C E2 9C 3E 8E 6F CC A0 71 89 5C 8A D3 DD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F FD EA 59 46 A1 FE DB   F9 C9 75 5C EF B2 D9 D0  ...YF.....u\....
#             0010: 29 B3 DE 26 54 5F 00 63   D3 E4 94 0D 6A 34 4F 42  )..&T_.c....j4OB
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.912 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "75 61 76 EF 24 E8 3A C5 AF 02 4D B9 20 09 CB E7 D5 8F 6B AA 46 DF 8F 0F 43 B0 9D 8E 2F F4 65 98",
#   "session id"          : "9C 34 38 AD 9C 37 81 B6 BA BF A7 F1 60 F0 50 D6 79 A0 7C E2 9C 3E 8E 6F CC A0 71 89 5C 8A D3 DD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 21 E2 DE 4C AF C4 83 A2   66 D6 D8 23 34 9E 70 AC  !..L....f..#4.p.
#           0010: 5D A6 40 1C 58 1E 51 F3   8A 2F 95 0A 36 1D 4E 78  ].@.X.Q../..6.Nx
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.912 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.912 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.913 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.915 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.916 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.926 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.927 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.929 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.932 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.932 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:32.933 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.935 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.935 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.936 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.936 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.937 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.937 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:32.937 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.940 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 FA 3F DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:04.000 UTC",
#       "not  after"         : "2023-12-31 07:37:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 ED 52 83 6B 50 C6 47   8A E8 03 3A 8E 2F 80 28  ..R.kP.G...:./.(
#           0010: 81 AE 1B 23                                        ...#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:32.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:33.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:33.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:33.001 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:33.001 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.021 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.025 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2E A0 58 06 A4 61 29 7D   92 2E E5 1E D7 DC 32 D8  ..X..a).......2.
#     0010: 45 76 D6 FA 86 60 57 33   C3 5D 49 B1 4F FE 40 D4  Ev...`W3.]I.O.@.
#     0020: 77 49 E3 D2 F3 C7 19 48   02 2C 3D 2D 8D 91 13 9B  wI.....H.,=-....
#     0030: E1 04 E4 5B 7C B5 A2 83   ED AE EF AC 30 8C 6A C3  ...[........0.j.
#     0040: 1B D9 B9 E1 E6 5E 05 3C   47 54 71 9E 88 D9 4F A6  .....^.<GTq...O.
#     0050: 4D DA 93 06 70 00 44 2A   CF 71 AC 3B EC 97 95 FC  M...p.D*.q.;....
#     0060: 9A 02 D8 E7 25 8C 91 AC   03 BE F9 69 1B BB C9 93  ....%......i....
#     0070: 67 3E D0 EB 7A E9 1F EE   74 7B 7D 5C F0 21 3D ED  g>..z...t..\.!=.
#     0080: BC 3B 43 F1 FE 9F 4E C1   D9 1D 7E 54 07 4E 8E 0A  .;C...N....T.N..
#     0090: EF 36 4D C7 2C CC CA 5B   0B D4 C4 B5 B9 F8 D0 99  .6M.,..[........
#     00A0: F5 25 F6 CA 35 8F 12 18   69 3F F6 7E B7 14 7A 99  .%..5...i?....z.
#     00B0: 27 18 29 40 E4 A9 10 59   59 51 74 C4 F4 4E 8B A2  '.)@...YYQt..N..
#     00C0: E6 FB 64 01 FD 5B 3C CF   2C 45 EF 1A 5C 3E CA 95  ..d..[<.,E..\>..
#     00D0: 55 88 08 1D DD B9 82 1D   66 54 B8 59 8B B0 F5 95  U.......fT.Y....
#     00E0: AE 13 CD 23 14 AE A9 56   8C C7 62 39 2B 6C 96 D3  ...#...V..b9+l..
#     00F0: 1F 25 CA 7D 6D BA 06 5C   38 FC 46 D0 E4 E1 DD A8  .%..m..\8.F.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.027 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A6 65 7E 18 18 CE E7 38   24 E2 42 B7 44 76 82 C4  .e.....8$.B.Dv..
#     0010: 25 36 9A 70 7B 3B 5C 7A   B7 23 E1 A0 DB B3 2A E8  %6.p.;\z.#....*.
#     0020: F6 A5 9A 35 A2 14 C2 08   FE 09 39 C2 6B 2C 7A 85  ...5......9.k,z.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.029 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:33.030 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:33.031 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:33.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:33.031 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:33.031 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:33.032 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.032 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.035 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E ED 40 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:08.000 UTC",
#       "not  after"         : "2023-12-31 07:37:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E BE ED 2D 4A 68 EA 3A   A9 BC ED 60 FF C2 99 64  ...-Jh.:...`...d
#           0010: 0F 32 2E 92                                        .2..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 76 9F FE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:01.000 UTC",
#       "not  after"         : "2023-12-31 07:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#           0010: 8F 81 D6 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.059 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 3A EE 36 0B 83 83 C3   FD F9 79 C4 94 18 48 82  l:.6......y...H.
#     0010: 89 84 AC 2A 46 88 CE B3   FB 7C 7A A1 06 6F AB 1A  ...*F.....z..o..
#     0020: 1B 68 FA 9D DF F2 81 A2   8F F7 84 EE 41 0A 87 20  .h..........A..
#     0030: 84 9A 09 7F A9 15 95 75   B2 13 D8 DC 0F F9 F2 47  .......u.......G
#     0040: D6 B2 75 71 7F 3C 81 6A   26 FD 7D 88 30 8D 92 8E  ..uq.<.j&...0...
#     0050: 21 2C 0A 10 C1 B6 70 27   30 9E 3A BA 3D 79 A5 DB  !,....p'0.:.=y..
#     0060: 64 DD 13 57 1E 06 75 EC   FD 5F 6A 88 82 32 CD 45  d..W..u.._j..2.E
#     0070: 33 64 E7 49 CD 38 38 2A   D8 BE CA 43 40 56 57 26  3d.I.88*...C@VW&
#     0080: 09 F0 71 B2 76 B5 12 4B   79 8A 50 0A 14 67 32 A6  ..q.v..Ky.P..g2.
#     0090: C9 55 D6 34 EE 15 DE 4B   4E 2D 53 3C A1 18 9C 62  .U.4...KN-S<...b
#     00A0: 98 35 C9 7C C2 B7 83 78   90 78 8D 97 3A 65 38 C9  .5.....x.x..:e8.
#     00B0: 7D D8 C9 70 F4 3F 80 29   EF CA 51 5C D1 E6 E7 7F  ...p.?.)..Q\....
#     00C0: B7 05 6E A4 80 3A A1 BB   49 C4 9C DD 52 80 A6 9D  ..n..:..I...R...
#     00D0: 5D B5 FC 35 1C D4 E0 1B   3C 91 07 DF 3D FF 6C 36  ]..5....<...=.l6
#     00E0: 8D 38 79 43 8D D8 74 18   29 42 4F B3 B0 0A 7B A2  .8yC..t.)BO.....
#     00F0: A8 8E 1C 0A 41 78 B1 40   8F 8B 8C F5 26 51 5A 98  ....Ax.@....&QZ.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.060 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C D9 4B FC 1C E3 60 67   58 94 C2 CA 25 5B 3A 7A  ..K...`gX...%[:z
#     0010: B6 EF 38 97 1B C5 A4 44   E3 94 E5 FA BC E9 42 03  ..8....D......B.
#     0020: 0C 21 A6 13 2A DD 60 0E   D1 41 CB A3 B1 3A 2D 78  .!..*.`..A...:-x
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.060 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:33.107 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "06 D9 90 1D 83 A7 CF 55 F7 9D 12 A4 4F DF 27 D9 E3 BD F8 C3 A8 61 44 29 F7 48 59 E1 F2 96 8A 2C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 07:37:33.435 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 07:37:33.436 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 07:37:34.385; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 07:37:34.391; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 07:37:34.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 07:37:34.764; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 07:37:34.764; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wj0wNp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:34.796 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E ED 40 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:08.000 UTC",
#     "not  after"         : "2023-12-31 07:37:08.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E BE ED 2D 4A 68 EA 3A   A9 BC ED 60 FF C2 99 64  ...-Jh.:...`...d
#         0010: 0F 32 2E 92                                        .2..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:34.800 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F DA AC 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:00.000 UTC",
#     "not  after"         : "2023-12-31 07:37:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:34.815 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:35.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:35.132 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:35.133 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:35.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:35.296 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.296 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:35.298 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:35.298 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.304 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.315 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.316 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:35.318 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8F E5 40 0D 1F B7 D7 D8 DE EB DE 5E 39 26 FB 06 64 74 D2 05 57 F1 D2 7B 1C E7 9B D6 7B 0E 5D D3",
#   "session id"          : "43 EB CA D0 B2 FB E2 3A FC 76 60 E1 3C 4C 1E D7 19 D0 46 D8 E4 26 97 7A D9 4C 77 BE 20 68 F1 CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD E2 3A A5 FA 5C DC E0   1B 50 14 F9 2C BE 0D BA  ..:..\...P..,...
#             0010: ED C1 BF 65 A7 CC 26 5F   16 FD 2B B6 7B B0 F6 3C  ...e..&_..+....<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.431 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F8 EF A5 9A 49 D9 D2 F8 C6 22 69 8F A1 2B C2 FE 59 12 F6 E8 27 EF 9A 72 1A F9 F0 B3 72 99 A0 7D",
#   "session id"          : "43 EB CA D0 B2 FB E2 3A FC 76 60 E1 3C 4C 1E D7 19 D0 46 D8 E4 26 97 7A D9 4C 77 BE 20 68 F1 CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2B 7C 1D 7E 00 61 C4 A5   D8 76 DA E4 56 6F 0E AD  +....a...v..Vo..
#           0010: F5 3A D9 06 D7 EA 8B 92   C4 0D 64 F2 70 2B C9 23  .:........d.p+.#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.432 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.432 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.434 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.434 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.435 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.436 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.436 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.436 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.436 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.436 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.437 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.444 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.446 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.447 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.450 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.451 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.452 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.452 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.453 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.454 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.454 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.454 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.455 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.455 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.458 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 FA 3F DD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:04.000 UTC",
#       "not  after"         : "2023-12-31 07:37:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 ED 52 83 6B 50 C6 47   8A E8 03 3A 8E 2F 80 28  ..R.kP.G...:./.(
#           0010: 81 AE 1B 23                                        ...#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.458 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.549 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 76 9F FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 07:37:01.000 UTC",
#     "not  after"         : "2023-12-31 07:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#         0010: 8F 81 D6 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#         0010: 24 98 37 04                                        $.7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.553 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 EF D0 2B 33 FB 19 B8   3C 9F 9C 4D F4 1D 40 B2  ...+3...<..M..@.
#     0010: 71 7A 5A FB 95 84 37 F3   39 CD 37 A7 01 EA 6A 60  qzZ...7.9.7...j`
#     0020: 95 8A 40 6B 59 5C 03 90   A5 AF B7 53 DB CA CD 31  ..@kY\.....S...1
#     0030: E8 0D 83 77 E2 2E 7D 5F   FD C3 AA A1 AC AB AB 6C  ...w..._.......l
#     0040: 04 16 83 A9 BC 43 8E EB   4B 89 BA 81 16 BE 64 F3  .....C..K.....d.
#     0050: 2B E3 DC 7D 48 AF 5E 27   59 2F EC 1E 08 8F E5 0E  +...H.^'Y/......
#     0060: 81 C6 59 94 37 5D 2B FE   79 7B F4 8E 37 E0 7D 4D  ..Y.7]+.y...7..M
#     0070: 9F D6 D2 84 3D 30 2E EA   FF CE B8 FD 45 48 8B 81  ....=0......EH..
#     0080: 70 C7 8D C6 B6 E8 96 3C   4B 28 A2 F1 8F A2 80 70  p......<K(.....p
#     0090: CB 45 DC 0F 71 EF 46 01   FF FE C4 25 F2 EE E4 1F  .E..q.F....%....
#     00A0: 98 4C EC 28 EC 59 65 40   05 72 93 34 C7 D7 FD 2F  .L.(.Ye@.r.4.../
#     00B0: 80 D3 2D D0 6B C8 A9 7B   3F 09 A8 71 8D 66 C9 FD  ..-.k...?..q.f..
#     00C0: A1 15 A6 16 CF BC F5 22   25 4C 62 84 68 A7 67 A3  ......."%Lb.h.g.
#     00D0: F9 0A 56 DE 60 18 01 07   DE 47 C1 9F 84 64 8A 41  ..V.`....G...d.A
#     00E0: 3A E6 B9 27 F5 72 FD CF   8D 98 60 DF 90 87 B4 A5  :..'.r....`.....
#     00F0: 1D AF 5C 28 14 D1 D9 D5   40 7B 11 3C 3E 5E C6 63  ..\(....@..<>^.c
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.555 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F8 B0 28 45 AE 4E A0 ED   35 8D 13 3D 3B F6 DF 82  ..(E.N..5..=;...
#     0010: 85 71 98 8F E0 12 C1 6B   EC E6 94 48 5D 12 6B 4F  .q.....k...H].kO
#     0020: 0D 49 92 EA 53 97 0C 65   90 3E 05 82 72 CD BF AD  .I..S..e.>..r...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.557 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:35.558 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.558 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:35.559 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.559 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 07:37:35.559 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:35.559 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.559 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.562 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E ED 40 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:08.000 UTC",
#       "not  after"         : "2023-12-31 07:37:08.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E BE ED 2D 4A 68 EA 3A   A9 BC ED 60 FF C2 99 64  ...-Jh.:...`...d
#           0010: 0F 32 2E 92                                        .2..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 76 9F FE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:01.000 UTC",
#       "not  after"         : "2023-12-31 07:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#           0010: 8F 81 D6 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.589 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 C5 A3 B7 AB 1B BB 1D   70 86 E9 16 A8 8D B7 DD  C.......p.......
#     0010: AA 2F A4 AA B0 64 E3 89   3B 88 E2 01 1E 3E B6 68  ./...d..;....>.h
#     0020: E9 C3 96 7B 7D 5F B7 73   FB F9 E6 C7 0C 16 70 7F  ....._.s......p.
#     0030: 1D 19 0A 46 15 B2 A9 07   B4 96 C9 53 A0 C0 5F 6B  ...F.......S.._k
#     0040: 47 93 D2 8B 97 A6 94 7D   C0 B8 A2 2C B4 AD 2B 5D  G..........,..+]
#     0050: 5F 21 87 2C B0 1A 64 C3   AE C0 DF DC 87 6D 56 DA  _!.,..d......mV.
#     0060: 11 3E D8 4B C5 98 1F 29   48 CD 65 7E 2D 76 34 EF  .>.K...)H.e.-v4.
#     0070: 5A CF F1 79 11 FE 6D 64   8D C6 73 FA EF EE F3 06  Z..y..md..s.....
#     0080: 3E F8 57 AE 32 C1 4E 72   56 5C D5 7A 39 68 CF 2E  >.W.2.NrV\.z9h..
#     0090: 42 DD FD A9 0D 81 1D BE   22 D3 08 24 DE EE 8E E2  B......."..$....
#     00A0: 32 1F 8D AD 82 8F 3B C1   45 8A 2F FE 0D 0B 16 4C  2.....;.E./....L
#     00B0: FA E5 66 71 2C CA 11 6C   2D C6 15 3D 93 F4 01 C3  ..fq,..l-..=....
#     00C0: AA C1 D8 05 C4 65 0F 7D   7C 2F 43 EE 09 91 C9 EC  .....e.../C.....
#     00D0: 11 72 1E 2E 2B 2A 8B 73   EF 03 74 87 9F 85 4E CF  .r..+*.s..t...N.
#     00E0: 20 F8 85 3F A7 2F 97 42   DA 40 B7 8B 24 B1 85 F3   ..?./.B.@..$...
#     00F0: 83 72 BB A5 49 EC 8D 2C   A5 BB F5 D7 BE C7 19 82  .r..I..,........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.590 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E 8B E1 F5 8A 75 66 3B   A0 02 99 0C F3 CF 55 D4  .....uf;......U.
#     0010: 4E 3C 1B DD 1A 48 19 37   8D 51 9C F7 51 28 42 39  N<...H.7.Q..Q(B9
#     0020: C2 8F 45 18 CF 3F A5 1D   CD 99 E6 03 12 71 F1 6A  ..E..?.......q.j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.591 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:35.639 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "07 78 A5 D4 12 0C FF F9 CB B7 B2 68 AE B4 68 D5 9D 1F 6F FE 7E 69 B6 C9 D6 25 4C 73 69 EF AC 5D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 07:37:35.916 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 07:37:35.917 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 07:37:46.949; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:47.282 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F DA AC 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:00.000 UTC",
#       "not  after"         : "2023-12-31 07:37:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#           0010: 8F 81 D6 22                                        ..."
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 76 9F FE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 07:37:01.000 UTC",
#       "not  after"         : "2023-12-31 07:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 90 0D 4B 5A C5 CB 87   15 28 8C 00 D9 AC 46 C2  %..KZ....(....F.
#           0010: 8F 81 D6 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C 49 D6 BE 9F 47 5E 2C   AA 89 2D 7C A5 69 88 94  LI...G^,..-..i..
#           0010: 24 98 37 04                                        $.7.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 07:37:47.299 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:47.664 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:47.669 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:47.670 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:37:47.670 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:47.802 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:47.804 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 07:37:47.805 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.811 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.824 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.824 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 07:37:47.827 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E 66 A5 7D 46 15 D5 BE B1 4F 09 60 F4 41 D2 E6 7B C4 CF 03 A5 45 B6 42 FC CB F1 E7 A2 8A A2 2C",
#     "session id"          : "50 FA 4F F3 60 40 F9 9C 14 9A B5 BD B0 0A 4D 1D F4 52 46 87 61 27 A2 EA 0D E6 DB 24 1C 22 5E 2C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 08 C3 3C 74 92 41 A6 9D   4B ED 12 DE E6 AC 31 BA  ..<t.A..K.....1.
#               0010: C0 3A D2 FE 6F FD 97 B9   0B 1E 73 1E C6 03 0C 54  .:..o.....s....T
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.846 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "28 97 FC 6A 02 9B 07 65 ED 14 06 A5 1F B5 89 A8 9D 3A 69 79 D4 3C F4 AA 3E 72 54 28 67 E2 7A EB",
#     "session id"          : "50 FA 4F F3 60 40 F9 9C 14 9A B5 BD B0 0A 4D 1D F4 52 46 87 61 27 A2 EA 0D E6 DB 24 1C 22 5E 2C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 26 4B 39 1B D7 93 42 1B   38 26 BE 88 DD 32 BC 7E  &K9...B.8&...2..
#             0010: 98 3B ED 45 B5 30 74 3B   C4 06 77 58 6B B8 5F 00  .;.E.0t;..wXk._.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.846 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.846 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.847 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.848 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.849 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.851 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.851 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:47.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:47.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.861 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.863 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.864 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.868 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.868 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.868 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.868 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.868 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:47.869 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:37:47.869 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 07:37:47.871 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sch

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 07:39:07.496 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:39:07.539 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:39:07.539 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:39:07.539 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 07:39:07.539 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38788/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28196ms
ok 65 stop command for single port in 31235ms
ok 66 status detects locally running solr in 14431ms
ok 67 status does not expose cli parameters to end user in 217ms
ok 68 listing out files in 2180ms
ok 69 copying files around in 6659ms
ok 70 upconfig in 2650ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1212ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1204ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 50s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m15s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5589 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5589/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44973/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 03:51:33.085; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 03:51:33.091; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 03:51:34.340; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 03:51:34.381; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22562ms
ok 61 start solr with client truststore and security manager in 24940ms
not ok 62 start solr with mTLS needed in 59665ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZxPphw/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44973.
#
# Started Solr server on port 44973 (pid=199109). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44974.
#
# Started Solr server on port 44974 (pid=199538). Happy searching!
#
# INFO  - 2023-10-02 03:52:57.065; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 03:52:57.071; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 03:52:57.458; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 03:52:57.462; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 03:52:57.462; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:52:57.496 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E F6 FD 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:33.000 UTC",
#     "not  after"         : "2023-12-31 03:52:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8A D4 B1 C9 0B 61 01 E6   97 7F 2E 20 FE CA 2A 70  .....a..... ..*p
#         0010: ED 60 FF 55                                        .`.U
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:52:57.500 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E EE 88 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:24.000 UTC",
#     "not  after"         : "2023-12-31 03:52:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:52:57.516 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:52:58.010 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.010 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:52:58.012 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:52:58.013 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.032 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:52:58.035 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F5 95 03 D2 03 16 14 9D 7F 8D BE 15 1B 2F 30 25 E4 69 32 B3 46 5A 96 26 06 C3 31 BF 82 50 84 08",
#   "session id"          : "DB B7 D6 5F 2F 57 D3 0C BA 09 CA CD 8C B5 BA 17 60 F6 7D DA 3B A9 67 7B 1D 7D 5A 31 C1 2A ED B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6E C0 AA 52 F9 6B 07 BB   93 C8 C8 40 BB AD D7 E9  n..R.k.....@....
#             0010: 54 73 F8 77 47 4E 84 69   E3 09 C5 A1 47 56 83 77  Ts.wGN.i....GV.w
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.155 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "17 84 87 6A C7 31 1F 8D 27 A1 56 80 AA EB 97 E9 6C DA 60 39 C2 EB 30 EE B2 AB 4D A1 9C 11 32 BF",
#   "session id"          : "DB B7 D6 5F 2F 57 D3 0C BA 09 CA CD 8C B5 BA 17 60 F6 7D DA 3B A9 67 7B 1D 7D 5A 31 C1 2A ED B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 DC 6A A9 AC DE DA 6F   DA F0 48 4B 51 7C BF 55  w.j....o..HKQ..U
#           0010: 5D 22 35 95 F0 42 3E 8C   D1 6F F9 FA 2C FC 3C 58  ]"5..B>..o..,.<X
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.155 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.156 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.158 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.158 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.158 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.160 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.160 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.160 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.161 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.170 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.172 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.173 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.177 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.177 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.177 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.178 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.180 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.181 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.183 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.184 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.184 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.188 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 0E 2B C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:29.000 UTC",
#       "not  after"         : "2023-12-31 03:52:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 0A 39 FD C4 12 EF AF   26 2F 28 87 C4 3E 64 DF  ..9.....&/(..>d.
#           0010: C9 2C EB 7C                                        .,..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.188 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:52:58.225 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:52:58.227 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:52:58.227 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:52:58.227 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.271 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.275 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5A 6B 87 C5 49 73 04 65   BA 64 9C DC 28 A7 20 4C  Zk..Is.e.d..(. L
#     0010: E8 19 07 4A 13 62 52 AB   53 C0 E0 FA 1D 28 C5 C4  ...J.bR.S....(..
#     0020: D9 26 62 15 22 05 33 9A   54 62 84 3F F7 FB A3 04  .&b.".3.Tb.?....
#     0030: 37 CB 5B 3C 4C 54 B8 D0   3A 30 27 97 D4 91 B1 8D  7.[<LT..:0'.....
#     0040: 94 FC 8F E3 FD 65 5E 5B   35 BD 6D 54 41 B5 9D CB  .....e^[5.mTA...
#     0050: 3F 5F A4 60 EC 6F 2B 15   6C D9 16 E1 B6 F5 5D D5  ?_.`.o+.l.....].
#     0060: 52 02 98 FE 9C 38 46 78   46 BA A3 FE BA 68 BB 4B  R....8FxF....h.K
#     0070: 87 CE F7 5C 7A D0 99 F9   90 1B F4 56 D4 3D CA 70  ...\z......V.=.p
#     0080: 4F 28 2B 30 26 0D 49 0A   AE 42 A4 3C 4A C0 79 EF  O(+0&.I..B.<J.y.
#     0090: 18 4E AD 26 D7 7F 1B 65   DF A2 5E F7 06 87 8B 80  .N.&...e..^.....
#     00A0: C9 9E 97 E8 87 34 CA B5   C4 74 AC 5F 57 6B BE 9B  .....4...t._Wk..
#     00B0: 55 1C B5 DC D1 28 56 FA   30 F3 E0 C9 DA 53 72 5D  U....(V.0....Sr]
#     00C0: ED 73 08 85 70 CB 73 66   0B E6 D3 A6 2D 53 EA 53  .s..p.sf....-S.S
#     00D0: 0E FB 0B BC 87 D8 C3 55   34 99 82 62 FC A2 26 76  .......U4..b..&v
#     00E0: 5B CD F3 C9 29 54 28 53   C8 5F 17 48 40 A3 6B F1  [...)T(S._.H@.k.
#     00F0: 2C 40 16 FA 03 9D 6E 23   1F 81 42 96 2D A3 96 C6  ,@....n#..B.-...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.276 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D BA AE D0 8A 3B 8D CF   38 1E 8B 1A 1F 6F 79 DB  .....;..8....oy.
#     0010: DC 12 23 64 54 24 58 C7   46 EE 81 9B DA CB E7 CA  ..#dT$X.F.......
#     0020: 17 10 A9 41 0E 12 A5 E2   83 10 48 12 9B 0E B5 F9  ...A......H.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.278 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:52:58.279 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.280 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:52:58.280 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.280 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:52:58.280 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:52:58.281 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.281 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.283 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E F6 FD 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:33.000 UTC",
#       "not  after"         : "2023-12-31 03:52:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8A D4 B1 C9 0B 61 01 E6   97 7F 2E 20 FE CA 2A 70  .....a..... ..*p
#           0010: ED 60 FF 55                                        .`.U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 CC E4 73",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:26.000 UTC",
#       "not  after"         : "2023-12-31 03:52:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#           0010: D9 43 58 0A                                        .CX.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.310 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 B1 4E 88 20 15 E7 C6   25 3E A1 86 73 B7 97 3C  9.N. ...%>..s..<
#     0010: 7D 57 1E 38 59 DA EF 50   10 DA D7 85 05 05 CF E0  .W.8Y..P........
#     0020: B4 F5 62 70 E7 7D 61 70   41 57 B5 C7 C2 3E C2 EC  ..bp..apAW...>..
#     0030: 3A E2 3F 2C FA 4A 7F 8C   1D E4 09 9A 00 2E BD 6B  :.?,.J.........k
#     0040: 1E B1 15 6F 30 7B 99 B0   0B 82 E2 79 B6 E6 D0 01  ...o0......y....
#     0050: 4F 75 C0 BA 76 1F FB 21   07 96 A3 F6 01 9B 4B 9F  Ou..v..!......K.
#     0060: F8 0E AD F3 61 F8 2C 9E   8D 0E 0D 2E E9 FD 48 B6  ....a.,.......H.
#     0070: 3E 35 44 55 7C 1C 53 0B   C3 F2 B8 E2 E2 B7 25 54  >5DU..S.......%T
#     0080: ED DF B9 7D BB 51 CA F3   91 CC 75 ED BD B4 FF A0  .....Q....u.....
#     0090: 11 3C 57 CA FD 3D 7E 2A   B4 FD BB D1 95 3B EE DA  .<W..=.*.....;..
#     00A0: 83 91 6D 70 84 F2 C7 45   49 00 51 5F 09 D8 04 A3  ..mp...EI.Q_....
#     00B0: EC 74 24 48 D2 86 B9 2A   2F D2 38 9E 0A 46 7A 9D  .t$H...*/.8..Fz.
#     00C0: A0 BF 22 56 1D 72 86 FB   BD 34 44 8B 9C 78 C6 73  .."V.r...4D..x.s
#     00D0: DB F9 A0 61 EE 4D 66 84   4E 37 3D 13 53 A4 53 BA  ...a.Mf.N7=.S.S.
#     00E0: 1C 46 7C 50 22 21 EB C1   D4 06 39 F2 64 F0 D4 36  .F.P"!....9.d..6
#     00F0: B9 7B EB 3C 5A 83 E7 98   BA 85 6E E5 D9 C5 8E D7  ...<Z.....n.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.311 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AB 83 E9 EE 14 D5 FF CC   60 3E BD C0 BE 1F 25 17  ........`>....%.
#     0010: 08 84 97 4A 96 86 89 86   CE E1 26 7E 70 78 C8 E8  ...J......&.px..
#     0020: FC A0 1E D0 05 B1 0B F7   9A 2C 0D 93 98 6F E4 F9  .........,...o..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.311 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:52:58.368 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 8F 01 AE 90 04 60 22 DB FA 74 B4 63 0B D2 19 C3 C7 37 D0 79 2B FA 57 A0 6F 23 39 78 80 A0 40",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 03:52:58.646 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 03:52:58.647 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 03:52:59.602; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 03:52:59.607; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 03:52:59.991; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 03:52:59.994; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 03:52:59.994; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxPphw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:53:00.029 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E F6 FD 6E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:33.000 UTC",
#     "not  after"         : "2023-12-31 03:52:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8A D4 B1 C9 0B 61 01 E6   97 7F 2E 20 FE CA 2A 70  .....a..... ..*p
#         0010: ED 60 FF 55                                        .`.U
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:53:00.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E EE 88 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:24.000 UTC",
#     "not  after"         : "2023-12-31 03:52:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 03:53:00.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:00.406 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:00.408 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:00.408 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:00.409 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:00.565 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.566 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:00.568 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:00.568 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.574 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.586 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.586 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.587 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:00.590 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "91 D8 6A 61 2E 7D DF D9 05 4D CF D0 9B FB 94 5D B8 2B 0A 28 FF C3 05 11 EF 21 7B AA 29 CD 90 0E",
#   "session id"          : "31 CE 28 5A A8 D9 52 7D 8D 26 EB 44 26 24 47 8D 6F 9F C8 5C D2 1A A9 D0 EB AF C8 16 E5 55 8D C5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 56 76 91 AE 5D CD 6A 8A   18 66 12 8E 7F 69 02 B0  Vv..].j..f...i..
#             0010: C7 55 75 6E 56 80 B7 E2   17 9B 92 21 B0 F2 9D 43  .UunV......!...C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.713 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F0 3B DB 21 16 0B 42 B7 F9 EA F8 C5 FC FF 12 30 5D 33 F7 86 B7 F3 42 34 FC 1C 06 7A 2B BD 71 32",
#   "session id"          : "31 CE 28 5A A8 D9 52 7D 8D 26 EB 44 26 24 47 8D 6F 9F C8 5C D2 1A A9 D0 EB AF C8 16 E5 55 8D C5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EE A3 C4 2D 27 CC 6E 9C   B9 1D C1 F3 49 9E 9D C2  ...-'.n.....I...
#           0010: 06 EC D3 95 32 EE 24 D3   1A AD 26 44 04 00 40 44  ....2.$...&D..@D
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.714 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.714 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.715 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.715 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.715 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.715 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.716 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.718 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.720 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.720 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.727 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.729 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.730 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.734 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.734 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.734 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.734 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.734 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.735 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.735 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.735 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.735 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.736 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.737 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.738 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.739 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.743 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 0E 2B C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:29.000 UTC",
#       "not  after"         : "2023-12-31 03:52:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 0A 39 FD C4 12 EF AF   26 2F 28 87 C4 3E 64 DF  ..9.....&/(..>d.
#           0010: C9 2C EB 7C                                        .,..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.744 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.828 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 CC E4 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 03:52:26.000 UTC",
#     "not  after"         : "2023-12-31 03:52:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#         0010: D9 43 58 0A                                        .CX.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#         0010: C4 18 9C 39                                        ...9
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.832 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 90 C7 13 D7 EB DC 9E   BE DE 8B 79 82 F9 AF 52  H..........y...R
#     0010: EF A9 FC 93 7D C9 41 23   28 01 04 AC 4D 19 01 7D  ......A#(...M...
#     0020: 55 56 36 B4 84 98 DE EC   84 D9 91 18 67 25 00 AF  UV6.........g%..
#     0030: A0 2D 5E 4B 6C 3A 31 5E   07 F5 63 C3 17 2F 55 5B  .-^Kl:1^..c../U[
#     0040: 02 01 B5 1E F3 C6 B3 95   CF 83 A8 A0 36 F6 05 25  ............6..%
#     0050: 62 21 E0 B1 CC 9E 1C 11   E0 28 47 70 E2 05 58 CE  b!.......(Gp..X.
#     0060: 80 4F 98 0D 46 84 76 76   18 30 0D 4B 11 67 42 63  .O..F.vv.0.K.gBc
#     0070: C3 14 6F 97 F0 1F D2 F4   69 F9 55 95 E1 86 B9 4E  ..o.....i.U....N
#     0080: C9 3F 44 59 B0 C5 FD 13   C1 7E 52 57 42 FB C8 0D  .?DY......RWB...
#     0090: FF 82 A3 62 BA F5 E7 AF   6C 0F 61 1E 5C 60 79 B3  ...b....l.a.\`y.
#     00A0: AB 1F 6F 54 AE 49 7F A9   EF 8F 52 BA 39 9A E2 DD  ..oT.I....R.9...
#     00B0: 40 04 ED EB 12 77 C8 F6   94 CB 0F A0 3C B9 ED BA  @....w......<...
#     00C0: A1 49 31 89 C8 1C 7E D0   79 B6 D8 1B 4D CC 65 C7  .I1.....y...M.e.
#     00D0: AE F1 EF ED D0 F5 F8 F1   C7 B8 81 AC CA 5B DA 52  .............[.R
#     00E0: 1E 0B C1 D1 75 2C CC 67   94 98 03 A8 A2 79 64 6E  ....u,.g.....ydn
#     00F0: 11 63 14 23 DF 36 FF 0E   FD 28 D1 84 09 B3 D2 15  .c.#.6...(......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.834 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 96 8B 6D 4B 25 29 C9 2A   DA EC 0E 49 89 E5 6A 93  ..mK%).*...I..j.
#     0010: 03 D1 27 35 A5 D6 C7 84   D6 95 7A FA 67 B4 E1 47  ..'5......z.g..G
#     0020: 7E 4D E0 94 19 00 4C 95   0E C1 27 33 17 F2 9F AE  .M....L...'3....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:53:00.837 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.838 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:53:00.838 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.838 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 03:53:00.838 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:00.839 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.839 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.842 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E F6 FD 6E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:33.000 UTC",
#       "not  after"         : "2023-12-31 03:52:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8A D4 B1 C9 0B 61 01 E6   97 7F 2E 20 FE CA 2A 70  .....a..... ..*p
#           0010: ED 60 FF 55                                        .`.U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 CC E4 73",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:26.000 UTC",
#       "not  after"         : "2023-12-31 03:52:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#           0010: D9 43 58 0A                                        .CX.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.867 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 21 6B 37 33 33 59 D3   1D 8F 6C 6F 68 74 D5 26  h!k733Y...loht.&
#     0010: 58 FB 43 AE 4D 8E BC 00   7C FE 58 15 51 F5 A4 6F  X.C.M.....X.Q..o
#     0020: C2 C7 3C D6 CC B6 BA BA   B9 49 8A 49 35 F1 07 11  ..<......I.I5...
#     0030: CF FB E6 D8 EF 12 69 8E   E8 B6 86 C1 FA BA 33 1B  ......i.......3.
#     0040: 95 C2 39 5D 6A 88 2C 04   E5 24 CA 68 10 D9 14 20  ..9]j.,..$.h...
#     0050: 03 8B CD BD C1 5B C9 85   57 76 25 37 3B B9 FA BD  .....[..Wv%7;...
#     0060: 58 D7 CB DA FE 7F 3F 5D   1E 51 22 CA 64 EA 81 9E  X.....?].Q".d...
#     0070: DF 9A F0 B7 44 03 1A F4   8A 4B D5 5D 01 44 53 90  ....D....K.].DS.
#     0080: FA 68 F4 CA F7 13 D7 D2   E9 6A 7C C1 B3 F8 F8 5A  .h.......j.....Z
#     0090: 13 6D 91 B4 30 CC 1D F4   34 55 28 F5 E2 B8 53 BD  .m..0...4U(...S.
#     00A0: 69 F6 A8 A3 1B D1 E3 A3   34 26 88 DD 09 DB 05 1C  i.......4&......
#     00B0: 79 47 05 42 89 1A FE E3   AF 33 BE 88 BC 73 D9 05  yG.B.....3...s..
#     00C0: B0 D8 D9 B2 16 A4 9D A1   DC 6C 30 D6 E4 44 36 D5  .........l0..D6.
#     00D0: 9A 99 9C 59 61 9B D0 72   5D 1F 5F 69 5C FD 5F 6F  ...Ya..r]._i\._o
#     00E0: 3B 1A 82 4A B5 26 66 8E   92 6E F0 41 0C 3A 72 7D  ;..J.&f..n.A.:r.
#     00F0: 3C AE 04 75 70 40 BA 71   C3 3A 35 AF C7 3E 4D 67  <..up@.q.:5..>Mg
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.868 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 08 B5 9D D1 93 A0 ED 14   2D 6D D7 24 FE 46 7E F2  ........-m.$.F..
#     0010: A9 74 10 C3 B8 AF EE F1   B5 C6 FD 8F 53 24 67 DE  .t..........S$g.
#     0020: 69 FD 0E 97 0B 08 7C 9F   EE 64 71 EE 20 33 D7 88  i........dq. 3..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.869 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:00.924 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A AC DE 1F EB 1E 9A 81 71 E5 99 53 0C 46 BD 00 40 90 C0 73 D2 3C CE FB D2 91 4E 29 06 DF 6D 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 03:53:01.213 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 03:53:01.214 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 03:53:12.463; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 03:53:12.777 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 CC E4 73",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:26.000 UTC",
#       "not  after"         : "2023-12-31 03:52:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#           0010: D9 43 58 0A                                        .CX.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 0A 3E 6F F2 92 51 C8   00 AE 8F 71 66 28 E1 65  ..>o..Q....qf(.e
#           0010: C4 18 9C 39                                        ...9
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E EE 88 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 03:52:24.000 UTC",
#       "not  after"         : "2023-12-31 03:52:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 34 3B 41 79 52 DF 89 CD   FF 64 97 00 C2 AA 98 CA  4;AyR....d......
#           0010: D9 43 58 0A                                        .CX.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 03:53:12.793 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:12.882 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:12.882 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:12.882 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:53:12.882 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:13.024 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:13.026 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 03:53:13.027 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.032 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.044 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.044 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.044 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 03:53:13.046 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3E 01 76 95 F1 50 25 3F 8C 45 CC 1D 29 1E 08 40 54 A2 55 15 21 EB 44 73 29 66 36 06 7A E6 26 19",
#     "session id"          : "E6 4B 79 1A 4D DD D0 CF 77 F0 E5 DB BC 9B EF EC AB C4 65 68 B5 B5 A1 85 12 31 C9 43 83 73 F2 66",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7A 8D 79 F0 A6 40 A7 8C   59 51 49 98 EB 2B 1A 38  z.y..@..YQI..+.8
#               0010: 89 DE 62 89 03 38 6E E8   FE 97 A2 2B 69 5C F9 24  ..b..8n....+i\.$
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.067 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E5 C6 8F 5F 55 48 19 24 54 3D D7 95 2F 49 44 9C 12 67 D2 05 EA C6 B5 E9 F8 46 10 8A E4 BE 38 A8",
#     "session id"          : "E6 4B 79 1A 4D DD D0 CF 77 F0 E5 DB BC 9B EF EC AB C4 65 68 B5 B5 A1 85 12 31 C9 43 83 73 F2 66",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F4 DF 3D 80 7D A2 FE 34   A8 85 FD 57 D0 04 62 F8  ..=....4...W..b.
#             0010: 0C 01 64 04 FB 27 2D FF   9E 35 B7 B4 D2 C3 C2 17  ..d..'-..5......
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.067 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.067 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.069 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.069 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.069 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.069 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.071 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.080 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.082 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.083 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.086 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.087 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:13.088 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:53:13.088 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 03:53:13.089 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sch

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 03:54:33.682 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:54:33.728 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:54:33.729 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:54:33.729 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 03:54:33.729 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44974/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28457ms
ok 65 stop command for single port in 31547ms
ok 66 status detects locally running solr in 14808ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2157ms
ok 69 copying files around in 6491ms
ok 70 upconfig in 2666ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1207ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1207ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 3s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m29s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5588 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5588/

All tests passed

Build Log:
[...truncated 1321 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39199/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-02 01:00:19.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 01:00:19.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-02 01:00:20.672; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-02 01:00:20.713; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22795ms
ok 61 start solr with client truststore and security manager in 25138ms
not ok 62 start solr with mTLS needed in 57912ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fzQ0qD/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39199.
#
# Started Solr server on port 39199 (pid=201746). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39200.
#
# Started Solr server on port 39200 (pid=202174). Happy searching!
#
# INFO  - 2023-10-02 01:01:43.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 01:01:43.916; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 01:01:44.609; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 01:01:44.613; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 01:01:44.613; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.647 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C F2 D7 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:20.000 UTC",
#     "not  after"         : "2023-12-31 01:01:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 8C D7 4A 36 3E AF A2   A7 21 AF 8C 19 BD A1 78  f..J6>...!.....x
#         0010: 73 58 2F D3                                        sX/.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.651 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 5C 40 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:11.000 UTC",
#     "not  after"         : "2023-12-31 01:01:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:44.666 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.896 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:44.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.903 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:44.918 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5F 78 0E 12 77 96 4C EA 36 A0 1B 73 8A 99 78 7F F6 CF 3F 13 1E 09 8D E8 78 E3 6A A4 7F EF DE 95",
#   "session id"          : "E5 43 7C 23 1F 7B 41 33 C9 3F BE 91 98 24 E6 97 C0 71 92 B8 E6 6D 0D 9F 03 2F 86 74 12 5C 93 B1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E3 BC C1 E2 8B 74 8D B3   B8 BB 60 5C 77 85 A8 6A  .....t....`\w..j
#             0010: 87 2F 2D 96 65 C1 D4 1F   38 CB 44 B0 74 31 B3 0C  ./-.e...8.D.t1..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.036 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "13 22 8E F7 91 11 E3 DC A2 C7 A4 8D 75 C2 DC CA 00 5D 80 20 E2 8B 86 78 51 1D AA 1F B7 06 88 37",
#   "session id"          : "E5 43 7C 23 1F 7B 41 33 C9 3F BE 91 98 24 E6 97 C0 71 92 B8 E6 6D 0D 9F 03 2F 86 74 12 5C 93 B1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 E9 09 E6 2B 25 03 B1   16 13 F0 B6 D9 B4 10 F9  ....+%..........
#           0010: E4 E5 95 AD EC 64 9F F9   35 0C E8 80 14 D2 C0 7E  .....d..5.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.037 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.037 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.038 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.039 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.041 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.041 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.042 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.043 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.051 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.053 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.055 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.058 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.059 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.060 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.062 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.063 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.064 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.065 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.065 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.069 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 3D A5 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:16.000 UTC",
#       "not  after"         : "2023-12-31 01:01:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 87 E1 BC C9 0D 73 BA   C8 97 42 83 00 2E CE 84  ......s...B.....
#           0010: 44 94 72 D4                                        D.r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.119 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:45.120 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.157 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.161 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D B6 ED 62 69 95 88 5D   3B 0D 44 7F C4 82 6E 9E  M..bi..];.D...n.
#     0010: 63 EA 63 A0 18 56 49 CF   E5 12 82 E2 CF FA 3B D3  c.c..VI.......;.
#     0020: E0 24 4A 27 24 31 4C CD   14 B8 68 43 5C 7D 3B EB  .$J'$1L...hC\.;.
#     0030: E7 41 E8 9F 4F 2D 99 11   15 57 BC 85 E5 5B F3 62  .A..O-...W...[.b
#     0040: 55 5C 94 3D 90 71 D9 9E   F8 84 98 31 5D 39 79 96  U\.=.q.....1]9y.
#     0050: 31 AD 30 4E AB 1D 51 21   68 DA EE 88 94 2F 25 EE  1.0N..Q!h..../%.
#     0060: 3E D4 98 F6 59 89 41 09   4A 32 28 6E 27 C3 B1 93  >...Y.A.J2(n'...
#     0070: 10 1C 71 27 41 3D 58 22   61 5F F2 10 DD B5 11 6B  ..q'A=X"a_.....k
#     0080: 7D 67 7F FA B8 F5 7B AA   91 03 01 73 78 B1 AE 6E  .g.........sx..n
#     0090: ED FB 61 2A 12 E2 3D C8   00 C5 42 7B 70 AC 0C D0  ..a*..=...B.p...
#     00A0: A1 2D 21 DD E3 DC 3E 12   50 9D 1E 1F 82 BD 25 49  .-!...>.P.....%I
#     00B0: B6 C9 19 58 21 66 47 68   DC 2D FA C9 58 03 A3 53  ...X!fGh.-..X..S
#     00C0: 10 AB 4A 25 B3 EE 76 28   0B E4 E7 5B 6E B7 E4 C6  ..J%..v(...[n...
#     00D0: B1 4C 5E D2 23 2E 0E 5C   4C 42 69 A3 5E 3B 77 9C  .L^.#..\LBi.^;w.
#     00E0: 99 A5 B5 B9 DE 05 31 6B   CA DF E1 72 AD 6A 5C 79  ......1k...r.j\y
#     00F0: 77 64 1D 24 84 82 AF C2   DE 51 A5 5E 63 11 60 16  wd.$.....Q.^c.`.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.163 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 19 EA 22 AF 7A 2B 32 0E   69 66 DE 5C D4 B4 A6 7F  ..".z+2.if.\....
#     0010: 8C 9A 3C B7 A5 F8 BD 6E   31 A1 96 86 02 17 5D A4  ..<....n1.....].
#     0020: CC A0 EC 53 BC 36 D7 7B   4E DC BD B5 B5 99 06 2E  ...S.6..N.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.165 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.166 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.166 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:45.167 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.168 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.170 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C F2 D7 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:20.000 UTC",
#       "not  after"         : "2023-12-31 01:01:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 8C D7 4A 36 3E AF A2   A7 21 AF 8C 19 BD A1 78  f..J6>...!.....x
#           0010: 73 58 2F D3                                        sX/.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 48 B8 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:13.000 UTC",
#       "not  after"         : "2023-12-31 01:01:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#           0010: 07 8B DB F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.197 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2B 49 0E 37 EC 0F 36 3D   33 27 64 8D 01 05 DA D9  +I.7..6=3'd.....
#     0010: 61 BB C6 C1 0A C2 DD 8C   5E 5F AD 0F 36 34 B9 C7  a.......^_..64..
#     0020: 10 DE C8 BC ED 9F 1B 20   94 FE AA 65 E4 E2 6E FD  ....... ...e..n.
#     0030: E4 07 E6 C1 03 FC 3E BC   96 6C F6 30 12 7D 29 78  ......>..l.0..)x
#     0040: D2 D2 A5 7C 36 C5 73 C5   42 4B F8 1F D2 F5 65 79  ....6.s.BK....ey
#     0050: 1B BF BD E6 D5 88 49 09   29 BB 95 BF C3 C5 87 AB  ......I.).......
#     0060: EC 13 E2 4D 4B 21 9D 06   9E B8 5D 98 4E FA 64 15  ...MK!....].N.d.
#     0070: D1 E4 DF B9 22 04 0B AA   08 DF 6F 30 71 C7 BA 26  ....".....o0q..&
#     0080: 5A C8 BA 3C 6E D3 D1 A0   CF F6 AE E7 9A 25 EB 6F  Z..<n........%.o
#     0090: 20 0F 03 F8 22 42 72 EE   01 E8 CB 2A 08 F5 7F 41   ..."Br....*...A
#     00A0: E8 57 21 C3 17 B7 49 75   85 A3 FD 37 47 2E 5A 71  .W!...Iu...7G.Zq
#     00B0: 04 62 93 B4 0E 62 9C 1E   EB 14 5C 88 3B 6D 4E 33  .b...b....\.;mN3
#     00C0: AA D9 0A C2 62 92 75 D4   3F 7E C2 46 23 03 B9 73  ....b.u.?..F#..s
#     00D0: A7 6B 50 22 BD 5B A5 A8   A6 CE 6E 4F 35 09 0E 06  .kP".[....nO5...
#     00E0: 75 26 6A 35 78 0C DD 71   A9 C8 C5 B2 F9 7B 29 4F  u&j5x..q......)O
#     00F0: E5 F8 13 2E F5 32 D0 20   29 FF 0C 39 9A A3 8D 40  .....2. )..9...@
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.198 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 70 DB 0C E3 76 35 48   6B B5 91 D0 34 5E 9E F5  .p...v5Hk...4^..
#     0010: 2C 1D 69 58 C1 26 02 ED   C7 3C DD D9 8A 26 0C 8C  ,.iX.&...<...&..
#     0020: F9 09 DD DE 5B 22 E4 F9   0C 68 95 DA 35 DA 34 C8  ....["...h..5.4.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.198 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:45.248 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "67 35 AD 8C D9 A3 F4 D1 B1 28 5E 37 B3 F0 75 0D 1C E5 3B DD 1D 44 2D 24 7C 17 26 8C E5 97 8F 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 01:01:45.533 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 01:01:45.534 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-02 01:01:46.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-02 01:01:46.493; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-02 01:01:46.863; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 01:01:46.866; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-02 01:01:46.867; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fzQ0qD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.898 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C F2 D7 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:20.000 UTC",
#     "not  after"         : "2023-12-31 01:01:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 8C D7 4A 36 3E AF A2   A7 21 AF 8C 19 BD A1 78  f..J6>...!.....x
#         0010: 73 58 2F D3                                        sX/.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.902 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 5C 40 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:11.000 UTC",
#     "not  after"         : "2023-12-31 01:01:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:46.917 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.435 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.436 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.438 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:01:47.438 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.444 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:01:47.459 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8A 3B BE DB 99 26 EF BC C6 E0 1A 8A 41 C6 FD 8F 46 3F 32 74 47 23 8E E8 AA 54 FB 9B 99 92 63 6F",
#   "session id"          : "B1 8F BE BB 4E 5A 50 2D 6E 76 6C 7E 20 73 C8 3F 37 1E 1F 4E A7 9C 67 34 B4 78 11 7F 91 22 08 4C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 99 75 62 78 6C 9E 93   CE 13 E5 8C 7A 41 7F BB  ..ubxl......zA..
#             0010: 84 6A AC C2 9B 47 8C 4F   DE D2 E2 12 7F EE E3 7D  .j...G.O........
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.576 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F5 C8 0A 03 FE 93 52 08 5C 0D 16 9C 94 D8 F8 47 D9 DC 21 5E 04 AE A4 14 AA ED DE 5A 6F 8D 94 56",
#   "session id"          : "B1 8F BE BB 4E 5A 50 2D 6E 76 6C 7E 20 73 C8 3F 37 1E 1F 4E A7 9C 67 34 B4 78 11 7F 91 22 08 4C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BE 2E 36 63 29 92 3F 96   2C E7 73 C1 10 88 EB 62  ..6c).?.,.s....b
#           0010: 2C 39 5D 0C F6 D2 9C 11   6A CD 2D 5D C9 0F C1 30  ,9].....j.-]...0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.577 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.577 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.579 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.581 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.590 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.593 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.596 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.599 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.599 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.600 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.604 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "52 3D A5 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:16.000 UTC",
#       "not  after"         : "2023-12-31 01:01:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A9 87 E1 BC C9 0D 73 BA   C8 97 42 83 00 2E CE 84  ......s...B.....
#           0010: 44 94 72 D4                                        D.r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.678 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.681 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.682 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:01:47.682 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.717 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 48 B8 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-02 01:01:13.000 UTC",
#     "not  after"         : "2023-12-31 01:01:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#         0010: 07 8B DB F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#         0010: 7B 15 3F 74                                        ..?t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.721 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 1A C0 A2 2C 41 84 DC   8E 2E A6 EE D0 F5 3D 8E  ....,A........=.
#     0010: 1A 30 EA 78 09 C6 B7 9D   32 97 56 1F 06 9E BF 84  .0.x....2.V.....
#     0020: B6 BF 27 94 B3 46 A6 9A   AE 78 72 D6 7D E5 CF CC  ..'..F...xr.....
#     0030: DC 6C 68 B9 1C 44 1A D0   CC 60 37 BB 8B 54 D7 6C  .lh..D...`7..T.l
#     0040: 67 24 83 DA C9 EC D4 91   27 75 BC A2 05 69 64 B2  g$......'u...id.
#     0050: 34 4A 6F E1 FD 67 45 1B   19 3C 06 79 F3 5C FC D0  4Jo..gE..<.y.\..
#     0060: 06 4E 96 6D F7 04 1B C0   5C 6B 99 B4 7F FA 65 A5  .N.m....\k....e.
#     0070: BC 0F 7C D0 8F CD 9E 63   6D FE 7D 00 C7 A2 9C D6  .......cm.......
#     0080: 46 D1 80 55 C4 A8 4E DD   98 9D 9E FE E8 C5 5F FF  F..U..N......._.
#     0090: 98 98 B9 B2 DD E9 A3 E5   07 A0 8D 6F 9F FC 35 50  ...........o..5P
#     00A0: 43 8F 06 80 ED 2C A4 12   29 69 42 CD A3 3F C0 C0  C....,..)iB..?..
#     00B0: 24 2B 73 6E 13 61 F2 86   05 99 BE 9C 69 7D E0 3A  $+sn.a......i..:
#     00C0: D8 9F 50 F3 58 53 DD 54   3D AD C0 C2 D9 0E 5D 11  ..P.XS.T=.....].
#     00D0: 2B 92 34 2F F1 6B BB B6   52 BD 5F B9 E1 FC DA D4  +.4/.k..R._.....
#     00E0: 9C 09 18 0F 9D E2 6D 3B   1D 8B 14 2E 86 B1 D7 43  ......m;.......C
#     00F0: 41 51 0D 34 8D 21 F3 D7   53 57 86 30 66 A2 99 0B  AQ.4.!..SW.0f...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.723 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4D 29 1B 1C 7D 9D 1B FB   C1 7B 9D 6E 04 A1 A3 30  M).........n...0
#     0010: BC 3C A2 F5 70 F1 C8 48   A7 E8 61 0A DA C0 D4 D7  .<..p..H..a.....
#     0020: 3F 06 58 7A 59 3D AB D3   90 97 66 60 0B 41 6A F9  ?.XzY=....f`.Aj.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.726 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.727 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.727 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:01:47.728 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.729 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.731 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C F2 D7 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:20.000 UTC",
#       "not  after"         : "2023-12-31 01:01:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 8C D7 4A 36 3E AF A2   A7 21 AF 8C 19 BD A1 78  f..J6>...!.....x
#           0010: 73 58 2F D3                                        sX/.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 48 B8 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:13.000 UTC",
#       "not  after"         : "2023-12-31 01:01:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#           0010: 07 8B DB F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.758 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 87 03 64 4E 8C 01 2F CB   DD 0F 15 1E 38 68 BE C4  ..dN../.....8h..
#     0010: F6 80 DF 14 B7 CE A7 47   81 48 F9 09 A3 A6 19 69  .......G.H.....i
#     0020: B4 DD 76 3B 8E AB 52 29   DD B7 1A 44 70 53 AC 0A  ..v;..R)...DpS..
#     0030: 73 55 3A C9 84 EC 48 36   B8 CA 23 71 28 BC ED E8  sU:...H6..#q(...
#     0040: 2B 7C 3A AB 12 4E 46 6B   55 C4 7F 77 50 4C DF 1C  +.:..NFkU..wPL..
#     0050: 5C 75 A5 8C 50 EB 58 B8   B7 C9 36 C3 0A E0 D8 17  \u..P.X...6.....
#     0060: 98 28 EA 9C 01 D2 01 19   72 AB E1 43 2F B9 39 EF  .(......r..C/.9.
#     0070: BE 3E 59 F4 F3 8A F4 EF   62 5C 45 90 98 C6 4D 46  .>Y.....b\E...MF
#     0080: 43 C3 5A B7 A4 43 CD 97   60 F1 49 40 67 82 CC 5C  C.Z..C..`.I@g..\
#     0090: 74 D1 23 60 08 98 E0 D7   5A 42 20 3B 7C 36 84 ED  t.#`....ZB ;.6..
#     00A0: D1 48 84 08 5D F0 65 7F   9E CD 78 B8 8C 37 0A 38  .H..].e...x..7.8
#     00B0: BC F8 05 E3 0E A9 F5 51   49 4C D0 09 3D B6 F1 4C  .......QIL..=..L
#     00C0: D9 AD D3 59 66 CD 83 21   65 7F C9 C2 EB 81 09 63  ...Yf..!e......c
#     00D0: C1 1F 83 43 39 86 74 8A   5E 46 1C 52 B3 1E 49 AD  ...C9.t.^F.R..I.
#     00E0: EF 23 6A 74 CC 21 50 36   0F D2 DF 33 B0 E9 7B 4A  .#jt.!P6...3...J
#     00F0: 95 00 7D 39 E9 04 CF BA   A1 49 A6 3F 54 88 1A EF  ...9.....I.?T...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.759 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 82 96 14 42 F1 7C A2 4E   0A 48 F3 08 1F 9C 2C F7  ...B...N.H....,.
#     0010: 3E CB 6B F6 F8 46 18 FC   81 EF F6 F2 52 49 BF 31  >.k..F......RI.1
#     0020: 22 47 1E C2 0C E2 72 0A   48 13 A8 44 E3 EC A9 22  "G....r.H..D..."
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.760 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:01:47.810 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "78 40 A3 B3 2C B0 DF 3E 26 D7 5B 04 BC 93 6B 7A 2C 49 22 58 E0 85 F0 72 89 70 F5 35 B3 4C 3F EE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-02 01:01:48.073 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-02 01:01:48.074 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-02 01:01:59.529; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:59.860 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 5C 40 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:11.000 UTC",
#       "not  after"         : "2023-12-31 01:01:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#           0010: 07 8B DB F4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 48 B8 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-02 01:01:13.000 UTC",
#       "not  after"         : "2023-12-31 01:01:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 8B F4 CB 18 1A E3 36   6A 76 2E 7D B9 76 EA BB  *......6jv...v..
#           0010: 07 8B DB F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE F5 FB 2F D7 34 8C 4C   EE CB 7A DC 92 D9 9F F1  .../.4.L..z.....
#           0010: 7B 15 3F 74                                        ..?t
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-02 01:01:59.875 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-02 01:02:00.108 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.113 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-02 01:02:00.127 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "14 F0 C9 1D 5E AE 72 3B BD CA E7 9C BD 72 8F E0 0B 50 E8 D1 A9 1D 7E BB 89 DB 19 C9 D7 A4 15 17",
#     "session id"          : "DA 8C 25 59 31 81 82 1E 92 36 2B 9B CA 92 0A 1F 1C 92 1E 0B 3E 6C E6 83 96 FF 6A A9 EF 0E 8A 07",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2A A6 94 79 05 ED 8F E3   BE EE 65 62 19 05 3D E9  *..y......eb..=.
#               0010: 76 53 41 52 BC D9 FE 40   FF EE 3B 52 0C 0A A4 6B  vSAR...@..;R...k
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.147 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "40 9A 7D 20 CC 7F D9 38 B8 8F FA DB 9E 4E E9 04 7A 8B 4D D8 08 79 3E 4F FE B2 75 90 AC 4E 46 39",
#     "session id"          : "DA 8C 25 59 31 81 82 1E 92 36 2B 9B CA 92 0A 1F 1C 92 1E 0B 3E 6C E6 83 96 FF 6A A9 EF 0E 8A 07",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 89 56 16 C3 5D AF A0   A0 C3 F7 8C 0B 6A 71 8B  ..V..].......jq.
#             0010: 97 1C C1 68 01 F3 3A 9E   03 E0 67 7F 8E F3 74 21  ...h..:...g...t!
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.149 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.150 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.160 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.162 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.163 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.166 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.166 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:02:00.167 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-02 01:02:00.169 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_r

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-02 01:03:18.896 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.949 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-02 01:03:18.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39200/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28489ms
ok 65 stop command for single port in 31289ms
ok 66 status detects locally running solr in 14359ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2199ms
ok 69 copying files around in 6626ms
ok 70 upconfig in 2613ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1208ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 53s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m19.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5587 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5587/

1 tests failed.
FAILED:  org.apache.solr.client.solrj.request.json.JsonQueryRequestHeatmapFacetingTest.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([2B9F6F7550F443D4]:0)




Build Log:
[...truncated 1334 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39241/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-01 21:06:28.810; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 21:06:28.816; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-01 21:06:29.709; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-01 21:06:29.748; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22610ms
ok 61 start solr with client truststore and security manager in 24693ms
not ok 62 start solr with mTLS needed in 57120ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wcaNCh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39241.
#
# Started Solr server on port 39241 (pid=202476). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39242.
#
# Started Solr server on port 39242 (pid=202905). Happy searching!
#
# INFO  - 2023-10-01 21:07:52.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 21:07:52.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 21:07:52.550; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 21:07:52.553; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 21:07:52.553; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:52.585 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 39 75 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:28.000 UTC",
#     "not  after"         : "2023-12-30 21:07:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 9B 67 70 77 B0 31 2E   CA A7 CF 2E CF 15 68 82  ..gpw.1.......h.
#         0010: F5 65 E1 0E                                        .e..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:52.589 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 77 91 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:20.000 UTC",
#     "not  after"         : "2023-12-30 21:07:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:52.604 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:52.833 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.833 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:52.835 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:52.835 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.840 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.852 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.852 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.852 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:52.854 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AF 08 B2 34 85 5A 61 48 CA B6 1A 4B 6A 3F EA 8C 24 36 AE DA D8 B1 84 98 A4 E5 B0 59 D8 FF E1 0D",
#   "session id"          : "EF 12 6A FC ED E0 CA 31 8C 54 76 FB 80 00 F5 D6 94 97 CE 9A F1 D1 BB E8 64 20 15 88 42 B1 C7 A8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F8 86 1D BD ED 4F E4 17   4E 98 AE 36 80 16 C9 CB  .....O..N..6....
#             0010: A5 35 D4 B1 33 AF 46 30   7D 70 E0 2A CF AD 3B 6E  .5..3.F0.p.*..;n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.961 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AA BA D1 3C 4F 1B D3 2C 89 23 95 BB 53 D2 FC CF A8 EC 68 9F 85 E2 BC 82 02 C5 07 58 0A 2B F6 7E",
#   "session id"          : "EF 12 6A FC ED E0 CA 31 8C 54 76 FB 80 00 F5 D6 94 97 CE 9A F1 D1 BB E8 64 20 15 88 42 B1 C7 A8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6A D3 25 01 83 2D 76 A8   21 1D 62 9A 05 DF 73 B6  j.%..-v.!.b...s.
#           0010: AE 8B B1 C0 DB 0D 56 17   2C 0A 33 98 72 BF B1 1E  ......V.,.3.r...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.961 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.962 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.963 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.964 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.966 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.966 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.966 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.967 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:52.968 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:52.968 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.975 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.976 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.978 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.981 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:52.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.984 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.984 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.985 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.985 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.986 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.986 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:52.987 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.990 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 8E 87 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:24.000 UTC",
#       "not  after"         : "2023-12-30 21:07:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EF 63 CE BD 24 96 27 3F   44 4F CD AA 12 AF ED 56  .c..$.'?DO.....V
#           0010: 1A 2F 15 0B                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:52.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:53.058 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:53.058 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:53.059 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:53.059 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.082 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.086 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 C2 0A B6 88 E5 FF A7   E0 49 3D 06 E4 E3 14 A5  0........I=.....
#     0010: 7A 44 7F 84 92 84 4F 11   19 15 1A F4 76 EC AD D9  zD....O.....v...
#     0020: 49 3A 89 D6 BB 48 45 24   B3 AE E4 86 93 98 E9 6B  I:...HE$.......k
#     0030: D2 24 13 C4 60 9E 9F 66   38 36 3B F7 FC B1 FA 17  .$..`..f86;.....
#     0040: 8D 48 BF B4 41 D1 65 18   91 19 5A AE BC 4D 46 2A  .H..A.e...Z..MF*
#     0050: 62 BD E1 0D 8C 47 8F 31   2D AF E5 E8 70 32 FD 3C  b....G.1-...p2.<
#     0060: 87 46 BE 01 7C F8 19 C7   7A AA BB 5A A7 8B EC 0A  .F......z..Z....
#     0070: 35 C5 16 EB 75 91 51 A5   0E 3A E4 70 CB E0 BA 75  5...u.Q..:.p...u
#     0080: 54 80 E4 86 62 11 D6 22   2D 14 A9 BE BC 64 2C E1  T...b.."-....d,.
#     0090: E9 C3 17 A9 F3 54 D0 F7   B6 AB 8C 93 51 11 94 19  .....T......Q...
#     00A0: 2E E3 19 20 2D 54 0D ED   10 B0 81 5C 62 6D CA 13  ... -T.....\bm..
#     00B0: 21 47 64 77 B3 0C D9 EB   99 FE 44 4B CF D4 3C E1  !Gdw......DK..<.
#     00C0: C8 F6 4E 59 22 F8 03 4A   09 E9 F4 27 DA B1 26 F1  ..NY"..J...'..&.
#     00D0: 48 E1 D8 F2 BA 27 54 B2   1F 2F 28 E7 18 75 99 78  H....'T../(..u.x
#     00E0: 05 5D 66 56 86 4C 36 21   45 A5 1E B6 04 11 F8 A6  .]fV.L6!E.......
#     00F0: 8E CD 55 A0 73 CB 8A 01   3B C6 E7 2B 4D BA 01 38  ..U.s...;..+M..8
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.088 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 74 83 8F 9E CF 60 A8 CA   3F 2B 40 C2 AD 4E 63 6D  t....`..?+@..Ncm
#     0010: CC 93 7F BB 2B 99 D1 8A   66 42 FC F1 B8 0C E3 E6  ....+...fB......
#     0020: 4B F7 68 8C 99 B9 DD 03   A1 4F 59 36 0F 44 D0 1B  K.h......OY6.D..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.090 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:53.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:53.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:53.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:53.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:53.092 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:53.092 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.092 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.095 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 39 75 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:28.000 UTC",
#       "not  after"         : "2023-12-30 21:07:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 9B 67 70 77 B0 31 2E   CA A7 CF 2E CF 15 68 82  ..gpw.1.......h.
#           0010: F5 65 E1 0E                                        .e..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 24 6D B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:22.000 UTC",
#       "not  after"         : "2023-12-30 21:07:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#           0010: C4 A0 2B 0A                                        ..+.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.122 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 35 64 DA 04 2E 3D 89   7F AF 24 60 05 68 90 BD  p5d...=...$`.h..
#     0010: 89 D2 A0 05 2A 70 BD 90   7F B2 19 7F 20 92 CE 63  ....*p...... ..c
#     0020: A1 48 70 30 C8 CB 4A 2D   9F 11 E4 A2 E3 43 E2 99  .Hp0..J-.....C..
#     0030: 6E 74 FA FA 6A 03 BF D1   A6 A3 5A E6 99 51 88 0C  nt..j.....Z..Q..
#     0040: 03 49 0B B5 7E 29 78 57   98 24 F1 97 47 C4 84 BD  .I...)xW.$..G...
#     0050: 2F E6 CB 56 32 39 7C 56   37 6C FF FE 10 50 85 B7  /..V29.V7l...P..
#     0060: 4F 60 36 09 16 28 72 5A   E3 D0 E5 68 4C 50 69 94  O`6..(rZ...hLPi.
#     0070: 89 2A AE 21 CC DA C5 CB   12 54 F1 8E 06 05 6A 13  .*.!.....T....j.
#     0080: 77 8A 43 D0 F4 81 C6 42   BC B5 3D D5 7B 8D 72 D5  w.C....B..=...r.
#     0090: 60 0F 56 A6 43 11 04 BF   81 89 05 CB 8B 88 70 1B  `.V.C.........p.
#     00A0: 84 FE F1 E1 A7 3C 00 D5   8A 25 19 BA 5D 39 4D 6B  .....<...%..]9Mk
#     00B0: 87 2A CF 68 C0 9D 1C 2C   27 D9 71 71 BE 78 C3 1B  .*.h...,'.qq.x..
#     00C0: BD DC C6 8C D3 BD A5 81   7C 99 09 C2 8A B6 A2 3A  ...............:
#     00D0: D5 EA 3E 48 65 E2 7E 0A   C0 6F BB 97 84 96 3D 74  ..>He....o....=t
#     00E0: 1D 85 07 C0 1B 4E 67 33   53 31 2E FA 27 38 D4 B7  .....Ng3S1..'8..
#     00F0: 6B 8F E6 5D 75 76 9A B1   A5 79 07 D2 95 A6 30 D2  k..]uv...y....0.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.123 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 89 AB 2D 62 46 85 3F   CA 45 10 2A 55 01 87 20  ...-bF.?.E.*U..
#     0010: E3 4B 97 62 C4 C1 D6 64   28 57 E3 8B AB 04 FA 57  .K.b...d(W.....W
#     0020: C7 40 61 9C E0 A1 AE 67   C1 B5 D7 AD AE 7A AB 5A  .@a....g.....z.Z
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.124 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:53.171 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9A 6C F1 17 A5 DD D0 85 82 BB 57 50 47 84 D9 3E 7D D4 E4 5A 7B 71 74 F6 C6 D4 E2 E2 FF 2D E0 20",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 21:07:53.430 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 21:07:53.431 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-01 21:07:54.359; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 21:07:54.364; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 21:07:54.744; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 21:07:54.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 21:07:54.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wcaNCh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:54.779 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 39 75 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:28.000 UTC",
#     "not  after"         : "2023-12-30 21:07:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 9B 67 70 77 B0 31 2E   CA A7 CF 2E CF 15 68 82  ..gpw.1.......h.
#         0010: F5 65 E1 0E                                        .e..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:54.783 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 77 91 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:20.000 UTC",
#     "not  after"         : "2023-12-30 21:07:20.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 21:07:54.797 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:54.991 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:54.991 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:54.993 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:07:54.993 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:54.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:55.010 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:55.010 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:55.011 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:07:55.013 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5D F6 70 8D 76 04 B2 51 D2 19 BD A7 A9 DA 69 01 38 45 C8 05 B5 BB D5 3F 48 49 11 21 4A 7A 6A AA",
#   "session id"          : "BC B0 92 4D 6A D4 84 B7 AC 0F F5 F6 1C 9D 03 38 23 97 36 E0 CF D4 4D 5B 8B 2F EC 56 9E 97 1C 01",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 27 F1 45 97 0D CA D4 D3   FE 65 4A D4 D6 24 51 DE  '.E......eJ..$Q.
#             0010: C6 DA DF 74 00 66 A8 C9   C3 17 8B 1B A8 2C 50 10  ...t.f.......,P.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.116 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "AC 66 BC BB E5 A1 9E 2D AD 43 FE C7 79 68 A3 06 26 88 F8 EC 33 0A A2 FD 4A 98 AF C4 41 3C 69 88",
#   "session id"          : "BC B0 92 4D 6A D4 84 B7 AC 0F F5 F6 1C 9D 03 38 23 97 36 E0 CF D4 4D 5B 8B 2F EC 56 9E 97 1C 01",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 83 2F DF 7B C2 C7 8A 9A   21 D9 9D F7 04 6A F8 23  ./......!....j.#
#           0010: C6 67 98 58 DB 34 B9 62   E6 A9 AC BD BE 72 21 2D  .g.X.4.b.....r!-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.116 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.117 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.119 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.120 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.120 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.121 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.129 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.131 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.132 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.135 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.136 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.138 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.138 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.139 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.139 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.140 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.140 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.143 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 8E 87 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:24.000 UTC",
#       "not  after"         : "2023-12-30 21:07:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EF 63 CE BD 24 96 27 3F   44 4F CD AA 12 AF ED 56  .c..$.'?DO.....V
#           0010: 1A 2F 15 0B                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.143 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:55.177 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:55.180 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:55.180 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:07:55.180 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.224 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 24 6D B1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 21:07:22.000 UTC",
#     "not  after"         : "2023-12-30 21:07:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#         0010: C4 A0 2B 0A                                        ..+.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#         0010: 56 E5 D2 5B                                        V..[
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.228 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 80 36 39 B9 44 A3 24 5C   75 3F A0 C3 65 9E 84 DF  .69.D.$\u?..e...
#     0010: 72 31 02 C7 DA B0 F4 5C   FA 75 52 44 BE 5E D1 23  r1.....\.uRD.^.#
#     0020: B3 89 7C 1D C1 17 C3 7C   83 9F F1 49 E5 03 57 A4  ...........I..W.
#     0030: 17 41 15 53 DE 58 B5 5F   B2 54 2C C4 4E DC D6 96  .A.S.X._.T,.N...
#     0040: D0 D4 DA 13 F9 21 D6 C7   8D 3B 14 CA 18 75 D9 56  .....!...;...u.V
#     0050: 1E 78 D6 CB B3 29 1A A1   AD B2 EA 7D D0 D5 BA DD  .x...)..........
#     0060: D2 12 A9 77 9D D2 D2 B1   49 DC 79 26 BD E8 88 27  ...w....I.y&...'
#     0070: D1 49 F7 D3 EF 46 2C 4F   B7 69 14 3C 8C 1E D6 47  .I...F,O.i.<...G
#     0080: 8C ED 84 A0 FC 41 05 EA   85 2B DA 2B 05 D0 7F 17  .....A...+.+....
#     0090: 6F 27 2D 23 7E EC A7 EE   F5 E4 70 73 B5 F3 96 F2  o'-#......ps....
#     00A0: 5C E5 F4 BE EF CC 1C B0   67 1F D8 E5 A6 66 92 07  \.......g....f..
#     00B0: C6 D6 1F 72 21 9C 30 CF   29 2C 85 60 63 B9 4C D6  ...r!.0.),.`c.L.
#     00C0: 80 5F D9 CD E8 BF F2 76   4D 28 38 35 FF EB 9D F8  ._.....vM(85....
#     00D0: E3 C9 3C 61 83 13 7A A3   F3 BD 82 A5 68 EF A3 2A  ..<a..z.....h..*
#     00E0: 2E 65 01 69 45 E8 0C DA   C0 3D 8D A6 5E 38 2F 86  .e.iE....=..^8/.
#     00F0: CA 3E E8 77 F2 C4 6F C4   EF AE 3B C3 7C A7 F0 A0  .>.w..o...;.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.229 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 66 82 55 C5 4E FD A1   FF C5 8C 93 66 5C CB 32  pf.U.N......f\.2
#     0010: C7 9A DF 66 81 40 D5 78   57 12 83 CD 37 6E 33 AA  ...f.@.xW...7n3.
#     0020: 92 18 35 73 BB 3D D0 CF   0A 09 37 A5 CA 41 DB 84  ..5s.=....7..A..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:55.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.233 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:55.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.233 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 21:07:55.233 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:07:55.234 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.234 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.237 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 39 75 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:28.000 UTC",
#       "not  after"         : "2023-12-30 21:07:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 9B 67 70 77 B0 31 2E   CA A7 CF 2E CF 15 68 82  ..gpw.1.......h.
#           0010: F5 65 E1 0E                                        .e..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 24 6D B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:22.000 UTC",
#       "not  after"         : "2023-12-30 21:07:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#           0010: C4 A0 2B 0A                                        ..+.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.263 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AF C0 E4 50 3D 91 DC 59   D1 5B 1B 31 3E C0 D7 90  ...P=..Y.[.1>...
#     0010: 89 12 72 D0 0B 4D BC 6C   04 1F 9F 6F 9C 5C 13 6A  ..r..M.l...o.\.j
#     0020: B0 73 AF C6 DD B3 F3 CA   47 54 3F 32 DA F3 51 EF  .s......GT?2..Q.
#     0030: EC 8D 8C 4F B6 B8 C0 04   AB E8 CF 4F B7 78 6F 43  ...O.......O.xoC
#     0040: BB 82 8A 41 02 12 65 5A   BF 22 39 A3 96 1E 2E CF  ...A..eZ."9.....
#     0050: DA FF EE A3 B3 1C 3B 85   04 50 16 2D 90 2C 19 E2  ......;..P.-.,..
#     0060: 7E 59 7C 3C 18 76 D4 07   51 4E 04 C4 0D E3 D0 C5  .Y.<.v..QN......
#     0070: 33 C3 E7 79 07 35 BD 1F   AD 8D 76 31 FF 50 EE 29  3..y.5....v1.P.)
#     0080: 26 7D 5C 82 D6 CB 59 73   3A 0B 00 C9 12 22 AF A0  &.\...Ys:...."..
#     0090: 7A ED B3 CA 99 05 1D 10   DB 6E E6 2C 6A 4E 88 18  z........n.,jN..
#     00A0: 0C 12 7D CB 48 80 BB 38   70 CB F6 49 4A 62 55 C2  ....H..8p..IJbU.
#     00B0: 56 C2 EB 33 98 C8 62 7A   EE 8E 5A 85 AF E5 68 34  V..3..bz..Z...h4
#     00C0: A6 0A ED EB 68 AA A9 0C   80 E7 90 9E 11 BD 3A 7C  ....h.........:.
#     00D0: E1 D5 19 4A 1F 2B 87 1D   05 7D 7C 46 3C 10 FC F6  ...J.+.....F<...
#     00E0: 05 DD F2 81 D3 A8 97 0C   3F 8D D4 01 E3 79 A3 A5  ........?....y..
#     00F0: 8F 9E 76 D6 5E 76 DE B2   2A 11 A5 78 15 F0 BA 82  ..v.^v..*..x....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.264 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 34 5F 7E 28 00 DB 58   9D F3 A2 B6 C8 87 20 A3  .4_.(..X...... .
#     0010: EB 9B 7D 57 C6 AA E4 78   E7 8F 36 B7 B4 3E B8 D8  ...W...x..6..>..
#     0020: 20 09 19 08 5E 97 C7 27   50 F2 A5 52 40 61 B0 F0   ...^..'P..R@a..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.265 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:07:55.312 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 53 14 73 ED 29 27 7D 5E A1 FD 3E 8D DF F0 27 E3 1D 5E B4 C6 20 A1 8F 22 F9 20 6E 2B 76 05 31",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 21:07:55.580 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 21:07:55.581 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-01 21:08:06.803; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-01 21:08:07.160 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 77 91 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:20.000 UTC",
#       "not  after"         : "2023-12-30 21:07:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#           0010: C4 A0 2B 0A                                        ..+.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 24 6D B1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 21:07:22.000 UTC",
#       "not  after"         : "2023-12-30 21:07:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 14 7F DB F9 48 B3 F9 E5   CC 1B 0C AB E2 C4 91 6A  ....H..........j
#           0010: C4 A0 2B 0A                                        ..+.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 37 90 12 D8 6E A2 71   D9 78 E3 B0 AB 9E 7B 29  .7...n.q.x.....)
#           0010: 56 E5 D2 5B                                        V..[
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-01 21:08:07.177 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:08:07.522 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:08:07.523 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:08:07.523 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 21:08:07.523 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:08:07.676 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.676 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:08:07.679 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 21:08:07.679 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.685 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.696 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.697 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.697 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 21:08:07.699 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E9 1E C3 D0 EA F4 D1 F9 A7 75 D0 19 0D BF 7F D7 AC C0 EC 3A C7 E8 A4 43 B3 2F B3 E5 A5 73 12 6C",
#     "session id"          : "D2 EA DA 92 DF 77 FF 2D A9 E1 6A AD 3A E5 91 67 C5 79 80 6D 2A C6 86 7C 05 99 54 BA CD 46 08 2B",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 35 9E 24 C6 F5 EA E0 97   7E BF 4B FB BF 32 B6 ED  5.$.......K..2..
#               0010: 8C 98 D7 84 85 1D 46 4D   1E 96 86 29 BC 7A F0 13  ......FM...).z..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.719 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B7 6B 06 C5 47 EF CA 8B 6D 31 D5 07 7B B5 7E 73 CA 50 57 0F D3 28 02 50 C4 FF 2C A6 1F 18 F3 E1",
#     "session id"          : "D2 EA DA 92 DF 77 FF 2D A9 E1 6A AD 3A E5 91 67 C5 79 80 6D 2A C6 86 7C 05 99 54 BA CD 46 08 2B",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 FE F5 F2 EB 64 CB 91   33 09 8E 56 CD CC 37 1D  Y....d..3..V..7.
#             0010: 1F 43 38 2E 1A 3C DA 7E   1B FA 43 4A 26 BD 4A 73  .C8..<....CJ&.Js
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.719 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.721 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.723 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.723 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.732 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.734 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.735 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.739 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.739 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 21:08:07.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_neg

[...truncated too long message...]

read[id=18, name=NIOServerCxnFactory.SelectorThread-0, state=RUNNABLE, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/java.lang.Thread.isInterrupted(Native Method)
  2>         at java.base@11.0.16/java.lang.Thread.isInterrupted(Thread.java:1033)
  2>         at java.base@11.0.16/java.nio.channels.spi.AbstractSelector.begin(AbstractSelector.java:218)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.begin(SelectorImpl.java:94)
  2>         at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:116)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.select(NIOServerCnxnFactory.java:403)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.run(NIOServerCnxnFactory.java:368)
  2>   14) Thread[id=26, name=NIOWorkerThread-2, state=WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
  2>         at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   15) Thread[id=29, name=NIOWorkerThread-3, state=WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
  2>         at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   16) Thread[id=52, name=httpShardExecutor-15-thread-2, state=TIMED_WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.SynchronousQueue$TransferStack.awaitFulfill(SynchronousQueue.java:462)
  2>         at java.base@11.0.16/java.util.concurrent.SynchronousQueue$TransferStack.transfer(SynchronousQueue.java:361)
  2>         at java.base@11.0.16/java.util.concurrent.SynchronousQueue.poll(SynchronousQueue.java:937)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1053)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   17) Thread[id=63, name=CloserThread, state=WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/java.lang.Object.wait(Native Method)
  2>         at java.base@11.0.16/java.lang.Object.wait(Object.java:328)
  2>         at app//org.apache.solr.core.CloserThread.run(CoreContainer.java:2603)
  2>   18) Thread[id=47, name=Session-HouseKeeper-298fa53-1, state=TIMED_WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:1182)
  2>         at java.base@11.0.16/java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQueue.take(ScheduledThreadPoolExecutor.java:899)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   19) Thread[id=41, name=qtp325154358-41, state=TIMED_WAITING, group=TGRP-JsonQueryRequestHeatmapFacetingTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
   >     java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
   >         at __randomizedtesting.SeedInfo.seed([2B9F6F7550F443D4]:0)
  2> NOTE: test params are: codec=Asserting(Lucene95), sim=Asserting(RandomSimilarity(queryNorm=false): {}), locale=so-DJ, timezone=Europe/Chisinau
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=22,free=311960056,total=343932928
  2> NOTE: All tests run in this JVM: [JsonQueryRequestHeatmapFacetingTest]
  2> NOTE: reproduce with: gradlew test --tests JsonQueryRequestHeatmapFacetingTest -Dtests.seed=2B9F6F7550F443D4 -Dtests.locale=so-DJ -Dtests.timezone=Europe/Chisinau -Dtests.asserts=true -Dtests.file.encoding=UTF-8

:solr:solrj:test (FAILURE): 1143 test(s), 1 failure(s), 41 skipped

1143 tests completed, 1 failed, 41 skipped

> Task :solr:solrj:test FAILED
> Task :solr:solrj:wipeTaskTemp

ERROR: The following test(s) have failed:
  - org.apache.solr.client.solrj.request.json.JsonQueryRequestHeatmapFacetingTest.classMethod (:solr:solrj)
    Test output: /tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.request.json.JsonQueryRequestHeatmapFacetingTest.txt
    Reproduce with: gradlew :solr:solrj:test --tests "org.apache.solr.client.solrj.request.json.JsonQueryRequestHeatmapFacetingTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=2B9F6F7550F443D4 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 2h 2m 20s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 2h2m44s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5586 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5586/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39827/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-01 05:04:36.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 05:04:36.311; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-01 05:04:37.180; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-01 05:04:37.221; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22386ms
ok 61 start solr with client truststore and security manager in 25102ms
not ok 62 start solr with mTLS needed in 55935ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-N0G8aw/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39827.
#
# Started Solr server on port 39827 (pid=196705). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39828.
#
# Started Solr server on port 39828 (pid=197133). Happy searching!
#
# INFO  - 2023-10-01 05:05:59.413; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 05:05:59.418; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 05:05:59.801; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 05:05:59.803; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 05:05:59.804; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:05:59.835 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 65 01 ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:35.000 UTC",
#     "not  after"         : "2023-12-30 05:05:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 72 88 91 CF 25 FB DF   0E 44 63 BD 29 0E 72 F5  .r...%...Dc.).r.
#         0010: B7 B4 56 77                                        ..Vw
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:05:59.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 7B 2F 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:27.000 UTC",
#     "not  after"         : "2023-12-30 05:05:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:05:59.852 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:00.071 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:00.073 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:00.073 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.078 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.090 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:00.092 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "06 7D F2 7B 88 ED C5 24 18 C6 56 BC 58 6B 0C CE 8E 8A 8F 5B 82 D5 92 F3 96 72 D4 E6 C1 7E 7C 31",
#   "session id"          : "AF D7 06 34 BA 60 A4 2E 49 87 A7 CC D1 5D CA 61 60 B3 73 5E E2 C2 1D FD 80 32 ED B1 AE 4D D9 6A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E7 8F 6A F9 89 EB 62 99   4D 16 30 1B 66 14 D0 EA  ..j...b.M.0.f...
#             0010: 15 4B 15 F1 00 44 5F BC   44 39 54 03 D9 4B D1 4B  .K...D_.D9T..K.K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.213 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7E 6B 50 1E 5A EC 15 5B A5 B5 63 DE 35 06 47 02 D1 6B 17 26 0B 4A 1C 17 89 1E 57 C5 C0 19 72 4B",
#   "session id"          : "AF D7 06 34 BA 60 A4 2E 49 87 A7 CC D1 5D CA 61 60 B3 73 5E E2 C2 1D FD 80 32 ED B1 AE 4D D9 6A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4B 41 F7 35 3C 2D 4F EF   65 6F B1 42 8F 3F 5A 63  KA.5<-O.eo.B.?Zc
#           0010: A8 23 DB 10 2E 3E 85 5B   F2 26 6E 75 04 4E 3A 09  .#...>.[.&nu.N:.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.214 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.214 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.216 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.216 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.216 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.217 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.226 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.227 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.228 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.232 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.232 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.232 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.232 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.232 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.233 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.233 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.233 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.233 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.234 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.235 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.235 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.235 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.236 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.237 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.237 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.239 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 0D 29 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:31.000 UTC",
#       "not  after"         : "2023-12-30 05:05:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 B5 7C A2 12 D1 D4 37   01 11 04 6C CB AA EE 20  .......7...l...
#           0010: F6 C7 A6 CA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.240 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:00.286 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:00.286 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:00.286 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:00.287 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.315 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.318 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 28 8A 46 A1 47 CB 88   1A FE 18 84 28 8E 0D F8  .(.F.G......(...
#     0010: 3A E7 17 8C 99 B9 23 BF   1F DA DF BD 54 5C 50 97  :.....#.....T\P.
#     0020: A6 27 9B 06 C0 30 18 56   EA 3A 0C 6B 64 DD 0A 3D  .'...0.V.:.kd..=
#     0030: 5A 54 E1 42 E7 A6 5E D0   67 82 18 0E 43 6D F9 AD  ZT.B..^.g...Cm..
#     0040: 4E 7C 3A 61 D6 88 0E 1C   AD 1F E4 BC 53 93 F3 41  N.:a........S..A
#     0050: A6 F3 B3 9C 6B 41 11 C5   88 20 10 3F F1 46 B6 B6  ....kA... .?.F..
#     0060: 0B 63 26 A7 D1 E2 E7 B3   37 0D B8 EF CE F7 53 1D  .c&.....7.....S.
#     0070: B8 0D 09 00 6B C0 F0 B6   34 AB BF BB 54 59 F3 08  ....k...4...TY..
#     0080: D3 4B 17 1E FA C7 8B EE   56 09 AA 59 0B E7 EC 71  .K......V..Y...q
#     0090: 22 4E 87 6F 04 7F 86 9A   7C 9C E7 CC CF 72 14 AE  "N.o.........r..
#     00A0: 44 BC F3 6C D8 36 74 C7   4A 25 5D 34 34 37 E5 45  D..l.6t.J%]447.E
#     00B0: 4C FC ED BC 4F 8C 87 9F   A8 D0 31 39 0D D0 EE 72  L...O.....19...r
#     00C0: 54 6E 06 23 E8 9B 4A 68   C1 F6 F5 1B 0E D0 39 F1  Tn.#..Jh......9.
#     00D0: 46 C0 DE 13 CE 0D 12 92   52 65 4C 1A A1 F3 B8 A4  F.......ReL.....
#     00E0: DA 65 F5 CB 8D A9 82 39   3D 98 8B 03 C4 3D 1D 63  .e.....9=....=.c
#     00F0: 9F A7 B3 4C 80 55 25 51   8C 2B 01 0C 67 70 F6 6C  ...L.U%Q.+..gp.l
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.320 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E6 16 33 D0 B4 73 19 E8   45 6A 2A 69 BE DC C3 22  ..3..s..Ej*i..."
#     0010: 27 64 C0 3B 22 5E 41 B7   31 19 B0 D4 97 1A 25 89  'd.;"^A.1.....%.
#     0020: CD 72 06 C5 DF 45 94 CA   D7 5A A9 4D 26 61 E4 6F  .r...E...Z.M&a.o
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.322 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:00.323 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.323 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:00.323 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.324 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:00.324 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:00.324 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.324 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.327 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 65 01 ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:35.000 UTC",
#       "not  after"         : "2023-12-30 05:05:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 72 88 91 CF 25 FB DF   0E 44 63 BD 29 0E 72 F5  .r...%...Dc.).r.
#           0010: B7 B4 56 77                                        ..Vw
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 5D 6F 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:29.000 UTC",
#       "not  after"         : "2023-12-30 05:05:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#           0010: 9D 2B 12 EF                                        .+..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.353 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E FB 80 68 5F 01 01 A5   5B 58 1E 57 E1 2E 82 63  N..h_...[X.W...c
#     0010: 88 4C 5E D7 E0 8D 3A 01   60 07 32 86 5F 10 43 7F  .L^...:.`.2._.C.
#     0020: B6 2D A1 E6 B1 87 6E 7B   12 77 91 78 F9 53 C8 35  .-....n..w.x.S.5
#     0030: 0F DD E3 FA 1B E6 4A 89   5C 6C F3 BB F3 57 70 A6  ......J.\l...Wp.
#     0040: 38 4E 3D 66 8E 8E 35 A4   B5 9E F1 8A 83 2A C7 63  8N=f..5......*.c
#     0050: 5C 37 49 11 C7 86 A9 24   3E D5 EC B5 02 6C 15 44  \7I....$>....l.D
#     0060: 55 3B 6C 52 C9 EA 16 90   9B 22 8E 44 87 CA BB 75  U;lR.....".D...u
#     0070: 19 5C D5 FC 6F A5 6B 0E   5A 04 91 DA B9 30 FB FF  .\..o.k.Z....0..
#     0080: 51 C6 19 49 A7 A2 25 3E   75 44 8E B9 7A 7E C1 3D  Q..I..%>uD..z..=
#     0090: 19 2D 50 59 61 9D 6F D8   5B 74 03 94 FF 0D 86 2D  .-PYa.o.[t.....-
#     00A0: ED 2E 40 D9 33 58 E9 C3   F7 34 41 08 B4 03 4E 3F  ..@.3X...4A...N?
#     00B0: 30 E7 38 BA 15 7C 36 04   6C FF E0 27 70 97 E3 0F  0.8...6.l..'p...
#     00C0: A1 FF 9B AF EB 61 F2 AC   E1 4A DF D6 F9 1F C6 50  .....a...J.....P
#     00D0: B4 29 59 80 4F 9E EB 8F   7D C1 BB 92 8A 7D F0 49  .)Y.O..........I
#     00E0: E3 0F 63 FD CA EE AB B3   8F 08 CA 8E D6 70 5E C3  ..c..........p^.
#     00F0: 42 95 B0 95 69 EC D7 7C   FD 09 62 97 52 6F 35 0B  B...i.....b.Ro5.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.354 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9D 6D A7 44 C3 C3 3B E4   F3 52 CC 68 61 15 89 B6  .m.D..;..R.ha...
#     0010: F1 9B 6B 58 F3 E4 00 FB   FF CC 70 DF 3D 1E 2D E8  ..kX......p.=.-.
#     0020: D5 F7 65 51 74 26 48 91   17 63 47 40 C1 28 CC DF  ..eQt&H..cG@.(..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.355 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:00.403 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8D 55 56 D6 65 B4 59 5A F2 5B 12 86 02 85 D7 90 8C C1 6D DF 64 C7 9E 8B 72 37 0E 52 18 9B EF 5E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 05:06:00.712 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 05:06:00.713 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-01 05:06:01.627; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 05:06:01.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 05:06:02.001; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 05:06:02.004; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 05:06:02.005; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-N0G8aw/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:06:02.041 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 65 01 ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:35.000 UTC",
#     "not  after"         : "2023-12-30 05:05:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 72 88 91 CF 25 FB DF   0E 44 63 BD 29 0E 72 F5  .r...%...Dc.).r.
#         0010: B7 B4 56 77                                        ..Vw
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:06:02.046 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 7B 2F 69",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:27.000 UTC",
#     "not  after"         : "2023-12-30 05:05:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 05:06:02.061 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:02.159 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:02.159 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:02.159 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:02.159 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:02.313 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.313 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:02.315 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:02.315 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.321 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.333 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.333 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.333 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:02.336 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "10 17 68 9F ED 73 D7 88 C9 9B F0 8F 9B 46 76 43 97 B1 00 BD 91 B8 9B 61 F0 7C 7E 16 0F C4 D6 03",
#   "session id"          : "52 17 2F 3D 54 4C A5 8D 2A 10 64 70 4A 62 D6 30 03 42 A1 B5 F9 F2 FB 82 22 77 33 06 0B A5 F3 0A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8A 66 21 31 56 2D C6 2F   59 39 02 92 8A BB EE 45  .f!1V-./Y9.....E
#             0010: 71 F0 8E 08 FF F1 0C A5   58 D9 EA AA D3 35 EA 17  q.......X....5..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.443 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0E 8D 9C C4 DA 90 51 18 FD 59 97 5D 4F B3 37 70 5E D2 3E 34 4D 7A 06 DE 0F 3C 03 35 57 95 2A 31",
#   "session id"          : "52 17 2F 3D 54 4C A5 8D 2A 10 64 70 4A 62 D6 30 03 42 A1 B5 F9 F2 FB 82 22 77 33 06 0B A5 F3 0A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FF 92 EC 8E 95 5D DA 48   BE F6 24 48 41 7B A9 AE  .....].H..$HA...
#           0010: BB D3 16 C2 EE FB EA DB   08 C1 6C 69 76 6A 92 4D  ..........livj.M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.444 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.444 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.446 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.447 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.447 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.456 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.457 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.458 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.462 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.462 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.462 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.462 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.462 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.463 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.463 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.463 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.463 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.464 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.465 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.465 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.465 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.466 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.467 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.467 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.469 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 0D 29 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:31.000 UTC",
#       "not  after"         : "2023-12-30 05:05:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 B5 7C A2 12 D1 D4 37   01 11 04 6C CB AA EE 20  .......7...l...
#           0010: F6 C7 A6 CA                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.470 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.559 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 5D 6F 07",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 05:05:29.000 UTC",
#     "not  after"         : "2023-12-30 05:05:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#         0010: 9D 2B 12 EF                                        .+..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#         0010: 87 D6 5A 07                                        ..Z.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.563 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 56 36 99 2C B9 17 EF   15 D9 C1 BF 75 6B 1C ED  zV6.,.......uk..
#     0010: 43 59 CB A3 51 5B 62 86   06 DD 60 06 F5 0C 38 B3  CY..Q[b...`...8.
#     0020: 98 52 D9 45 E4 C5 5C C0   3E EB F9 18 BD 92 9E 39  .R.E..\.>......9
#     0030: F3 B6 83 60 00 45 17 A1   57 CF D9 40 DE 2D 95 D6  ...`.E..W..@.-..
#     0040: B3 14 51 9B 9F 1E CE EF   8E B7 C5 94 9F C3 5D 5F  ..Q...........]_
#     0050: 74 A3 85 0C 54 E0 81 48   AB 26 99 C8 8E 83 57 6C  t...T..H.&....Wl
#     0060: 79 4C 8B D4 B1 23 F7 D7   BE D2 25 2D 62 90 C5 C5  yL...#....%-b...
#     0070: 27 48 0C 5F 77 B9 E9 A3   C0 2F 6F 13 2D DA D0 C0  'H._w..../o.-...
#     0080: 0E F0 7C 5A 5D F7 7C AC   28 C2 BC C3 20 7E FB 23  ...Z]...(... ..#
#     0090: 4A F4 CD 05 A3 62 B9 74   57 FF 60 E1 9A C8 3A 88  J....b.tW.`...:.
#     00A0: 12 C9 BD AE 5E 99 F1 F2   FE E2 D6 97 60 EB CD A7  ....^.......`...
#     00B0: F7 E4 E4 D0 6F 2E E3 A8   8F 7C 1E 75 E3 10 61 1F  ....o......u..a.
#     00C0: E0 07 26 3F 4F 97 17 4A   5A 64 68 A7 B7 D2 7B EA  ..&?O..JZdh.....
#     00D0: E4 AF EC 82 60 E0 3F 95   2C 2C 05 E9 D6 CF 59 DC  ....`.?.,,....Y.
#     00E0: 30 A4 77 3A 53 3D C1 53   BE FA 4D 27 91 5D 2B BC  0.w:S=.S..M'.]+.
#     00F0: BE 5B 4D 07 CB 06 9F 4F   AC B7 D3 EA 2C 1A B8 5C  .[M....O....,..\
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.565 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A8 AF 3F 37 EA D0 D9 CB   F4 93 EC DA AC 32 2C 47  ..?7.........2,G
#     0010: 54 2F D7 DE 52 C3 D0 05   70 80 A8 BE 8E 8A F7 D3  T/..R...p.......
#     0020: 8D 17 E4 57 BD A7 B2 DE   C3 B5 A3 6F F8 15 4D F5  ...W.......o..M.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.567 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:02.568 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.568 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:02.568 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.568 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 05:06:02.568 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:02.569 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.569 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.571 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 65 01 ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:35.000 UTC",
#       "not  after"         : "2023-12-30 05:05:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 72 88 91 CF 25 FB DF   0E 44 63 BD 29 0E 72 F5  .r...%...Dc.).r.
#           0010: B7 B4 56 77                                        ..Vw
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 5D 6F 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:29.000 UTC",
#       "not  after"         : "2023-12-30 05:05:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#           0010: 9D 2B 12 EF                                        .+..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.596 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 C0 80 EE 85 36 0F 8D   AF 0E 5C 4D B7 D1 69 9B  x....6....\M..i.
#     0010: 4D E2 13 EC 7B 7C CF 42   90 E7 F7 89 50 53 AB C8  M......B....PS..
#     0020: 90 CD 9B A0 75 15 35 42   98 8C EB D3 73 CE 8D 17  ....u.5B....s...
#     0030: 93 BB 9F B9 62 13 13 D1   5D F1 DD BD DA 53 CE F2  ....b...]....S..
#     0040: 09 A3 17 A5 AC 44 05 D8   3B 53 E3 30 E7 D2 B8 8B  .....D..;S.0....
#     0050: 81 F1 52 94 A2 FD AA AC   B7 14 11 B8 9D FB ED F0  ..R.............
#     0060: 2B 90 B9 0B DB 80 54 41   2B C6 63 F1 D1 B3 F7 BD  +.....TA+.c.....
#     0070: 77 9E 23 B3 D2 59 5C 3F   6E E7 54 46 16 99 A5 BF  w.#..Y\?n.TF....
#     0080: 71 32 A3 0D 1F FD FB AE   DC 6F 31 03 7B 51 0B E2  q2.......o1..Q..
#     0090: A9 56 9C 0B 42 E5 FC 88   98 C9 09 14 BF 45 B2 45  .V..B........E.E
#     00A0: 70 C7 FE 86 C2 56 FA AF   2F DD 67 7B A5 07 BB DB  p....V../.g.....
#     00B0: 82 64 D6 79 59 92 BF 1F   36 47 86 4D 33 60 15 58  .d.yY...6G.M3`.X
#     00C0: 81 38 95 A6 6D F7 93 AC   54 55 1C 8B 78 04 58 4B  .8..m...TU..x.XK
#     00D0: 32 DD 4A 65 A4 12 4C 23   76 18 5A 35 4C 65 8C 88  2.Je..L#v.Z5Le..
#     00E0: 4C 4F 5E 98 15 82 D2 8A   43 A4 1D A3 56 0B 6C FA  LO^.....C...V.l.
#     00F0: 94 07 34 01 D6 31 D9 24   7A 66 20 A0 3C 98 D6 D8  ..4..1.$zf .<...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.597 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A8 6B 88 63 40 92 02 37   59 CD 1D BC 45 AB 5E 89  .k.c@..7Y...E.^.
#     0010: ED 30 11 89 40 8B 17 B4   72 F6 20 CB 3E 97 B5 25  .0..@...r. .>..%
#     0020: 4A 14 45 0D E6 AD 8A 3C   54 0D 6C 1C 83 66 AD 64  J.E....<T.l..f.d
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.598 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:02.648 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 13 E4 59 CA 0E 94 4F 83 FD 3F 76 F6 9C F0 B4 8D AC 75 6D CF 52 0E 89 CC 7C DA 5C 68 67 76 11",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 05:06:02.924 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 05:06:02.925 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-01 05:06:13.701; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-01 05:06:14.035 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 7B 2F 69",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:27.000 UTC",
#       "not  after"         : "2023-12-30 05:05:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#           0010: 9D 2B 12 EF                                        .+..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 5D 6F 07",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 05:05:29.000 UTC",
#       "not  after"         : "2023-12-30 05:05:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 05 71 DA 9B AC A9 B5 87   7F CE 28 14 1B 3C 69 AB  .q........(..<i.
#           0010: 9D 2B 12 EF                                        .+..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 39 06 3A 66 F6 83 96   07 00 DC 88 D6 C6 1B 59  .9.:f..........Y
#           0010: 87 D6 5A 07                                        ..Z.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-01 05:06:14.052 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:14.426 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:14.426 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:14.427 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:06:14.427 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:14.521 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:14.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 05:06:14.523 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.541 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.541 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 05:06:14.544 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "41 B8 B9 C8 63 6C 74 8B F5 AF 56 26 ED D4 EB 72 E9 60 D7 B0 8D 03 0B EB CF BC BA 07 EF B8 28 61",
#     "session id"          : "63 1A 52 3B E7 5F 1A DD 13 8A 83 18 1F 3D 39 16 27 0F DE 76 9B D7 29 2D ED 69 43 C1 19 4E EA F0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DB 26 0B 4E 67 C7 D1 2B   91 6A CD D4 BB 24 54 F1  .&.Ng..+.j...$T.
#               0010: B1 60 CD 20 95 7A CD 7A   5F 64 B9 35 FA 16 61 75  .`. .z.z_d.5..au
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.565 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "44 B5 7D 78 14 5B 5D 70 65 05 99 67 51 61 25 75 C3 35 55 F2 33 87 D4 96 33 AE 83 69 4C 89 31 A1",
#     "session id"          : "63 1A 52 3B E7 5F 1A DD 13 8A 83 18 1F 3D 39 16 27 0F DE 76 9B D7 29 2D ED 69 43 C1 19 4E EA F0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F4 04 89 9F BF 4F 88 38   DC D6 E1 0F 75 11 77 75  .....O.8....u.wu
#             0010: 1E 62 A7 D6 3D B7 19 CE   2B D8 1A FD B1 C9 05 76  .b..=...+......v
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.565 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.565 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.566 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.567 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.568 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.570 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.570 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.570 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.570 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.571 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.572 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.579 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.580 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.581 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.585 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:14.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:06:14.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 05:06:14.587 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature scheme

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 05:07:32.382 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:07:32.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:07:32.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:07:32.435 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 05:07:32.435 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39828/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28025ms
ok 65 stop command for single port in 30715ms
ok 66 status detects locally running solr in 14327ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6515ms
ok 70 upconfig in 2611ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 19m 55s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 20m28s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5585 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5585/

All tests passed

Build Log:
[...truncated 1320 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34497/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-10-01 01:46:50.072; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 01:46:50.077; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-10-01 01:46:50.959; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-01 01:46:50.999; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22503ms
ok 61 start solr with client truststore and security manager in 24410ms
not ok 62 start solr with mTLS needed in 55166ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-aCc7yI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34497.
#
# Started Solr server on port 34497 (pid=201144). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34498.
#
# Started Solr server on port 34498 (pid=201572). Happy searching!
#
# INFO  - 2023-10-01 01:48:12.621; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 01:48:12.626; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 01:48:13.000; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 01:48:13.004; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 01:48:13.004; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:13.041 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F A5 D6 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:48.000 UTC",
#     "not  after"         : "2023-12-30 01:47:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 BD 7D 5E 80 67 43 F8   5A 10 D2 39 E9 3B C3 74  ...^.gC.Z..9.;.t
#         0010: F3 97 93 B5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:13.045 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 A9 8A B5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:40.000 UTC",
#     "not  after"         : "2023-12-30 01:47:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:13.061 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:13.162 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:13.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:13.163 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:13.163 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:13.316 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.316 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:13.318 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:13.318 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.324 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.336 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:13.339 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 81 F6 DF E8 B2 04 06 E6 3C 92 B9 4D FF E3 29 38 8A 4F F7 FB 5A A2 74 23 13 C1 41 BF 9A B7 33",
#   "session id"          : "DC 26 C6 AD 10 17 46 28 C1 0A 02 95 8D 76 04 84 B9 25 53 E5 5E DF A9 82 64 78 BD 0C 2C AA 38 13",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D2 13 0D 5B E6 91 9B F5   26 DC CD B4 98 1B 40 FE  ...[....&.....@.
#             0010: 4F 78 66 E6 5F 6E CA E2   59 9B 4A 1D FA 17 4E 1C  Oxf._n..Y.J...N.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.449 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "66 3E 81 47 D8 95 2E 15 F9 DA 2A BD 13 EC 19 47 86 26 EE D5 AB 13 57 1F 55 A9 47 C6 83 56 43 4F",
#   "session id"          : "DC 26 C6 AD 10 17 46 28 C1 0A 02 95 8D 76 04 84 B9 25 53 E5 5E DF A9 82 64 78 BD 0C 2C AA 38 13",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1E 86 B9 70 17 40 F8 D1   EF A9 D0 65 AE 72 7D F9  ...p.@.....e.r..
#           0010: 71 88 F0 A6 14 2C C8 7F   24 44 8D 29 E5 26 09 36  q....,..$D.).&.6
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.449 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.453 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.454 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.463 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.464 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.465 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.469 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.469 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.469 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.469 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.470 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.472 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.472 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.473 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.474 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.477 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 67 12 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:45.000 UTC",
#       "not  after"         : "2023-12-30 01:47:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8A 38 E6 A0 A2 A0 C9 22   EE 35 3F 3C B7 07 F4 C6  .8.....".5?<....
#           0010: 3D 0B DB F2                                        =...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.477 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.566 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.570 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 FE 08 94 E3 BD B3 76   38 3F D6 C5 9C F3 E0 74  s......v8?.....t
#     0010: 97 21 83 D9 A6 0F 36 2F   2A C3 90 0D 93 98 38 E3  .!....6/*.....8.
#     0020: 47 3B 43 90 97 D0 55 A4   DB 8D 86 09 90 F7 52 D0  G;C...U.......R.
#     0030: C2 7D 86 A2 81 AA B1 B9   B6 A4 66 32 CE 02 9B 61  ..........f2...a
#     0040: 16 B0 30 C7 BB 7C 63 4B   FB 7A 00 D5 08 BE 1E FD  ..0...cK.z......
#     0050: FF 93 C4 89 EC A5 46 C7   28 C8 88 2A BC 28 86 9A  ......F.(..*.(..
#     0060: F3 5C FB 60 9E F9 82 8C   2A 90 3A 7E 6D 10 8F 38  .\.`....*.:.m..8
#     0070: 8F 6E 42 45 6D 36 C5 12   31 DF 1A 1A ED 64 B7 62  .nBEm6..1....d.b
#     0080: B9 00 2C 2C 6E DB A0 5C   5B 64 4C B4 C5 8F 4B 71  ..,,n..\[dL...Kq
#     0090: 01 48 33 E1 7D 94 80 C9   91 4D F1 92 36 9B 5A 26  .H3......M..6.Z&
#     00A0: 2A EA F2 31 26 07 13 2A   E5 92 45 E9 59 56 F9 E8  *..1&..*..E.YV..
#     00B0: 9A 3E B6 16 5D 5E E9 CE   BA E4 4D DF 4C C4 F3 5C  .>..]^....M.L..\
#     00C0: 9C C6 06 4D 2A 97 2A 95   A7 08 B6 8F C4 3D E9 78  ...M*.*......=.x
#     00D0: 3D 2F 11 0F 10 B9 67 8F   DB 75 38 59 63 01 54 0D  =/....g..u8Yc.T.
#     00E0: FB A8 48 EE D1 BB F3 4B   5A FA 77 ED 80 34 1E CF  ..H....KZ.w..4..
#     00F0: 2D 14 4C C2 3F 05 74 5A   1F AE D8 A8 1C 2A 2B B6  -.L.?.tZ.....*+.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.571 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 72 8E 4F C2 BA 55 3E 1D   7F D7 9D 1F DB ED 86 C6  r.O..U>.........
#     0010: DB BC AC 55 A5 27 80 B2   FA B8 D0 17 96 4E A0 15  ...U.'.......N..
#     0020: D1 DB E8 A3 9D AD 4A 4B   58 0D C0 E5 1F C3 0A 9C  ......JKX.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.574 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:13.574 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:13.575 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:13.575 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:13.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.576 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.578 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F A5 D6 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:48.000 UTC",
#       "not  after"         : "2023-12-30 01:47:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 BD 7D 5E 80 67 43 F8   5A 10 D2 39 E9 3B C3 74  ...^.gC.Z..9.;.t
#           0010: F3 97 93 B5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 CB DE 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:42.000 UTC",
#       "not  after"         : "2023-12-30 01:47:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#           0010: 79 06 C8 3F                                        y..?
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.603 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E F6 1E AD E4 F1 03 7F   50 C2 21 B5 DC 50 11 FD  ........P.!..P..
#     0010: A5 74 AF A2 6F 91 8D 61   C3 94 A8 80 67 F3 8D 41  .t..o..a....g..A
#     0020: 06 E5 1C 54 81 CF 11 E9   EE 2E 3E E7 6A 35 D8 CA  ...T......>.j5..
#     0030: BE F0 18 A1 01 8B FF B2   97 56 82 87 67 FC 63 8C  .........V..g.c.
#     0040: 63 83 C6 31 CD C6 91 D2   1D B7 9A 25 60 95 2D D1  c..1.......%`.-.
#     0050: F1 23 51 F3 FC 8D BA 10   66 F7 6D 47 7A 91 8B 86  .#Q.....f.mGz...
#     0060: 04 BB EB 63 CD 03 96 3C   82 F8 01 B7 EE AA 06 3D  ...c...<.......=
#     0070: A2 90 2A 60 32 D3 89 85   81 EF 64 6E 7E 3E 39 A4  ..*`2.....dn.>9.
#     0080: DA D7 BC 8A B2 74 C3 2A   D1 D1 91 5D D4 1B A4 0F  .....t.*...]....
#     0090: 99 AE A2 10 3F AC B7 91   75 CA 61 55 CB 7E C2 0C  ....?...u.aU....
#     00A0: 4A 8F 5D 96 23 53 6F 49   8D E6 15 F9 A2 C3 A4 86  J.].#SoI........
#     00B0: 9C 66 09 26 3C 06 CF FE   D4 23 65 7F C8 1D 68 18  .f.&<....#e...h.
#     00C0: FC 7C F3 0E EC 5A ED 44   CC F0 83 A2 5E D8 CC DD  .....Z.D....^...
#     00D0: E7 73 09 50 00 F5 55 87   38 28 5E 30 3F 37 D0 85  .s.P..U.8(^0?7..
#     00E0: 8E 2E 58 50 1C 09 63 25   01 19 A3 51 40 6C 79 E1  ..XP..c%...Q@ly.
#     00F0: A3 1B E9 A8 8E 37 13 C6   A6 7B C8 87 C3 29 BF 6D  .....7.......).m
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.604 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BA 94 70 CA 83 1C 38 53   59 F4 67 72 3C 07 D5 62  ..p...8SY.gr<..b
#     0010: 43 C3 7A E9 FF D2 0F BE   30 C7 A7 CC 35 65 47 89  C.z.....0...5eG.
#     0020: 61 98 62 42 A0 63 5D DE   95 AC B4 D5 A0 63 BA 9E  a.bB.c]......c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.605 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:13.655 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "55 4F 10 A4 14 28 88 A8 17 43 62 4E 1D 61 B4 67 F1 E5 22 2A A5 A2 FD 51 EF EC C9 59 D1 1B AB 70",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 01:48:13.922 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 01:48:13.923 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-01 01:48:14.839; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-01 01:48:14.844; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-01 01:48:15.211; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 01:48:15.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-01 01:48:15.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-aCc7yI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:15.246 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F A5 D6 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:48.000 UTC",
#     "not  after"         : "2023-12-30 01:47:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E3 BD 7D 5E 80 67 43 F8   5A 10 D2 39 E9 3B C3 74  ...^.gC.Z..9.;.t
#         0010: F3 97 93 B5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:15.250 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 A9 8A B5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:40.000 UTC",
#     "not  after"         : "2023-12-30 01:47:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:15.263 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:15.348 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:15.349 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:15.486 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.486 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:15.488 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:15.488 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.505 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.505 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.505 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:15.508 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A0 0F F5 D5 87 9D AF 51 AB 12 89 4D EF FA 56 76 78 28 5C EC 4B 62 89 AE 28 A1 AB 70 5D 1B 85 CB",
#   "session id"          : "CB 8F 72 CE E7 22 5C 40 EF 88 10 D6 D9 1E 1D 6D B0 65 B5 DC C9 03 2C F9 80 69 DF 32 4F AA 00 F8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 7C 2A 25 DA 02 76 99   CA 32 A9 8E DC AF 65 25  ..*%..v..2....e%
#             0010: 4B 2B DB CC 5B F5 F5 F4   D3 3E 13 FE DD 04 0E 67  K+..[....>.....g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.603 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D F7 B6 C2 60 92 0F CD 28 47 91 87 B0 60 A4 7F 18 4D E7 21 36 76 58 7C CF 00 DB 9F AC 2E 29 14",
#   "session id"          : "CB 8F 72 CE E7 22 5C 40 EF 88 10 D6 D9 1E 1D 6D B0 65 B5 DC C9 03 2C F9 80 69 DF 32 4F AA 00 F8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6D 73 E9 0B DF 0D A1 35   FA 02 27 BF CD AD 79 89  ms.....5..'...y.
#           0010: E8 C8 0C 33 D0 AE 5C E7   E4 2D 92 25 60 AC 38 66  ...3..\..-.%`.8f
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.603 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.604 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.605 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.606 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.606 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.607 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.608 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.608 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.608 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.609 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.617 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.618 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.619 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.623 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.623 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.624 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.625 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.628 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.631 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 67 12 82",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:45.000 UTC",
#       "not  after"         : "2023-12-30 01:47:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8A 38 E6 A0 A2 A0 C9 22   EE 35 3F 3C B7 07 F4 C6  .8.....".5?<....
#           0010: 3D 0B DB F2                                        =...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.631 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:15.689 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:15.689 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.708 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 CB DE 12",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-01 01:47:42.000 UTC",
#     "not  after"         : "2023-12-30 01:47:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#         0010: 79 06 C8 3F                                        y..?
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#         0010: 10 9C 70 EF                                        ..p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.711 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 48 73 40 BB 9F 4E 53   77 2F A4 34 97 3B EE ED  jHs@..NSw/.4.;..
#     0010: CE 0B 19 56 09 C6 41 43   E5 CF A4 29 63 73 41 C1  ...V..AC...)csA.
#     0020: CB A7 14 15 1E 4E EB 31   BA 40 30 5D CB B2 B9 38  .....N.1.@0]...8
#     0030: 65 51 78 10 6C 5E 5C 91   5B 3E 64 32 99 E9 AA 00  eQx.l^\.[>d2....
#     0040: 8D 4F FB 99 DB 18 6E 67   7E 2D DB 00 38 28 42 9D  .O....ng.-..8(B.
#     0050: 32 5D FA 4E 5C A3 BF 3B   6E 94 42 60 F4 6D 56 12  2].N\..;n.B`.mV.
#     0060: 91 A8 88 71 3F C5 C3 F7   2C 55 3A 6E D6 77 80 5A  ...q?...,U:n.w.Z
#     0070: FA A8 DE C4 48 B4 4B 9C   57 45 44 FE F7 7E 95 32  ....H.K.WED....2
#     0080: DF 98 B5 9D 2A 1B 44 42   14 75 97 97 CD D1 21 ED  ....*.DB.u....!.
#     0090: E5 11 1F 80 0E 8C 66 61   DE B7 91 A8 B2 35 72 D2  ......fa.....5r.
#     00A0: 1A 52 C3 3C 03 29 7F EF   60 C6 52 B2 18 0A 2A 1A  .R.<.)..`.R...*.
#     00B0: A9 1F 6D E8 24 82 B5 B2   9C 56 0C 60 DD 36 BE 16  ..m.$....V.`.6..
#     00C0: 49 45 AB 9A 74 6B 76 5A   3B AF CE F8 74 ED E7 96  IE..tkvZ;...t...
#     00D0: BB 50 91 2B 79 59 84 7E   A4 B6 E6 19 A8 C2 72 40  .P.+yY........r@
#     00E0: B6 BE 52 0D B1 9B B6 82   D7 02 DD 27 A0 13 99 9C  ..R........'....
#     00F0: 1C 79 0E BB A7 BA 67 E9   D9 80 DF 56 15 EA 0B 3E  .y....g....V...>
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.713 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F5 8B F0 E1 14 0A 0F 27   F6 CE DF C4 AA 3D BB CA  .......'.....=..
#     0010: 84 68 35 D6 C7 D6 0C CF   D9 6B DA 41 28 75 81 33  .h5......k.A(u.3
#     0020: BD 6F C7 09 3B 1A 62 FC   09 28 97 7C 2C 9F C4 AD  .o..;.b..(..,...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.715 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:15.716 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.716 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:15.716 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.716 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-10-01 01:48:15.717 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:15.717 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.717 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.720 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F A5 D6 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:48.000 UTC",
#       "not  after"         : "2023-12-30 01:47:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E3 BD 7D 5E 80 67 43 F8   5A 10 D2 39 E9 3B C3 74  ...^.gC.Z..9.;.t
#           0010: F3 97 93 B5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 CB DE 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:42.000 UTC",
#       "not  after"         : "2023-12-30 01:47:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#           0010: 79 06 C8 3F                                        y..?
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.746 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 89 ED 9F BC E8 33 28   CE EB 39 67 F4 5E 98 FA  ......3(..9g.^..
#     0010: 88 45 3A D2 D2 8C 17 CC   A2 68 1F D4 1F DD E9 BE  .E:......h......
#     0020: F1 39 D0 9F BA 20 7D 4B   36 AE 89 73 3E D3 B9 0A  .9... .K6..s>...
#     0030: 9A E2 5F ED F7 5E A7 DB   6B C5 0E 0C FE 70 C8 7A  .._..^..k....p.z
#     0040: 76 8B DC DB 42 02 D0 66   FA 29 C5 F3 3C 00 A2 63  v...B..f.)..<..c
#     0050: C5 43 04 0B 16 CC B6 CA   60 A0 55 1E 16 31 C2 45  .C......`.U..1.E
#     0060: 64 28 09 D4 96 D0 70 18   01 3B 18 FB 37 DD 57 DE  d(....p..;..7.W.
#     0070: 2D 43 24 64 8C 1A 18 32   BF C7 78 CB B3 F2 D1 2E  -C$d...2..x.....
#     0080: 2D 97 CC 55 A8 D3 AB 2B   E3 85 CD 8E A7 CC AC 13  -..U...+........
#     0090: AC F8 15 DD D5 E2 43 6B   D7 08 F1 CC 88 5A 93 09  ......Ck.....Z..
#     00A0: 0A 02 E3 14 D9 B2 EA 77   53 43 D9 58 72 F8 ED 59  .......wSC.Xr..Y
#     00B0: F6 A9 A8 BC 64 C1 79 7D   6D 98 39 93 2F C8 D3 20  ....d.y.m.9./..
#     00C0: F0 55 B2 D1 5F 41 FB 87   6A 49 D5 FC DB 74 70 32  .U.._A..jI...tp2
#     00D0: 00 9B 89 FC 4A BD E2 FB   C6 E6 3E 4B EB EF 60 68  ....J.....>K..`h
#     00E0: 9E 6D 1D D9 86 28 27 92   C4 D6 DD 08 2C 2C DA B1  .m...('.....,,..
#     00F0: CE 6D 4A A8 02 2A 2A 24   9A 30 14 8E BC 44 31 D0  .mJ..**$.0...D1.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.747 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 21 22 45 DF 5A 91 EC D1   69 6A D2 C8 55 FB 2C 31  !"E.Z...ij..U.,1
#     0010: C9 F1 85 35 AC 07 45 0C   B3 43 71 10 2F 43 FF A4  ...5..E..Cq./C..
#     0020: FC 3D 55 31 3C 01 39 51   C1 45 3D C9 6E F6 35 D4  .=U1<.9Q.E=.n.5.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.748 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:15.795 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F 90 F2 A4 A9 40 D5 AD 9B E0 24 73 AB 39 34 9B 3F E3 30 03 5A 59 CC 9D 6E 16 21 2D 2D 0C 2B F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-01 01:48:16.057 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-01 01:48:16.058 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-01 01:48:26.398; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:26.726 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 A9 8A B5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:40.000 UTC",
#       "not  after"         : "2023-12-30 01:47:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#           0010: 79 06 C8 3F                                        y..?
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 CB DE 12",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-01 01:47:42.000 UTC",
#       "not  after"         : "2023-12-30 01:47:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 1E 7E F4 00 FE 64 94   1B 12 71 8C D8 51 16 DC  ......d...q..Q..
#           0010: 79 06 C8 3F                                        y..?
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 31 88 BD 4A 1D 8C 53   60 2E 3D F8 5A CE 7D 5E  .1..J..S`.=.Z..^
#           0010: 10 9C 70 EF                                        ..p.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-01 01:48:26.741 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:26.888 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:26.889 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:26.889 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:48:26.889 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:26.983 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:26.983 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:26.985 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-10-01 01:48:26.985 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:26.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:27.001 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:27.001 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:27.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-10-01 01:48:27.004 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "69 F0 6C DB AB 63 19 3D 59 32 0A EA BB 2B FE 24 95 9C 1F A8 58 E2 D7 41 06 C3 50 42 8A 22 8C 61",
#     "session id"          : "E2 20 E0 8C 61 02 0C 20 38 6E 61 85 68 08 50 91 0A 37 F8 FC B6 1F 45 FF 66 79 23 63 1C DF FD E9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 96 17 D5 C9 A3 DE D3 4F   D4 57 78 70 99 43 A9 8A  .......O.Wxp.C..
#               0010: 2C 70 5F 5E 5D E4 F7 26   0E 18 73 2B 17 BF 1C 69  ,p_^]..&..s+...i
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.023 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "32 4C A5 76 9A E9 73 D8 01 43 36 4C 5C 2A 70 A5 BA 4F D5 00 0C DA EB 51 1E 62 77 46 0A 23 F3 14",
#     "session id"          : "E2 20 E0 8C 61 02 0C 20 38 6E 61 85 68 08 50 91 0A 37 F8 FC B6 1F 45 FF 66 79 23 63 1C DF FD E9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E 2F 51 35 46 BE 70 C6   9B B4 81 F5 E3 51 A7 47  ./Q5F.p......Q.G
#             0010: 9B 7C 31 14 60 B1 B0 04   84 65 52 2D 61 5B 22 1C  ..1.`....eR-a[".
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.023 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.023 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.024 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.025 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.025 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.025 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.025 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.026 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.026 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.026 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.028 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.028 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.028 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.029 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:27.030 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:27.030 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.030 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.037 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.039 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.040 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:27.045 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:48:27.045 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-10-01 01:48:27.046 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature 

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-10-01 01:49:44.679 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:49:44.720 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:49:44.721 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:49:44.722 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-01 01:49:44.722 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34498/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28320ms
ok 65 stop command for single port in 31180ms
ok 66 status detects locally running solr in 14371ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6502ms
ok 70 upconfig in 2629ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 45s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m18s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5584 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5584/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42973/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-30 23:39:12.941; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 23:39:12.946; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-30 23:39:13.868; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-30 23:39:13.911; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22607ms
ok 61 start solr with client truststore and security manager in 25077ms
not ok 62 start solr with mTLS needed in 245834ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-73kRFm/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42973.
#
# Started Solr server on port 42973 (pid=202850). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42974.
#
# Started Solr server on port 42974 (pid=203287). Happy searching!
#
# INFO  - 2023-09-30 23:40:36.500; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 23:40:36.505; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 23:40:36.888; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 23:40:36.892; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 23:40:36.893; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:36.928 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 C7 38 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:12.000 UTC",
#     "not  after"         : "2023-12-29 23:40:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 9C E6 40 59 65 89 A8   8B 1C 41 26 D4 3B B6 90  g..@Ye....A&.;..
#         0010: AF 68 C6 FE                                        .h..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:36.933 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 4E 32 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:04.000 UTC",
#     "not  after"         : "2023-12-29 23:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:36.949 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:37.046 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:37.047 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:37.047 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:37.047 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:37.196 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.197 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:37.199 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:37.199 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.205 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.217 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.217 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.218 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:37.220 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "19 0A BD EC AD 92 C2 A2 AB 55 EF D1 3D CE F6 59 DA DA 7A 66 5E DC 62 22 19 2F 42 42 43 C4 A1 09",
#   "session id"          : "5D C1 4B 18 7D D8 15 A0 96 6C BC 49 CC 84 DE 92 12 DE 75 36 2E EF 57 ED 0B 09 E0 4C E3 DD DB 27",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9E 07 25 78 FB B6 30 E4   EC 95 0F DE 60 F8 D2 A6  ..%x..0.....`...
#             0010: 1B D7 03 B7 67 35 A1 AB   57 37 E7 69 48 5D 52 1D  ....g5..W7.iH]R.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.339 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D8 7D D3 AB CA 54 C1 CE D2 51 5A 74 B3 75 DE 91 DC DF 8F F6 06 F5 D2 7A 85 90 1E 5E AF 52 4E 45",
#   "session id"          : "5D C1 4B 18 7D D8 15 A0 96 6C BC 49 CC 84 DE 92 12 DE 75 36 2E EF 57 ED 0B 09 E0 4C E3 DD DB 27",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 0C E8 BD 5C E5 74 48   B3 BB A4 FB CD 69 A6 08  ....\.tH.....i..
#           0010: 84 81 D7 0C 54 3F 22 9F   7E 88 33 DE 9B 14 B9 3A  ....T?"...3....:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.339 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.339 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.340 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.342 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.344 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.344 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.344 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.344 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.346 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.346 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.354 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.356 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.358 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.362 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.362 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.362 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.362 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.363 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.363 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.363 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.363 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.365 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.366 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.366 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.367 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.368 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.369 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.369 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.373 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E F7 9F 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:08.000 UTC",
#       "not  after"         : "2023-12-29 23:40:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 EC 40 4A E4 C1 8B AC   12 6A 82 0D DB 02 CA 06  ..@J.....j......
#           0010: 59 13 24 C3                                        Y.$.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.468 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.471 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 9B BC 0D FB 43 1E 15   10 5A DA 3E 8F 55 0D 6D  .....C...Z.>.U.m
#     0010: D4 8D A9 7E 48 6D 9A 32   C5 AC 05 8E AD F1 B9 1C  ....Hm.2........
#     0020: 05 98 F4 49 B0 5D 26 98   4C CA 87 AB 26 C7 27 72  ...I.]&.L...&.'r
#     0030: 4A 2A 30 C5 0A E0 29 1E   FC FE DC 12 8B 54 31 66  J*0...)......T1f
#     0040: BE B1 AE 7C E1 E8 DA E1   F3 F9 72 A1 FD 71 51 5D  ..........r..qQ]
#     0050: D9 FA EA 02 57 5C AB CB   8B 23 D0 C5 F6 5C 75 B6  ....W\...#...\u.
#     0060: 94 6C 65 57 B1 30 86 6E   04 0E E4 A4 C9 E9 75 1F  .leW.0.n......u.
#     0070: D3 DB F6 92 DB B9 1C 05   0B 02 43 A8 77 BE 22 F3  ..........C.w.".
#     0080: 4C C8 8D 9B 5B AB EC F8   DC F8 04 D2 8C 4D 24 9F  L...[........M$.
#     0090: CA 9B BE EC F8 73 9C 1B   78 4D 97 95 D4 02 DD 88  .....s..xM......
#     00A0: E6 92 1C 66 9B 08 A7 E5   04 9D 36 42 9E 3D 83 E6  ...f......6B.=..
#     00B0: 55 6F 29 99 FE 29 5F 94   19 0D A4 AA 05 B4 92 AC  Uo)..)_.........
#     00C0: 2F 29 EB FF DE CF 3E B4   E4 97 0D 87 30 1F 18 E0  /)....>.....0...
#     00D0: A7 53 98 CC 31 2D B3 4E   A0 D6 ED FD EE 13 68 30  .S..1-.N......h0
#     00E0: 23 AC 24 C7 5A 1A 98 70   2C AC 35 39 B7 FE 0A 08  #.$.Z..p,.59....
#     00F0: CC 1B 7F 51 13 32 8E 74   C5 19 8A 1E 0D 4D 1E 6F  ...Q.2.t.....M.o
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.473 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 0D 2D 45 12 19 AF E6   E2 FD 24 57 1D 8A 3D 52  Y.-E......$W..=R
#     0010: 51 00 2D 45 8C A3 83 EC   C2 71 E6 C1 E6 05 DD C2  Q.-E.....q......
#     0020: 00 F0 EE 75 11 84 1A BE   06 E3 32 44 4A 8E 00 A7  ...u......2DJ...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.475 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:37.476 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.476 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:37.477 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.477 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:37.477 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:37.477 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.478 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.480 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 C7 38 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:12.000 UTC",
#       "not  after"         : "2023-12-29 23:40:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 9C E6 40 59 65 89 A8   8B 1C 41 26 D4 3B B6 90  g..@Ye....A&.;..
#           0010: AF 68 C6 FE                                        .h..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 5B A5 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:06.000 UTC",
#       "not  after"         : "2023-12-29 23:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#           0010: F4 2C C0 20                                        .,.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.507 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 69 2B E3 27 E4 D4 65 D8   8A F3 2F 94 BE AE 70 09  i+.'..e.../...p.
#     0010: 78 9A BD AE B2 3C 8D 03   BC BA 5F 39 7E 83 2C BE  x....<...._9..,.
#     0020: DB D4 67 D2 F0 B0 D9 17   0C 98 FC 18 0C 36 02 B6  ..g..........6..
#     0030: EF 1F 12 96 98 84 94 C4   37 98 95 BE 10 CE 1E 8E  ........7.......
#     0040: B4 5B D9 4E EF 82 D8 A0   83 02 71 DA 1C 8D CE 79  .[.N......q....y
#     0050: C3 55 12 96 C3 5F 20 0F   2B D6 D2 F4 46 1D DF 66  .U..._ .+...F..f
#     0060: BA 4D C1 9D E7 9D 90 A0   B3 70 4D 5D 7F B4 D0 B0  .M.......pM]....
#     0070: E9 CC 5B 62 9B 60 B6 7C   B2 E7 25 79 AC 15 EC 79  ..[b.`....%y...y
#     0080: 01 D5 35 52 17 92 F1 73   E0 31 79 45 6C C7 C5 91  ..5R...s.1yEl...
#     0090: B2 73 0A D6 DD 26 17 04   EF A8 FA 29 D3 E3 C1 37  .s...&.....)...7
#     00A0: 20 70 3F B4 79 81 27 20   09 8B EC 46 AC FE 64 2F   p?.y.' ...F..d/
#     00B0: 49 50 B4 06 E7 11 EA E3   95 07 04 2B 68 5A 54 8C  IP.........+hZT.
#     00C0: B3 A8 B1 48 2D CE 2E 90   04 1C 34 E3 E6 22 16 60  ...H-.....4..".`
#     00D0: AA DA D9 BB 94 1D D6 5F   BA A3 D8 80 07 DD 4A B8  ......._......J.
#     00E0: E1 74 0B 6E 14 84 36 04   7C 5E 7F 09 0F D1 C4 93  .t.n..6..^......
#     00F0: 9C A3 B8 A2 75 68 EF 96   D8 64 9E 03 61 E3 55 BD  ....uh...d..a.U.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.508 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 B5 D6 AC 26 C2 5F 3F   8B AD 68 E3 85 6A 80 B5  C...&._?..h..j..
#     0010: 13 46 48 D6 6C 2B CB 7E   F3 14 86 74 EA 3E FA 86  .FH.l+.....t.>..
#     0020: 20 0B 16 EE 9E 99 57 AE   12 56 9A 9D 1C C8 F7 5F   .....W..V....._
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.509 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:37.564 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "46 4F 11 20 8C 77 4D AE 98 B0 DE DD 7E DC 55 92 40 60 F0 08 45 FC B7 9F 3C 87 4F 40 C4 69 1C 6C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 23:40:37.849 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 23:40:37.850 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 23:40:38.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 23:40:38.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 23:40:39.135; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 23:40:39.138; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 23:40:39.139; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-73kRFm/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:39.170 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 C7 38 A9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:12.000 UTC",
#     "not  after"         : "2023-12-29 23:40:12.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 9C E6 40 59 65 89 A8   8B 1C 41 26 D4 3B B6 90  g..@Ye....A&.;..
#         0010: AF 68 C6 FE                                        .h..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:39.175 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 4E 32 D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:04.000 UTC",
#     "not  after"         : "2023-12-29 23:40:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:39.189 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:39.279 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:39.279 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:39.279 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:40:39.279 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:39.417 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:39.419 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:39.419 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.435 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.435 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.436 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:39.438 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0A DD E7 E9 49 B4 58 F9 E0 58 B1 17 A3 87 0D 94 B0 31 10 D8 15 25 D0 92 74 2C 92 60 1E 85 2A 1C",
#   "session id"          : "8A 8A 7E 5A 6B 38 42 67 D1 7B 12 3C 2A FB 58 CA 3E 3C D2 42 5C 1C D3 D6 54 11 23 CC 90 CC 16 F5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C6 C1 31 60 A0 F6 26 E0   90 87 42 4E 39 2B 7A 78  ..1`..&...BN9+zx
#             0010: E6 D4 05 5F F3 40 6A 51   DB F2 59 62 FE 9E 85 47  ..._.@jQ..Yb...G
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.543 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 D0 12 A5 1D 25 78 04 DC 2A 47 67 AD EF C5 BF 53 08 66 B2 9B 7A 08 FA FD B7 A0 92 66 02 75 A5",
#   "session id"          : "8A 8A 7E 5A 6B 38 42 67 D1 7B 12 3C 2A FB 58 CA 3E 3C D2 42 5C 1C D3 D6 54 11 23 CC 90 CC 16 F5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 33 E7 D6 30 F8 A9 7C C9   21 E7 BC 0C 6D 87 56 10  3..0....!...m.V.
#           0010: 91 64 67 B3 18 25 D5 D9   7E 50 02 1E C9 CE 4F 61  .dg..%...P....Oa
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.543 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.543 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.544 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.546 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.547 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.547 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.548 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.549 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.549 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.549 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.556 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.558 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.559 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.562 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.562 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.562 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.563 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.565 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.565 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.565 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.566 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.566 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.567 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.567 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.570 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E F7 9F 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:08.000 UTC",
#       "not  after"         : "2023-12-29 23:40:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 EC 40 4A E4 C1 8B AC   12 6A 82 0D DB 02 CA 06  ..@J.....j......
#           0010: 59 13 24 C3                                        Y.$.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.651 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 5B A5 EC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 23:40:06.000 UTC",
#     "not  after"         : "2023-12-29 23:40:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#         0010: F4 2C C0 20                                        .,.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#         0010: BD 5C 9A 9B                                        .\..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.654 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 FF A0 AB 1B DE 41 56   BD 9A 7F A1 2D C4 DD FD  9.....AV....-...
#     0010: CB B3 7D B7 5B 86 E9 04   2F CB DE 83 40 CA 0A C1  ....[.../...@...
#     0020: C7 70 5D A5 C0 BD 5D F5   F3 6B 6F 9B B3 18 2B 8A  .p]...]..ko...+.
#     0030: 90 E7 16 DC 0B B2 FC 1A   37 24 0C E4 4D D6 CB 63  ........7$..M..c
#     0040: A1 6B 59 49 FF 3B 65 86   0F 98 9A 17 41 C3 41 A6  .kYI.;e.....A.A.
#     0050: 3F 9D C9 C6 03 D7 C4 7D   08 3D 77 51 77 47 85 77  ?........=wQwG.w
#     0060: 44 0A 8C 73 FA C2 F5 CF   70 FB B8 A9 2E 1F 85 1C  D..s....p.......
#     0070: D9 4C 40 21 5A 38 B6 28   16 44 BF C4 07 E5 30 0B  .L@!Z8.(.D....0.
#     0080: 93 D3 AC A5 8D 04 44 27   43 64 E0 53 F5 FE 63 93  ......D'Cd.S..c.
#     0090: 4A C0 A7 9D 75 A9 AF EA   1C 8B 36 B7 74 3C A0 46  J...u.....6.t<.F
#     00A0: EF 7B 92 7A 66 FC 1D AD   22 2C 2B 06 D7 24 87 33  ...zf...",+..$.3
#     00B0: 7A 40 CF 13 66 24 84 4B   4D BD 6F E8 B3 61 48 1A  z@..f$.KM.o..aH.
#     00C0: 21 3E 1F 65 88 28 11 55   10 6D B0 4D 09 2D 97 95  !>.e.(.U.m.M.-..
#     00D0: 77 B0 12 B1 3B 38 84 10   A0 B9 B2 15 A6 77 27 A4  w...;8.......w'.
#     00E0: 15 31 51 14 F2 3C DE 2B   3E AB F5 77 12 D7 46 07  .1Q..<.+>..w..F.
#     00F0: 4F 44 1C A1 D1 2B B7 6E   B3 82 CB B8 9C 2A C9 A0  OD...+.n.....*..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.656 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 12 AA 9C A6 79 72 5F   7D AC 02 F7 F0 AF DD 0D  c....yr_........
#     0010: 33 FD 68 3C CB A0 2C 8C   3E 39 4A 06 8B 8A A9 0B  3.h<..,.>9J.....
#     0020: D5 01 47 EB 81 F1 50 21   69 18 20 51 F4 C1 E7 2A  ..G...P!i. Q...*
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.658 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:39.659 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.660 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:39.660 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.660 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 23:40:39.660 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:39.660 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.661 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.663 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 C7 38 A9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:12.000 UTC",
#       "not  after"         : "2023-12-29 23:40:12.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 9C E6 40 59 65 89 A8   8B 1C 41 26 D4 3B B6 90  g..@Ye....A&.;..
#           0010: AF 68 C6 FE                                        .h..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 5B A5 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:06.000 UTC",
#       "not  after"         : "2023-12-29 23:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#           0010: F4 2C C0 20                                        .,.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.688 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 F7 B6 68 D4 D6 63 23   EF 35 3B EC 4B 54 73 7A  s..h..c#.5;.KTsz
#     0010: 39 E2 F6 7D E4 B9 54 58   8B C0 93 D5 CB 3D 5A 62  9.....TX.....=Zb
#     0020: D2 3F FD A4 4F 4E 56 C4   03 2E D1 B1 83 1F D6 F2  .?..ONV.........
#     0030: 57 F4 3C 19 0A 58 F0 20   AE 9B B9 17 FF 7F E4 F7  W.<..X. ........
#     0040: CD CB A2 13 B0 3F 6B C1   A9 2C 5C 7A F9 67 95 99  .....?k..,\z.g..
#     0050: 2A 8A 72 6C 13 93 C1 5D   2C E2 3A 18 4B B9 39 ED  *.rl...],.:.K.9.
#     0060: E5 D9 F7 26 4B 90 00 5C   78 8C 9C 26 8C 66 6A 3E  ...&K..\x..&.fj>
#     0070: CD 8C 90 48 63 68 9B 1A   25 9C A0 48 2A 67 87 5B  ...Hch..%..H*g.[
#     0080: C8 97 85 40 29 42 9A 68   38 3E 04 A3 3D 54 27 6E  ...@)B.h8>..=T'n
#     0090: 0D 41 26 5E 16 7E 0C 1E   D9 1C 6B C4 69 7C E5 CB  .A&^......k.i...
#     00A0: 32 0A CB B6 2C 1D F6 12   50 1E F3 0A AF 4A 49 AF  2...,...P....JI.
#     00B0: C1 83 60 FD 38 79 1B 16   F8 F4 10 FA 31 EB B8 B7  ..`.8y......1...
#     00C0: 62 1F 81 58 9B FE 7E AE   06 5D 95 CA 6C A5 5F 67  b..X.....]..l._g
#     00D0: 22 9B 7B 6C B5 62 F1 50   FF 6E F7 CD E6 51 98 D8  "..l.b.P.n...Q..
#     00E0: F8 CF FB E2 8E 7E 73 B4   FE 75 14 EF 98 42 A1 1B  ......s..u...B..
#     00F0: AA AB BC 89 17 CD 5D 65   A2 3B B2 B5 2E 6C C6 63  ......]e.;...l.c
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.689 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D F1 17 A7 07 42 D3 D8   4D 45 BE D9 A4 F9 F5 4D  .....B..ME.....M
#     0010: 63 B3 0B 3B 97 C1 67 85   33 6A CB A7 39 F8 65 7A  c..;..g.3j..9.ez
#     0020: 27 64 47 89 B6 D3 18 E2   BB C0 7A 39 49 8E 4C AF  'dG.......z9I.L.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.690 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:39.736 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D8 FC 55 92 03 86 B6 28 52 AD 03 3E 3B 24 29 2C 41 DA 9A 9F DE 0F 7F 85 20 4A 51 D6 12 CE 29 98",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 23:40:40.027 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 23:40:40.028 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 23:40:51.372; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:51.705 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 5B A5 EC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:06.000 UTC",
#       "not  after"         : "2023-12-29 23:40:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#           0010: F4 2C C0 20                                        .,.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 84 A8 E6 6C 34 0C B1   D1 84 10 1E 72 AD C4 7E  ....l4......r...
#           0010: BD 5C 9A 9B                                        .\..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 4E 32 D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 23:40:04.000 UTC",
#       "not  after"         : "2023-12-29 23:40:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 5A 25 73 FB B7 A5 C0   47 29 59 A7 31 30 79 E5  eZ%s....G)Y.10y.
#           0010: F4 2C C0 20                                        .,.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 23:40:51.721 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:51.948 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:51.950 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 23:40:51.950 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.968 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 23:40:51.970 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "72 D3 BE E9 76 CD D2 88 65 61 4C AB B2 1C A7 23 FF 51 8B 16 F4 E7 CB EF C1 F3 49 8A EF 0A 7A D3",
#     "session id"          : "B6 ED A9 A2 24 1A DE 15 33 27 B9 0F 32 9A EB 00 07 6D A9 C7 10 80 5E ED 09 89 2E 63 56 E0 77 99",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AF 05 4D A6 A6 F5 D7 F9   12 BA 6D 83 10 BF 1E F7  ..M.......m.....
#               0010: A9 66 28 DB 52 95 4A F0   20 44 F4 08 6C AE BE 65  .f(.R.J. D..l..e
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.995 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "70 D3 D3 B4 F5 AE 7C CC 24 4B 44 F6 0F 41 4D C6 65 34 EC DF 66 A0 C0 84 24 E9 88 91 25 CE 56 F8",
#     "session id"          : "B6 ED A9 A2 24 1A DE 15 33 27 B9 0F 32 9A EB 00 07 6D A9 C7 10 80 5E ED 09 89 2E 63 56 E0 77 99",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD B9 15 40 0E 46 B6 7C   08 26 90 B1 9A 1C EC 57  ...@.F...&.....W
#             0010: EB 5B 4C CF 3B B0 99 9A   A6 8B A8 5B 6F C3 EC 07  .[L.;......[o...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.995 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.995 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.997 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.999 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:51.999 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:52.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.007 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.009 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.010 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.014 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.014 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.014 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:40:52.015 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 23:40:52.016 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, r

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 23:45:20.087 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:45:20.147 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:45:20.147 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:45:20.148 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 23:45:20.148 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42974/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28023ms
ok 65 stop command for single port in 30840ms
ok 66 status detects locally running solr in 14330ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2158ms
ok 69 copying files around in 6532ms
ok 70 upconfig in 2597ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 23m 10s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m35s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5583 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5583/

1 tests failed.
FAILED:  org.apache.solr.client.solrj.io.stream.MathExpressionTest.testZipFDistribution

Error Message:
java.lang.Exception: Zipf distribution not descending!!!

Stack Trace:
java.lang.Exception: Zipf distribution not descending!!!
	at __randomizedtesting.SeedInfo.seed([164069D9C57B3F74:32F504FDD2D3375C]:0)
	at org.apache.solr.client.solrj.io.stream.MathExpressionTest.testZipFDistribution(MathExpressionTest.java:4052)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1301 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.client.solrj.io.stream.MathExpressionTest.testZipFDistribution (:solr:solrj-streaming)
    Test output: /tmp/src/solr/solr/solrj-streaming/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.io.stream.MathExpressionTest.txt
    Reproduce with: gradlew :solr:solrj-streaming:test --tests "org.apache.solr.client.solrj.io.stream.MathExpressionTest.testZipFDistribution" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=164069D9C57B3F74 -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:solrj-streaming:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj-streaming/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 5m 33s
644 actionable tasks: 627 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m20.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5582 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5582/

1 tests failed.
FAILED:  org.apache.solr.handler.export.TestExportWriter.testMultipleSorts

Error Message:
org.junit.ComparisonFailure: Position:981 has different id value expected:<[844]> but was:<[911]>

Stack Trace:
org.junit.ComparisonFailure: Position:981 has different id value expected:<[844]> but was:<[911]>
	at __randomizedtesting.SeedInfo.seed([AA173D2877948A4A:8325F5C15E81976C]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.handler.export.TestExportWriter.validateSort(TestExportWriter.java:1360)
	at org.apache.solr.handler.export.TestExportWriter.testMultipleSorts(TestExportWriter.java:1173)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 3133 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35783/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-30 19:20:19.191; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 19:20:19.197; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-30 19:20:20.073; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-30 19:20:20.113; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22413ms
ok 61 start solr with client truststore and security manager in 24619ms
not ok 62 start solr with mTLS needed in 59499ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SlepgI/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35783.
#
# Started Solr server on port 35783 (pid=201919). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35784.
#
# Started Solr server on port 35784 (pid=202373). Happy searching!
#
# INFO  - 2023-09-30 19:21:42.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 19:21:42.063; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 19:21:42.441; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 19:21:42.444; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 19:21:42.444; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:42.477 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D B2 56 C2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:18.000 UTC",
#     "not  after"         : "2023-12-29 19:21:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 97 50 77 4D A7 11 81   FE C9 3C A4 38 F8 66 03  ..PwM.....<.8.f.
#         0010: 07 E5 A0 21                                        ...!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:42.481 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F D5 52 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:10.000 UTC",
#     "not  after"         : "2023-12-29 19:21:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:42.496 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:42.724 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:42.726 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:42.726 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.731 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.743 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.743 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:42.745 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "50 64 03 F9 6C 05 37 9D A0 93 0C 19 B3 18 8F A8 5E A8 AD 91 5F 64 54 B9 D3 2D 42 99 05 CE E2 70",
#   "session id"          : "C7 9E E0 BA 30 15 D6 99 96 3F C1 FC 06 43 A8 B7 8F 86 A5 0A 7C 91 03 07 65 92 A4 3B 13 F6 15 4E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 95 9E BC 93 9C 3F 9A   72 7E 16 6E AD 83 95 D5  ......?.r..n....
#             0010: F8 24 E6 18 2F 69 32 41   F6 7D B2 CC 78 1F EF 08  .$../i2A....x...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.852 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5E F4 B3 1D 44 60 AC DC FF C0 FF 70 8E A8 91 1B 30 9D 88 A1 E5 B1 8F E7 A4 48 99 0C 45 14 8A EB",
#   "session id"          : "C7 9E E0 BA 30 15 D6 99 96 3F C1 FC 06 43 A8 B7 8F 86 A5 0A 7C 91 03 07 65 92 A4 3B 13 F6 15 4E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 53 4A 4B 7B 36 95 2D 0A   FE 8C 81 07 7B EA B1 00  SJK.6.-.........
#           0010: C2 5A D1 F5 7D 5B 0C E2   76 78 D0 A5 1F 44 31 45  .Z...[..vx...D1E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.852 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.853 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.853 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.854 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.855 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.856 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.858 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.858 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.858 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.858 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.865 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.866 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.867 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.873 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.873 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.873 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.874 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.874 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.875 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.875 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.878 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 99 60 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:14.000 UTC",
#       "not  after"         : "2023-12-29 19:21:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EB EB 82 9B 59 C6 49   4D 2A 79 FA C5 CE ED 87  .....Y.IM*y.....
#           0010: 31 E0 AB DA                                        1...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.879 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:42.933 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:42.933 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:42.933 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:42.933 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.956 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.959 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E EA 98 AB 7A F9 0D 90   6F DF 2F 9D BF CC C7 98  ....z...o./.....
#     0010: B7 FD 4B 56 71 39 82 84   88 A5 5B 40 92 1B E5 8B  ..KVq9....[@....
#     0020: AC D6 4A F1 67 57 6D BE   A9 12 F3 AA 32 F0 F9 76  ..J.gWm.....2..v
#     0030: C9 6B 3D A9 27 4C 78 2D   B6 67 D8 86 76 55 45 6F  .k=.'Lx-.g..vUEo
#     0040: C9 B1 50 AD 80 2C BF 38   DF 52 C9 BD 85 65 74 7F  ..P..,.8.R...et.
#     0050: 3E 2D 2E 3A 54 A3 2B 59   3A E8 DD 48 2B 42 C9 29  >-.:T.+Y:..H+B.)
#     0060: FE D4 1D 95 10 4C 6B 30   A0 0E E9 A4 53 6F F1 E4  .....Lk0....So..
#     0070: 18 A8 B1 38 1F CD D5 E1   7B 36 88 4D 93 A9 2E 3F  ...8.....6.M...?
#     0080: 3B 94 D3 8F 08 68 FC 1F   48 CA 6B 26 83 3B 01 EF  ;....h..H.k&.;..
#     0090: DD 49 FD 3D E2 58 BA 77   78 88 29 D1 43 BE CF 8A  .I.=.X.wx.).C...
#     00A0: 80 DC 45 85 5B DC 25 F5   0F 15 0E F6 57 24 B2 6E  ..E.[.%.....W$.n
#     00B0: D6 25 DB 4B A2 2F 72 58   CF 2B EA AD 8B AA 42 ED  .%.K./rX.+....B.
#     00C0: C6 3B A5 0B EB C8 B9 D2   04 A5 AF B2 AA 53 BB 70  .;...........S.p
#     00D0: 01 B6 B7 B0 B8 3E CD 2B   C9 2E 9B 8F 14 FD 9A 1F  .....>.+........
#     00E0: 96 68 7B 5C 7A BA E2 E0   6D 0B 1E 52 68 05 09 39  .h.\z...m..Rh..9
#     00F0: 81 FD F8 BC B1 37 A9 88   02 35 E4 74 D8 E3 AC B4  .....7...5.t....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.961 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A 3F 65 B8 CC 29 0F 33   0D F8 70 5E 09 13 53 7F  .?e..).3..p^..S.
#     0010: 57 FA 50 EC 8B 60 9C B2   2F 21 0A 7E 8B 01 9E 4E  W.P..`../!.....N
#     0020: CC 1E 3F 2D ED F8 73 B0   CA 86 99 91 9A E5 7A 1C  ..?-..s.......z.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.964 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:42.965 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.966 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.968 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D B2 56 C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:18.000 UTC",
#       "not  after"         : "2023-12-29 19:21:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 97 50 77 4D A7 11 81   FE C9 3C A4 38 F8 66 03  ..PwM.....<.8.f.
#           0010: 07 E5 A0 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 3A 58 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:12.000 UTC",
#       "not  after"         : "2023-12-29 19:21:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#           0010: 87 BF 3D 1D                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.994 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AF A2 29 D0 88 C2 8B 01   64 2E F9 21 07 BE B7 0E  ..).....d..!....
#     0010: AE 6F 23 78 99 64 0A 36   4E 70 95 F9 7D 71 53 41  .o#x.d.6Np...qSA
#     0020: 66 1E C4 26 DE C0 E5 08   98 1F AC AB A6 DA 91 CF  f..&............
#     0030: D1 3C F3 1A AC AC EF D9   55 13 13 33 3D AC EC 79  .<......U..3=..y
#     0040: 15 1E 2D D6 2F 4F B1 48   20 65 42 6F 1A 6D 05 47  ..-./O.H eBo.m.G
#     0050: FD 8A 60 E7 E6 BB C1 41   7F 56 B3 7C 61 56 AA DD  ..`....A.V..aV..
#     0060: DF 69 E3 0A A8 B8 D4 44   4B 4C FD 9A F6 71 87 8E  .i.....DKL...q..
#     0070: FC 15 85 8F B3 60 1C CE   79 67 EC 19 61 5A 3F CE  .....`..yg..aZ?.
#     0080: E7 EC 1B E3 A1 57 36 22   91 0C 0D 6D 38 B5 98 19  .....W6"...m8...
#     0090: 11 47 0C 46 89 64 E3 6D   DB 0D 5C C8 47 DD 97 B1  .G.F.d.m..\.G...
#     00A0: 6A 09 F9 BF DB A9 E5 EA   C4 4A 6C 7D BE 6E 6D 80  j........Jl..nm.
#     00B0: 2C C9 D9 32 5B A9 80 74   83 07 A4 C4 FE 02 3E 64  ,..2[..t......>d
#     00C0: BD 45 16 0F 59 6C 9A 4B   3D F5 12 72 03 D5 33 CF  .E..Yl.K=..r..3.
#     00D0: 80 B4 8C B0 30 BE B8 70   D0 AA B5 2C D4 D7 68 C2  ....0..p...,..h.
#     00E0: 1A 6A 37 4B 88 35 22 A8   75 22 D3 2E 81 F8 E8 48  .j7K.5".u".....H
#     00F0: CD 21 A9 5F 98 E1 D2 FF   83 0C 2A 65 86 7B D5 A9  .!._......*e....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.995 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 7E 0F 07 20 9A 30 3A   EC AB 68 31 EE 51 E5 9F  .... .0:..h1.Q..
#     0010: 3B C9 96 7B 68 7E AD BE   9D A2 5F BC 9C 43 3C B5  ;...h....._..C<.
#     0020: 0A 9E 5D 17 C1 C2 0B 5D   0F AE 52 B3 4B 13 F7 80  ..]....]..R.K...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:42.996 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:43.044 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FD 56 C0 A3 E8 83 04 5A 36 15 6E 89 EF 6E 4A FB BB 06 D6 85 AF 43 5C E0 C0 2B C6 0C E2 66 E5 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 19:21:43.302 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 19:21:43.303 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 19:21:44.236; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 19:21:44.242; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 19:21:44.612; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 19:21:44.615; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 19:21:44.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SlepgI/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:44.647 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D B2 56 C2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:18.000 UTC",
#     "not  after"         : "2023-12-29 19:21:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 97 50 77 4D A7 11 81   FE C9 3C A4 38 F8 66 03  ..PwM.....<.8.f.
#         0010: 07 E5 A0 21                                        ...!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:44.652 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F D5 52 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:10.000 UTC",
#     "not  after"         : "2023-12-29 19:21:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:44.667 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:44.738 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:44.738 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:44.738 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:44.738 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:44.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:44.895 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:44.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.901 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.912 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:44.914 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "63 1E 5B DC 62 44 B4 D7 5C 7F 36 49 EC A6 61 5F BB 92 28 4A D5 0F FE C5 A3 F8 D1 16 0F 9F 22 D4",
#   "session id"          : "7A 1A 3F 66 18 BF 25 99 C6 B9 C0 7E DD 27 E9 1D 79 6D C1 03 65 39 82 9F 08 47 19 8D 3E E9 92 AE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A1 BD 5E A8 AD 5A 63 07   22 6F FB 7C 38 F4 92 33  ..^..Zc."o..8..3
#             0010: 05 22 28 12 9B 4A BC 68   3A 2B 8E 08 C5 79 59 69  ."(..J.h:+...yYi
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.019 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0F 21 36 D4 F0 6C 0F C2 38 21 A5 9A C3 A1 D3 2C 8E FA E9 44 FD EA 05 13 D9 8F 15 60 B5 1D 87 83",
#   "session id"          : "7A 1A 3F 66 18 BF 25 99 C6 B9 C0 7E DD 27 E9 1D 79 6D C1 03 65 39 82 9F 08 47 19 8D 3E E9 92 AE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 47 72 A8 FA 78 BF 15 C4   4D C8 34 B2 D0 E6 26 9C  Gr..x...M.4...&.
#           0010: 69 FA 2D F1 A1 95 AC BA   05 40 69 00 23 6F 4C 58  i.-......@i.#oLX
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.020 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.020 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.021 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.022 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.022 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.022 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.023 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.023 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.025 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.025 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.025 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.032 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.033 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.034 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.038 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.038 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.038 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.038 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.038 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.039 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.039 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.039 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.040 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.041 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.041 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.041 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.042 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.043 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.043 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.046 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 99 60 D7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:14.000 UTC",
#       "not  after"         : "2023-12-29 19:21:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EB EB 82 9B 59 C6 49   4D 2A 79 FA C5 CE ED 87  .....Y.IM*y.....
#           0010: 31 E0 AB DA                                        1...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.046 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.121 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 3A 58 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 19:21:12.000 UTC",
#     "not  after"         : "2023-12-29 19:21:12.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#         0010: 87 BF 3D 1D                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#         0010: E1 67 1F 02                                        .g..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.125 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E EC 6D C4 FB B8 58 F6   F1 E1 50 66 D7 D1 9E 0E  ..m...X...Pf....
#     0010: B8 C4 60 28 69 29 3C 69   4D 29 F1 1A 9F 7D E1 79  ..`(i)<iM).....y
#     0020: 7A 7D 8F 49 A4 D5 9B FE   9B 56 15 6C A4 AA 38 32  z..I.....V.l..82
#     0030: 48 63 E7 C9 9B FF AE 67   B5 DE 71 97 9B 83 4E 88  Hc.....g..q...N.
#     0040: B2 54 D5 6F 27 A4 31 6C   C9 D6 E1 18 39 75 88 93  .T.o'.1l....9u..
#     0050: FD C3 FB 94 7C 36 F3 B6   90 CE 7F F7 4B 65 9F 45  .....6......Ke.E
#     0060: 07 87 B7 4B 8F EE 7E 76   E3 75 88 1C 5B 36 72 D5  ...K...v.u..[6r.
#     0070: 8E 38 ED BB D7 0B 4C CA   EA 2F 27 95 99 68 16 BC  .8....L../'..h..
#     0080: 15 5F 3A 20 72 9B DA C7   11 D9 9A DD C4 EA 21 BB  ._: r.........!.
#     0090: 65 9B 00 F3 AD 9D 6F 97   5E 53 43 C2 71 B6 31 60  e.....o.^SC.q.1`
#     00A0: DC 33 8F ED AF B0 B7 E6   29 FD 2F AE C1 AA 98 02  .3......)./.....
#     00B0: 1F 55 ED 9F 23 1D D1 BF   04 52 CA 03 0B 96 8B 98  .U..#....R......
#     00C0: 83 15 5E D0 4C 76 90 A5   31 D0 92 33 F7 6A B6 D8  ..^.Lv..1..3.j..
#     00D0: 8C 00 9B 44 FA 44 A8 12   F6 B3 AE 4A 1D 6B 91 E5  ...D.D.....J.k..
#     00E0: 22 5D 65 4C 0C A8 47 B3   52 8B 81 8C E0 0F D4 E6  "]eL..G.R.......
#     00F0: DE 58 55 E0 70 F5 2D 3F   FC 9F A5 C2 99 00 26 C6  .XU.p.-?......&.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.127 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 96 31 FC AC 10 8A 49   F7 4D EE 6E 68 F2 D6 96  ..1....I.M.nh...
#     0010: CE AF E5 F2 09 AB 2B E1   C3 BC 31 F7 8D 45 0C E2  ......+...1..E..
#     0020: C4 72 57 FA 44 D2 94 06   D4 A4 60 1D D1 B8 4E 0B  .rW.D.....`...N.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.129 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:21:45.130 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.131 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.133 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D B2 56 C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:18.000 UTC",
#       "not  after"         : "2023-12-29 19:21:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 97 50 77 4D A7 11 81   FE C9 3C A4 38 F8 66 03  ..PwM.....<.8.f.
#           0010: 07 E5 A0 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 3A 58 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:12.000 UTC",
#       "not  after"         : "2023-12-29 19:21:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#           0010: 87 BF 3D 1D                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.160 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C3 37 A6 1D AA 0E 73 B7   60 4F 0E D4 26 9D 54 03  .7....s.`O..&.T.
#     0010: 59 69 E3 3B 39 91 5C 82   9B E9 B2 95 5C B6 27 53  Yi.;9.\.....\.'S
#     0020: 08 AA 3B 9D FF 4A 3B 52   8A AF B6 9B ED BD B1 18  ..;..J;R........
#     0030: 9C B3 83 29 0F F9 F9 9A   8C A0 07 17 68 72 27 93  ...)........hr'.
#     0040: C2 F1 CD F7 74 D6 CC 1E   D7 C2 C8 6C 15 E5 43 28  ....t......l..C(
#     0050: 8D 50 75 9A 5C E4 9B F9   32 C2 09 41 3F 53 3F E1  .Pu.\...2..A?S?.
#     0060: 52 F5 D2 88 E2 4D 5E 7D   74 96 D9 01 95 35 3E 40  R....M^.t....5>@
#     0070: 17 7D 1A 25 14 BB 33 C7   E6 95 1A 15 FA 85 BF 9A  ...%..3.........
#     0080: C8 CE FE 42 99 1A 84 11   63 E5 97 7F F1 8A 0B 81  ...B....c.......
#     0090: F6 A2 7F 15 54 0C 5E F5   89 B7 97 3C 3C AE AB FB  ....T.^....<<...
#     00A0: C3 0E 26 65 CB FF B4 3B   64 43 DD 01 9D A7 CA 8E  ..&e...;dC......
#     00B0: E8 25 D2 E5 45 F2 E9 EE   5E 3C DB 5E 35 C6 C1 56  .%..E...^<.^5..V
#     00C0: A3 EA 4C 64 E1 3C 2E 4E   0B 45 06 FA 76 1F 7B 4A  ..Ld.<.N.E..v..J
#     00D0: 0F 1F 03 C6 49 4B 82 58   97 A9 E1 C0 DA 67 8F 62  ....IK.X.....g.b
#     00E0: 44 8E DD 3B 13 B9 03 BD   E4 82 4A 5B 2C 86 16 C3  D..;......J[,...
#     00F0: 03 6F F5 17 7D 0E 9E C9   98 6E BC A3 02 79 30 48  .o.......n...y0H
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.161 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 18 34 DA 80 D8 1C 9F 5E   30 55 6E A6 8D 49 4B A0  .4.....^0Un..IK.
#     0010: E4 22 36 0E 6A A9 80 53   57 1F B5 BB 54 C8 9C 1A  ."6.j..SW...T...
#     0020: A3 7E 67 19 53 F3 01 AB   4D 21 AA B5 E4 14 0F 3B  ..g.S...M!.....;
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.161 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:45.208 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E7 57 ED 83 B7 75 D8 E2 62 A2 F3 0E 31 8B A1 B4 C0 73 47 70 E8 0B F5 61 81 E9 E3 07 8A 7F CC 4D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 19:21:45.484 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 19:21:45.485 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 19:21:55.881; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:56.232 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F D5 52 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:10.000 UTC",
#       "not  after"         : "2023-12-29 19:21:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#           0010: 87 BF 3D 1D                                        ..=.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 3A 58 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 19:21:12.000 UTC",
#       "not  after"         : "2023-12-29 19:21:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B5 03 1E 3E A6 60 E7   13 F9 63 DE F7 4F 61 D0  ....>.`...c..Oa.
#           0010: 87 BF 3D 1D                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 5F 7E 21 85 75 15 AA   5E 45 38 CC 41 AB 5B 65  ._.!.u..^E8.A.[e
#           0010: E1 67 1F 02                                        .g..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 19:21:56.246 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:56.388 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:56.388 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:56.388 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:21:56.388 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:56.477 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.477 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:56.478 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 19:21:56.479 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.483 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.494 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.495 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 19:21:56.497 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "05 95 7C 7A 84 98 81 D8 43 4D 3C B0 C0 04 8B AC 75 F2 D7 6A 61 2F 61 C3 79 AD 47 E3 BA 17 B5 C5",
#     "session id"          : "7B 18 5A B1 0A 2C 4D 07 D0 E1 6F 61 87 2B C8 E5 14 C9 2D F5 89 B1 FD 43 B8 23 4D 7B A3 75 88 B2",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A6 FD 0F 86 D4 54 35 EB   D5 E8 6C 47 86 81 7C 21  .....T5...lG...!
#               0010: 06 32 79 DA BA 88 32 D3   28 AB C9 C4 EC 38 88 26  .2y...2.(....8.&
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.517 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C7 EB F1 B5 2A 1B 6A 83 F5 A5 BC 38 34 E3 EC 3D AB 3C 24 EB 2D 09 29 16 27 CE 47 FC 71 23 43 FF",
#     "session id"          : "7B 18 5A B1 0A 2C 4D 07 D0 E1 6F 61 87 2B C8 E5 14 C9 2D F5 89 B1 FD 43 B8 23 4D 7B A3 75 88 B2",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 06 40 29 50 5F 69 67 BD   7F 7A CF C6 BB 51 67 C7  .@)P_ig..z...Qg.
#             0010: 85 3E A4 B8 23 21 C3 2C   C5 C5 BA 6A D8 08 70 00  .>..#!.,...j..p.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.517 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 19:21:56.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   ja

[...truncated too long message...]

r.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 19:23:18.691 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:23:18.730 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:23:18.732 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:23:18.732 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 19:23:18.732 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35784/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28259ms
ok 65 stop command for single port in 30617ms
ok 66 status detects locally running solr in 14336ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2165ms
ok 69 copying files around in 6578ms
ok 70 upconfig in 2614ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
ok 73 Cleanup in 1225ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.handler.export.TestExportWriter.testMultipleSorts (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.export.TestExportWriter.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.export.TestExportWriter.testMultipleSorts" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AA173D2877948A4A -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 6s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 20m37.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5581 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5581/

All tests passed

Build Log:
[...truncated 1329 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45563/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-30 15:56:22.058; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 15:56:22.064; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-30 15:56:22.986; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-30 15:56:23.030; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22824ms
ok 61 start solr with client truststore and security manager in 25396ms
not ok 62 start solr with mTLS needed in 59316ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wPQuwQ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45563.
#
# Started Solr server on port 45563 (pid=203937). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45564.
#
# Started Solr server on port 45564 (pid=204365). Happy searching!
#
# INFO  - 2023-09-30 15:57:46.207; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 15:57:46.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 15:57:46.635; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 15:57:46.639; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 15:57:46.639; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:46.674 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B A3 B1 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:22.000 UTC",
#     "not  after"         : "2023-12-29 15:57:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 12 8F FA 5D 4A 49 93   FA 4B 80 6C B1 3C 06 CD  ....]JI..K.l.<..
#         0010: 4F 31 70 0B                                        O1p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:46.679 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F CF 30 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:14.000 UTC",
#     "not  after"         : "2023-12-29 15:57:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:46.695 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:47.031 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:47.031 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:47.032 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:47.032 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:47.188 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.188 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:47.190 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:47.190 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.196 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.209 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.209 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.209 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:47.212 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 CD B4 34 C4 DC DA 06 F0 FD 48 12 94 63 DD E2 BD B2 45 E5 B3 ED 65 82 68 C6 25 58 48 AD C6 20",
#   "session id"          : "70 BC 84 C8 AC 77 03 52 7C 2D F8 9C 4B 0C B3 B4 9B 9B 84 AE 86 27 79 69 93 5E 10 30 98 32 6B 46",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D1 6D 99 63 91 C0 E3 3B   9E 6A B6 FD 9A 1C EF 78  .m.c...;.j.....x
#             0010: FA 45 D4 13 E0 34 47 07   3D DA 8F 98 26 90 BE 2D  .E...4G.=...&..-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.328 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EA 32 0C 67 0E 38 7E 38 88 1B 31 6B 4E 1E 8A 13 1E D2 06 CC D6 97 53 8B 45 7B 5D 93 56 57 7A BC",
#   "session id"          : "70 BC 84 C8 AC 77 03 52 7C 2D F8 9C 4B 0C B3 B4 9B 9B 84 AE 86 27 79 69 93 5E 10 30 98 32 6B 46",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 02 EB 11 EA 95 37 DE   8D 99 AC 3D 97 42 1F 41  C.....7....=.B.A
#           0010: C0 4C 54 E3 CD 98 47 E3   AB C0 31 94 B3 AA 46 25  .LT...G...1...F%
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.329 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.329 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.331 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.332 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.332 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.334 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.334 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.335 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.344 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.346 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.347 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.351 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.351 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.351 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.351 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.352 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.354 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.355 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.355 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.355 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.357 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.358 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.358 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.362 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B CC 6A C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:18.000 UTC",
#       "not  after"         : "2023-12-29 15:57:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 05 47 E8 3D 4D ED 2B   8C C4 B9 6D 47 B1 58 D9  ..G.=M.+...mG.X.
#           0010: 28 A3 C2 8D                                        (...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.362 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.449 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.453 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 81 D8 54 25 20 15 9F F4   5A B4 2F DC 31 F1 8E 73  ..T% ...Z./.1..s
#     0010: 4C A0 57 0F DF E1 A0 10   60 D1 4D 6E DE 16 15 5F  L.W.....`.Mn..._
#     0020: E6 F7 25 21 A7 68 8A F1   BE 39 48 8C 20 EA 08 CD  ..%!.h...9H. ...
#     0030: A8 7B 50 1A C4 D1 0F E8   56 F1 AE 22 BC B3 66 EC  ..P.....V.."..f.
#     0040: 7B F6 8F 65 CB B2 20 80   E8 92 25 00 91 39 43 AB  ...e.. ...%..9C.
#     0050: F2 20 40 03 B5 39 43 BC   BC 3D 4D 97 B9 9A 72 DE  . @..9C..=M...r.
#     0060: 49 5F BD 34 A0 CC ED 70   59 4B FB 05 FE 84 A2 7B  I_.4...pYK......
#     0070: 7B 7F 83 F0 AA AC 2E A0   35 00 EE B6 A2 2A 7C 1F  ........5....*..
#     0080: D1 E4 3E D0 C2 30 5C B8   6D 55 60 89 B1 41 73 B6  ..>..0\.mU`..As.
#     0090: B3 B6 61 84 3B 71 FF 75   41 C0 7C D9 6C B3 FE D8  ..a.;q.uA...l...
#     00A0: 1C 29 A9 13 1A CA 3F 0F   68 AC 2E 76 78 5C E2 46  .)....?.h..vx\.F
#     00B0: FD B2 ED 39 A1 AD 91 1D   2E D1 E3 75 96 D3 BF F6  ...9.......u....
#     00C0: 55 0F 7F F0 8A 2E 83 14   D1 F6 3B 92 46 D5 B0 B7  U.........;.F...
#     00D0: 6C 5B F5 C0 8D 49 D6 6B   6C D3 02 94 A0 89 5B 23  l[...I.kl.....[#
#     00E0: A2 48 DE 4A 08 02 EC DA   3B 1F 5B 98 27 2B C4 FD  .H.J....;.[.'+..
#     00F0: 2E 24 D2 3A D3 47 CB A5   54 16 5B 29 5C EB 7C 5B  .$.:.G..T.[)\..[
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.455 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C4 B5 F0 91 6E D7 21 3A   77 B2 6F 80 DD 61 21 25  ....n.!:w.o..a!%
#     0010: 53 1A 1B A5 49 D7 B7 20   99 F8 5A 6B C8 64 A8 D2  S...I.. ..Zk.d..
#     0020: 3E C7 7F F0 08 9C 79 9E   CD 30 69 A5 CB 96 93 7B  >.....y..0i.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.458 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:47.459 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.459 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:47.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.460 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:47.460 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:47.461 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.461 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.464 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B A3 B1 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:22.000 UTC",
#       "not  after"         : "2023-12-29 15:57:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 12 8F FA 5D 4A 49 93   FA 4B 80 6C B1 3C 06 CD  ....]JI..K.l.<..
#           0010: 4F 31 70 0B                                        O1p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 8D C6 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:16.000 UTC",
#       "not  after"         : "2023-12-29 15:57:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#           0010: 08 5E 48 52                                        .^HR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.490 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 12 BE 63 32 ED BC 5B   2E 0D 57 7E 0A E5 56 E9  4..c2..[..W...V.
#     0010: A3 E6 0A A3 04 41 CC D9   39 35 82 F0 47 0E AA D3  .....A..95..G...
#     0020: 03 07 6E CF 92 84 08 82   33 92 9F D6 B8 C6 16 24  ..n.....3......$
#     0030: 9B 0E 38 1A 97 A4 22 63   12 AC A5 56 94 FA 3A 3C  ..8..."c...V..:<
#     0040: DC E8 73 FB 46 5A 93 59   74 53 C1 26 40 B0 33 3F  ..s.FZ.YtS.&@.3?
#     0050: 9B 29 30 CB 07 DF 01 21   1D D9 66 53 6E BA CC 26  .)0....!..fSn..&
#     0060: 9E 69 CD C2 81 8E 6F DE   C4 EA AF 9A FD 51 CA 53  .i....o......Q.S
#     0070: F0 B4 8A E0 D8 C3 78 32   D2 51 D3 E4 64 39 32 70  ......x2.Q..d92p
#     0080: 99 A6 49 2A 75 BC CA 34   8E ED 80 25 81 8B 12 4D  ..I*u..4...%...M
#     0090: FA ED FC 89 4D 60 3A F6   EC 66 E8 AB 22 D7 64 76  ....M`:..f..".dv
#     00A0: 2F 03 1C 1F 00 50 42 42   A0 F7 96 F3 B8 B3 4A A6  /....PBB......J.
#     00B0: C2 3F 1C 7C 5F 39 DF D5   93 7B 99 95 23 AA 95 7B  .?.._9......#...
#     00C0: D4 89 BB 57 79 58 45 58   E2 21 28 1A BA C2 42 7D  ...WyXEX.!(...B.
#     00D0: 6F C7 28 01 66 65 11 99   95 BD 17 56 21 D7 3E 7E  o.(.fe.....V!.>.
#     00E0: 07 BA 49 97 1D FF F2 B3   3F D6 69 0E 1A DC E6 AF  ..I.....?.i.....
#     00F0: 12 F8 59 5B C2 F4 B4 49   90 F9 2D 9E 7E E4 D6 38  ..Y[...I..-....8
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.491 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 9B 7F 26 7E AB C6 22   EF 18 AA DE 3E B9 80 D2  ...&..."....>...
#     0010: 04 F8 98 32 9B 87 23 9C   65 41 8E 50 B0 DF 51 F0  ...2..#.eA.P..Q.
#     0020: 4A 37 E8 F2 0F 92 B1 97   11 45 40 7F 0A DC 15 73  J7.......E@....s
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.492 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:47.548 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9A 87 EC 26 D6 23 26 A0 20 09 E4 FD CA 61 9F 9D 15 B2 AC 33 6A DB FE 02 5A BC 5C 69 32 C4 36 4E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 15:57:47.831 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 15:57:47.832 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 15:57:48.759; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 15:57:48.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 15:57:49.129; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 15:57:49.132; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 15:57:49.133; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wPQuwQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:49.164 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B A3 B1 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:22.000 UTC",
#     "not  after"         : "2023-12-29 15:57:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 12 8F FA 5D 4A 49 93   FA 4B 80 6C B1 3C 06 CD  ....]JI..K.l.<..
#         0010: 4F 31 70 0B                                        O1p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:49.168 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F CF 30 B8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:14.000 UTC",
#     "not  after"         : "2023-12-29 15:57:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 15:57:49.183 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:49.411 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.412 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:49.414 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:57:49.414 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.420 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.431 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.431 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.432 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:57:49.434 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0D A1 3F 0F 8E D1 D6 DD 8E A8 47 98 99 3A E7 1F E2 F2 44 EA 7F 35 CD 92 3E 5C 66 6C 82 D2 28 4B",
#   "session id"          : "9E 7A AD 4D AD 3B 7D 37 4C 24 79 2C 12 7B 64 18 85 5C 1C F7 74 4F AF C4 30 8B AE E9 6B BC C6 2C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8D B7 E6 94 CB 49 93 79   75 35 B3 CE F1 8B A1 9A  .....I.yu5......
#             0010: 85 A2 B8 06 B5 90 B7 3B   CC DA D2 B7 BD 9A E1 38  .......;.......8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.536 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 03 27 E1 15 F6 21 30 25 D5 6C 73 D2 EF BF F3 2C D2 09 A7 17 FB D2 9F F3 00 BA F4 3E 91 DD 66",
#   "session id"          : "9E 7A AD 4D AD 3B 7D 37 4C 24 79 2C 12 7B 64 18 85 5C 1C F7 74 4F AF C4 30 8B AE E9 6B BC C6 2C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 8D AB 67 10 F4 75 0B   4D BA BD 1E AB 18 A9 04  ...g..u.M.......
#           0010: A7 19 B2 A1 EF 59 15 A0   BC 9A 52 10 68 DE FB 67  .....Y....R.h..g
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.537 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.537 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.538 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.538 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.538 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.539 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.539 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.541 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.543 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.543 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.543 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.543 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.543 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.550 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.552 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.553 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.556 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.557 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.558 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.558 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.559 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.559 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.560 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.560 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.564 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B CC 6A C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:18.000 UTC",
#       "not  after"         : "2023-12-29 15:57:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 05 47 E8 3D 4D ED 2B   8C C4 B9 6D 47 B1 58 D9  ..G.=M.+...mG.X.
#           0010: 28 A3 C2 8D                                        (...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:49.626 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:49.626 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:49.626 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:57:49.627 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.657 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 8D C6 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 15:57:16.000 UTC",
#     "not  after"         : "2023-12-29 15:57:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#         0010: 08 5E 48 52                                        .^HR
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#         0010: 92 B1 9A 2F                                        .../
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.661 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 4B DE F4 12 45 0B 44   11 7E FF 62 51 35 3F 60  .K...E.D...bQ5?`
#     0010: 6B DF C1 5F A7 07 AF B0   31 7D FC B3 DC 76 AB D9  k.._....1....v..
#     0020: 87 BD D5 B5 11 EC 78 57   D1 52 4C 2E 14 FC 2E 06  ......xW.RL.....
#     0030: 4B CC 2B 15 E8 EF 2E 2D   45 DB A9 06 D2 B5 5B 31  K.+....-E.....[1
#     0040: 9E 5B D9 37 97 2C E9 FB   BF A0 96 E4 56 20 0E 53  .[.7.,......V .S
#     0050: 0C 68 4B BF C9 7A 07 60   A9 80 73 E3 E6 A7 D8 1D  .hK..z.`..s.....
#     0060: C8 BD 04 6E B7 FC 49 40   5C 52 63 85 7B D4 71 EF  ...n..I@\Rc...q.
#     0070: B4 66 D5 90 C5 3D 01 09   E8 C3 68 00 95 47 3E FF  .f...=....h..G>.
#     0080: B0 11 AE 95 3B BA FA F4   5C 6E 4A 48 E9 F1 3B 2E  ....;...\nJH..;.
#     0090: 27 EC 3E E1 95 CE DC 65   AB B5 6E 56 AF 58 A2 3B  '.>....e..nV.X.;
#     00A0: F4 4A 0B A4 4C A6 DB 7A   F1 4C 5F 3D 8E 8E 91 6F  .J..L..z.L_=...o
#     00B0: F4 DD F5 1F 51 E3 4C B4   B1 09 79 B3 46 0A 9F E3  ....Q.L...y.F...
#     00C0: 65 0C 82 CA 95 47 98 3F   F9 FF FA 1A 41 AF AD 1A  e....G.?....A...
#     00D0: F0 75 83 B7 88 8C 7D 14   7A 3C B4 B0 61 C3 3D 67  .u......z<..a.=g
#     00E0: E9 A5 3A 9C 59 05 D4 1E   25 8F 84 F8 87 19 63 4B  ..:.Y...%.....cK
#     00F0: B0 DA 89 BE 6C 96 B5 2E   CE 0D 35 41 C1 78 78 60  ....l.....5A.xx`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.664 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 2F 5B 78 5C 17 58 55   B7 09 54 9B 53 4B AE 7E  ./[x\.XU..T.SK..
#     0010: EF 44 6F E4 81 3A F3 D9   A1 5D E6 75 34 6E 4D ED  .Do..:...].u4nM.
#     0020: DC DD 88 8F B5 A3 F3 9A   CE 9D 8C 43 71 76 B1 94  ...........Cqv..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.666 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:49.667 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.667 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:49.667 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 15:57:49.668 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:57:49.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.668 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.671 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B A3 B1 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:22.000 UTC",
#       "not  after"         : "2023-12-29 15:57:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 12 8F FA 5D 4A 49 93   FA 4B 80 6C B1 3C 06 CD  ....]JI..K.l.<..
#           0010: 4F 31 70 0B                                        O1p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 8D C6 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:16.000 UTC",
#       "not  after"         : "2023-12-29 15:57:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#           0010: 08 5E 48 52                                        .^HR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.696 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 48 7E 55 BE 11 27 A8   4E 68 2D EA ED 88 0A 05  .H.U..'.Nh-.....
#     0010: 7B CC 17 D6 FE DE 74 A7   EF E1 40 1B EF 01 92 04  ......t...@.....
#     0020: D8 00 A9 49 D6 5F AA 93   89 38 97 A6 C7 1B DF F5  ...I._...8......
#     0030: E4 56 BE 6A 17 D2 39 C1   48 40 6D 7D 58 7F F4 B5  .V.j..9.H@m.X...
#     0040: F4 90 8A 7C 48 C6 EC 38   A8 80 C6 84 64 3C AF 37  ....H..8....d<.7
#     0050: 9A C2 12 EC 4B 4F 3F 0F   0E 1F 04 46 DC FE 55 4D  ....KO?....F..UM
#     0060: 6A 97 9F 46 1F 07 EA 68   82 80 B7 C7 13 CD 17 CB  j..F...h........
#     0070: 4E 72 C7 A4 82 62 78 EE   5C 4A F3 FA 34 D4 C7 54  Nr...bx.\J..4..T
#     0080: 44 08 C2 1C D8 3D 4B D0   66 09 49 2C 48 C0 0A DA  D....=K.f.I,H...
#     0090: 53 FC 5E 77 9D 20 B7 55   C0 87 64 51 A2 D0 4F 14  S.^w. .U..dQ..O.
#     00A0: 5A ED 8E C6 78 24 92 45   EF F4 97 51 DE C5 E8 3A  Z...x$.E...Q...:
#     00B0: 65 EF 65 B9 34 41 46 43   F8 C1 80 93 99 9D B6 05  e.e.4AFC........
#     00C0: 09 00 E1 9B D2 1D D4 09   AA 2B 6F 23 94 A3 2C 95  .........+o#..,.
#     00D0: 91 51 71 29 94 98 F0 F3   A4 E4 B2 5E C1 79 0B EA  .Qq).......^.y..
#     00E0: 2A 1B 8D C5 9E DD C7 0C   AD EE 93 6C A8 4F 3D 15  *..........l.O=.
#     00F0: 8D 4B 90 2E 9D 41 8F FB   B7 63 45 2E A5 CF B1 1C  .K...A...cE.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.698 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C FD 3E 6E 7D 78 7C BD   1C 71 1F 51 D4 D1 46 B9  ,.>n.x...q.Q..F.
#     0010: 92 EF 78 E7 97 1B 74 91   92 6F 7F 2F 69 98 7F 2A  ..x...t..o./i..*
#     0020: EE 4C 1F DF F3 E9 B5 A0   87 87 52 E2 1C CD FB 2E  .L........R.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.698 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:57:49.746 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "96 12 0F 5D 1E C2 18 84 37 24 5F 5B F5 88 1C EB 9E 2F DC 34 81 56 7F 90 D0 39 12 C4 73 B2 AA 74",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 15:57:50.023 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 15:57:50.024 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 15:58:01.570; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 15:58:01.914 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 8D C6 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:16.000 UTC",
#       "not  after"         : "2023-12-29 15:57:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#           0010: 08 5E 48 52                                        .^HR
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A2 4E AD 24 AC B9 CC 43   E6 A8 EC 80 06 37 C6 42  .N.$...C.....7.B
#           0010: 92 B1 9A 2F                                        .../
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F CF 30 B8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 15:57:14.000 UTC",
#       "not  after"         : "2023-12-29 15:57:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B BC 07 0A 48 1B 6D 8F   75 62 89 B3 D0 AA 72 69  ....H.m.ub....ri
#           0010: 08 5E 48 52                                        .^HR
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 15:58:01.933 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:58:02.357 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:58:02.358 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:58:02.358 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:58:02.358 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:58:02.450 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.451 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:58:02.453 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 15:58:02.453 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.459 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.471 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.472 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.472 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 15:58:02.475 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 4D EE 15 1F 75 39 B6 C7 DD 62 36 2A 40 06 F8 48 A2 80 B3 F2 70 AA F6 DE C5 83 6F 21 09 67 62",
#     "session id"          : "3B 52 7C DF 5F 31 60 ED 75 9B C3 CC 38 CD 0A 1D B9 7E 28 E5 3A 60 C6 47 4F 30 2F D2 A2 90 D7 81",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 17 63 9C CB 21 65 C0 05   52 E8 1D 36 CB A4 A0 C1  .c..!e..R..6....
#               0010: B8 DA 3F DB B0 20 08 F8   73 A1 FB DE 79 DD 1A 42  ..?.. ..s...y..B
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.496 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "7C 69 75 C5 37 DF 35 3D 64 39 3A 6B DC F1 A7 8E CB 1D 29 E4 CE BC A8 46 89 27 FA FF 1A 83 41 48",
#     "session id"          : "3B 52 7C DF 5F 31 60 ED 75 9B C3 CC 38 CD 0A 1D B9 7E 28 E5 3A 60 C6 47 4F 30 2F D2 A2 90 D7 81",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FB 8E 80 56 5A 5F 8A 85   16 65 54 22 41 02 A7 DF  ...VZ_...eT"A...
#             0010: E4 FC 84 3E 90 09 9C 79   EB AF 6E 6F 58 07 97 2D  ...>...y..noX..-
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.496 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.496 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.499 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.499 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.501 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.501 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.501 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.501 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.510 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.511 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.513 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.516 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.516 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:58:02.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 15:58:02.519 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 15:59:22.500 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:59:22.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:59:22.541 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:59:22.542 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 15:59:22.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45564/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28074ms
ok 65 stop command for single port in 30651ms
ok 66 status detects locally running solr in 14293ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2148ms
ok 69 copying files around in 6497ms
ok 70 upconfig in 2596ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 23m 7s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5580 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5580/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([DDEB203AECB36F34:E81FCB61076F596A]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5791 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42699/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-30 13:44:33.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 13:44:33.434; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-30 13:44:34.649; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-30 13:44:34.692; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22615ms
ok 61 start solr with client truststore and security manager in 24956ms
not ok 62 start solr with mTLS needed in 58612ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lFwnRq/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42699.
#
# Started Solr server on port 42699 (pid=202116). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42700.
#
# Started Solr server on port 42700 (pid=202552). Happy searching!
#
# INFO  - 2023-09-30 13:45:57.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 13:45:57.389; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 13:45:57.770; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 13:45:57.772; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 13:45:57.773; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:57.804 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 D7 24 37",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:33.000 UTC",
#     "not  after"         : "2023-12-29 13:45:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D E7 2E B2 70 B9 33 C7   D6 CF DA F2 5C 55 FD 58  ....p.3.....\U.X
#         0010: 8D B1 6B CA                                        ..k.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:57.808 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 F6 67 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:25.000 UTC",
#     "not  after"         : "2023-12-29 13:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:57.822 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:45:58.046 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:45:58.048 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:45:58.048 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.064 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.065 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.065 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:45:58.067 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "97 97 86 AF EE 66 39 70 24 78 87 28 08 65 3B 3C 10 1C E9 6A BF EA 6C 5B 6C 8E 08 65 0E BD 86 2E",
#   "session id"          : "34 83 AA C0 F6 AA 20 45 EA 1E AB 97 D5 85 1B 9D 38 2D 7F 3B 04 9D 40 00 EF 49 83 01 CD EC F9 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 04 4B EC DB 58 60 EE   C8 4F 4B 0A EB 0D 70 EF  ..K..X`..OK...p.
#             0010: FA 79 90 9F 20 30 0B 59   1E A9 A0 5C 48 11 18 4C  .y.. 0.Y...\H..L
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.182 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6E 17 ED F3 65 BE A9 21 BE 1A 87 7F 9A 82 46 4F A2 03 6D 85 90 40 8C 19 63 71 3D 32 F4 3B 52 04",
#   "session id"          : "34 83 AA C0 F6 AA 20 45 EA 1E AB 97 D5 85 1B 9D 38 2D 7F 3B 04 9D 40 00 EF 49 83 01 CD EC F9 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 36 71 73 AE 7F AB 31 18   DF 84 C8 15 2C 70 90 3A  6qs...1.....,p.:
#           0010: 1C 3B 79 56 5C 31 6D 85   3D 24 36 51 BA CC 73 03  .;yV\1m.=$6Q..s.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.183 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.183 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.185 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.186 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.187 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.187 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.196 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.197 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.198 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.202 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.202 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.203 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.203 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.203 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.205 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.205 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.205 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.206 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.206 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.207 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.207 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.210 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 D7 B7 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:29.000 UTC",
#       "not  after"         : "2023-12-29 13:45:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 7D E1 77 80 1E 2A 0D   0B FE 6C 84 6F 68 A2 60  y..w..*...l.oh.`
#           0010: 0A 72 C4 8E                                        .r..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:45:58.262 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:45:58.262 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:45:58.262 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:45:58.263 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.292 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.296 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 14 12 EA 9E F8 64 C4   3A 07 E7 CB FF E6 F6 82  r.....d.:.......
#     0010: 8B C0 6E 21 8F 73 AB 6E   34 F3 B0 90 0C 04 17 7C  ..n!.s.n4.......
#     0020: 82 AB 84 47 BA 33 AA 97   61 94 57 04 65 F4 F0 6F  ...G.3..a.W.e..o
#     0030: 23 78 73 4C 24 48 A4 60   59 42 5A DC 74 C0 5D FC  #xsL$H.`YBZ.t.].
#     0040: 4D 84 42 46 71 F4 52 9C   FC 26 61 DB 99 81 29 BE  M.BFq.R..&a...).
#     0050: F7 7B DE 9B F7 28 15 8B   C6 BB 3C AE 45 EC 98 ED  .....(....<.E...
#     0060: 29 97 8D CE C5 98 41 57   07 0F A2 42 76 C7 7A BD  ).....AW...Bv.z.
#     0070: 50 3C D9 0F E6 19 D5 E6   53 4E 31 D6 B8 EA C0 6D  P<......SN1....m
#     0080: E9 F7 75 A7 B9 43 09 89   98 F6 A5 4F 44 2D 6C 91  ..u..C.....OD-l.
#     0090: 4D DB 64 9F 64 71 DF 48   29 B7 8B 59 7D F7 7C BC  M.d.dq.H)..Y....
#     00A0: 10 A2 00 E6 29 A3 73 6D   B2 BA F8 DE 94 86 AE B5  ....).sm........
#     00B0: E5 58 A0 EC 19 93 64 1E   13 1E E6 50 F0 ED F3 E0  .X....d....P....
#     00C0: C0 08 67 AD 40 33 EE 32   55 79 08 EB A5 B5 3B 86  ..g.@3.2Uy....;.
#     00D0: 42 E1 2A 6C AC 92 75 73   84 8D 67 42 B8 F3 CE 80  B.*l..us..gB....
#     00E0: 59 5D E8 FF FB 82 B4 19   B4 A0 2A B1 12 35 BD 5A  Y]........*..5.Z
#     00F0: FF BE 4D 9E 1A A1 D8 07   B9 86 4C 2E DA 15 C1 CB  ..M.......L.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.298 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 01 27 40 A2 58 ED 51   72 A6 D5 9F 61 B5 99 3E  ..'@.X.Qr...a..>
#     0010: 14 3C 1B 31 D8 C7 06 40   F5 F1 26 9C 0D E8 27 16  .<.1...@..&...'.
#     0020: C9 7C D4 71 26 8D 64 A9   D7 5B 5E 58 A0 EE 64 3A  ...q&.d..[^X..d:
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.300 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:45:58.301 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.301 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:45:58.302 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:45:58.302 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:45:58.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.302 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.305 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 D7 24 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:33.000 UTC",
#       "not  after"         : "2023-12-29 13:45:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D E7 2E B2 70 B9 33 C7   D6 CF DA F2 5C 55 FD 58  ....p.3.....\U.X
#           0010: 8D B1 6B CA                                        ..k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B E4 48 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:27.000 UTC",
#       "not  after"         : "2023-12-29 13:45:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#           0010: 69 EE 26 37                                        i.&7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.329 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F 65 0B 03 BF B4 0E B1   D4 1C 0D C3 8A D8 DF 29  Oe.............)
#     0010: 4D 7D 0E AD 62 96 C0 2C   41 F1 72 CA 56 FA 2B 7E  M...b..,A.r.V.+.
#     0020: 1C D2 45 4B 74 57 3E 00   9C 8A C2 EE 6A 62 ED CD  ..EKtW>.....jb..
#     0030: 18 B7 D9 C9 FC 33 89 65   CB 4D 56 08 AB B2 AA 95  .....3.e.MV.....
#     0040: 0F 8C E9 41 0B 12 FE 08   85 77 42 0B 16 FA 6B 4E  ...A.....wB...kN
#     0050: B9 D1 95 5A 3D F8 BD B1   D2 FA 7A 27 88 96 98 E1  ...Z=.....z'....
#     0060: B8 47 DE CF 50 DA 85 D2   A7 D5 34 F2 A0 FF AB 60  .G..P.....4....`
#     0070: EB 31 90 BF 1E 7A A2 D4   61 48 75 55 53 40 43 D6  .1...z..aHuUS@C.
#     0080: 98 B2 3C B6 C2 24 A5 27   88 86 A0 B8 81 59 95 A1  ..<..$.'.....Y..
#     0090: C1 30 44 0B 5C 2C A3 22   18 46 49 73 FE 9D EC 30  .0D.\,.".FIs...0
#     00A0: 72 48 67 61 F4 4F C0 C0   61 8E 6F 06 F6 4C 93 70  rHga.O..a.o..L.p
#     00B0: 1C F6 C8 E2 53 3D 33 2A   F6 DB DD D1 5A 20 0E 76  ....S=3*....Z .v
#     00C0: 87 68 FC BD E7 69 18 9C   55 BD 2F F6 3B E4 C5 2C  .h...i..U./.;..,
#     00D0: 2B 4E 37 8D D0 6D BD 6A   10 2B 11 54 AF AB E6 AC  +N7..m.j.+.T....
#     00E0: 2B B7 F9 74 BB CE B8 B5   BE 1E 10 5C 86 31 EA DB  +..t.......\.1..
#     00F0: 12 D1 BB AA 37 63 66 1D   BB 3C 90 D1 A2 89 C4 9F  ....7cf..<......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.330 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DD 83 DC 61 43 23 8B 62   60 13 3D 8F D2 FB B8 3D  ...aC#.b`.=....=
#     0010: 84 2E 67 BF 5A D0 6F DD   52 D6 11 57 5F 6C 4D EE  ..g.Z.o.R..W_lM.
#     0020: 11 28 57 3B 15 0F D1 8B   4F 9C 14 DC B3 5A 15 45  .(W;....O....Z.E
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.331 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:45:58.379 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 20 0A DD 1F 50 A6 A7 42 BD E3 17 E2 95 6F 8F D2 36 DF 5C A2 B8 F8 63 F1 05 5D 55 3F 2E 83 78",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 13:45:58.639 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 13:45:58.640 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 13:45:59.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 13:45:59.581; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 13:45:59.933; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 13:45:59.936; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 13:45:59.937; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lFwnRq/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:59.968 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 D7 24 37",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:33.000 UTC",
#     "not  after"         : "2023-12-29 13:45:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D E7 2E B2 70 B9 33 C7   D6 CF DA F2 5C 55 FD 58  ....p.3.....\U.X
#         0010: 8D B1 6B CA                                        ..k.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:59.972 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 F6 67 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:25.000 UTC",
#     "not  after"         : "2023-12-29 13:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 13:45:59.986 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:46:00.071 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:46:00.072 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:46:00.073 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:46:00.073 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:00.208 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.209 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:00.210 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:00.211 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.216 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.228 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.228 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:00.230 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB 49 CD 46 F2 AA 6F A0 6F 3B D7 D9 B5 77 64 E4 97 BE A8 BA 0D 24 6D EF 45 23 53 2B 7A 7F 20 7C",
#   "session id"          : "06 52 F9 08 E3 00 12 8B 66 15 26 68 5B 32 FD FD 6D DB D4 36 33 5F D7 4E DE B3 7A 58 61 A9 F0 69",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 33 F6 FA A0 88 29 35 65   E7 A6 84 BD 17 5D 86 C2  3....)5e.....]..
#             0010: 4A 41 96 5F C4 68 E5 A7   BE 3C E6 B9 F1 9E 87 19  JA._.h...<......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.332 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1F 82 2E FC 00 57 05 E6 56 9E DC B5 16 72 48 A0 14 1A 3F BD 6A 90 A1 FD CC 81 64 35 E6 28 B2 D0",
#   "session id"          : "06 52 F9 08 E3 00 12 8B 66 15 26 68 5B 32 FD FD 6D DB D4 36 33 5F D7 4E DE B3 7A 58 61 A9 F0 69",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 58 4F 8A 6A D6 0D 46 89   21 5C 62 9C FF EE 75 7A  XO.j..F.!\b...uz
#           0010: 5F C9 43 3B A5 B0 1D E1   66 3F 6E EC 4C 38 3B 0A  _.C;....f?n.L8;.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.332 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.332 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.335 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.336 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.345 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.347 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.348 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.351 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.354 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.354 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.355 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.355 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.356 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.356 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.359 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 D7 B7 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:29.000 UTC",
#       "not  after"         : "2023-12-29 13:45:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 7D E1 77 80 1E 2A 0D   0B FE 6C 84 6F 68 A2 60  y..w..*...l.oh.`
#           0010: 0A 72 C4 8E                                        .r..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.360 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.443 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B E4 48 05",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 13:45:27.000 UTC",
#     "not  after"         : "2023-12-29 13:45:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#         0010: 69 EE 26 37                                        i.&7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#         0010: 77 FF FC E7                                        w...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.447 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 74 B4 EA 09 44 E8 5C   8A B3 76 46 63 F1 70 38  Ut...D.\..vFc.p8
#     0010: 33 F9 A4 B1 D9 99 37 32   61 B9 17 A6 39 1F 9D 57  3.....72a...9..W
#     0020: 4E A1 7A 4D 43 1D 0C 4D   98 F8 18 D9 EE 7A 6B 73  N.zMC..M.....zks
#     0030: 2A EA AE AD 1C FC 33 C5   74 2F 56 0C 04 33 4E E4  *.....3.t/V..3N.
#     0040: 7C 62 5F 73 87 E8 01 FF   84 2C 66 26 B3 1C 64 5A  .b_s.....,f&..dZ
#     0050: 76 6B 2E C4 80 A7 4B 6E   A5 00 83 29 25 66 31 D0  vk....Kn...)%f1.
#     0060: 14 CF FF 4B 67 0C 96 C3   9F 4F C3 FC 6A 19 3E F2  ...Kg....O..j.>.
#     0070: 18 D2 5F F4 57 05 36 FB   3C 2D 51 87 AE 72 4E B9  .._.W.6.<-Q..rN.
#     0080: 3F 97 22 D7 33 5F D5 CF   78 D7 CE DC 42 32 4E 7A  ?.".3_..x...B2Nz
#     0090: 15 EA 5A 43 52 71 6B C6   EE 4E 06 8E E8 28 00 0D  ..ZCRqk..N...(..
#     00A0: 4F 4B 18 D1 79 9D BA E8   27 19 29 9A 15 45 6C F8  OK..y...'.)..El.
#     00B0: 7F 01 C5 10 4F 6D 5F 87   5C 35 25 4F 9A 48 68 DD  ....Om_.\5%O.Hh.
#     00C0: 83 0E 86 A9 14 5A 48 8A   01 B4 9D A2 EA CD 19 29  .....ZH........)
#     00D0: 04 19 FB DF F2 31 92 4F   92 63 DE 62 81 E2 3E 85  .....1.O.c.b..>.
#     00E0: 5D CA C1 4D C6 F5 06 BA   41 94 4D 09 2E 05 17 90  ]..M....A.M.....
#     00F0: 52 C3 05 9E 97 13 DF 84   86 0A 97 D9 17 8C 70 F1  R.............p.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.449 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC 6B AB 40 91 D2 F0 62   14 1A 85 4C 7E 76 FA D5  .k.@...b...L.v..
#     0010: 7C 40 3D 03 2A 71 E8 B8   E5 5A 61 90 17 DF 50 8A  .@=.*q...Za...P.
#     0020: 7D A8 6B 5B A1 99 91 B9   A6 26 D1 B9 18 A6 77 6C  ..k[.....&....wl
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.451 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:46:00.452 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.452 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:46:00.453 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.453 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 13:46:00.453 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 13:46:00.453 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.454 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.456 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 D7 24 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:33.000 UTC",
#       "not  after"         : "2023-12-29 13:45:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D E7 2E B2 70 B9 33 C7   D6 CF DA F2 5C 55 FD 58  ....p.3.....\U.X
#           0010: 8D B1 6B CA                                        ..k.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B E4 48 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:27.000 UTC",
#       "not  after"         : "2023-12-29 13:45:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#           0010: 69 EE 26 37                                        i.&7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.482 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 92 A4 C3 B4 74 0B F4   E7 5A A4 E2 CC 0D 24 B3  v....t...Z....$.
#     0010: C7 D5 41 76 29 ED FF E3   01 D3 C6 8F 5C 9B 46 AE  ..Av).......\.F.
#     0020: F6 F1 4C C5 6D 02 F4 28   16 6B 2C 61 DB 28 5C BA  ..L.m..(.k,a.(\.
#     0030: 1B 1E 61 BD BF 2F 27 24   B0 73 F6 F1 11 09 A1 CD  ..a../'$.s......
#     0040: D9 2D DE 35 C3 CA 04 8F   FD A7 93 0C B6 5D 83 4D  .-.5.........].M
#     0050: 44 DA 84 8C ED FB 2D 89   2A 98 2F 94 3C 75 62 10  D.....-.*./.<ub.
#     0060: 0B 5B FD 0D 4C A5 A7 54   77 D5 91 63 DC 79 33 EF  .[..L..Tw..c.y3.
#     0070: F0 8F 58 E9 83 8B 7A EF   2A 85 1C CB 19 BC 42 12  ..X...z.*.....B.
#     0080: E8 4D E7 F3 1A B1 C2 54   80 FD 01 E1 FF F7 AF 3F  .M.....T.......?
#     0090: 6A 2C 08 EA 70 D3 CB 87   54 EA 95 53 51 20 D9 DE  j,..p...T..SQ ..
#     00A0: D5 FC D5 EB 35 E1 52 56   E5 3A 18 D7 31 4F AB 8A  ....5.RV.:..1O..
#     00B0: DE FC C4 2E 61 65 DA 60   00 7E E0 F5 26 51 B9 4B  ....ae.`....&Q.K
#     00C0: 30 52 2B 10 15 E4 A3 C2   D1 73 63 0E 40 80 8A CD  0R+......sc.@...
#     00D0: 82 9C E2 EE DA AD 0F CB   60 94 F8 37 20 96 6D 26  ........`..7 .m&
#     00E0: E2 2B 5D 7F 2D 50 8E 99   50 41 BC BE 73 CD 2C AC  .+].-P..PA..s.,.
#     00F0: AE B0 16 0E AC 03 46 D5   BB 02 F2 67 F3 4E CA 91  ......F....g.N..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.483 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 64 DC 43 C2 16 BD CA 51   68 30 10 26 94 43 E6 AD  d.C....Qh0.&.C..
#     0010: 48 BE F3 D0 10 3C 20 14   2B 1A F3 A6 43 1F 91 03  H....< .+...C...
#     0020: 8F 93 3B 24 4B 57 11 2D   84 A6 8E B8 82 5E 36 CF  ..;$KW.-.....^6.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.484 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:00.530 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F1 8D 85 7F 76 B2 7B 56 FA 2C 71 F7 50 92 1C 44 63 29 76 3C 97 F1 F5 C3 2B 00 14 A6 4F 69 40 EF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 13:46:00.823 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 13:46:00.824 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 13:46:11.859; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 13:46:12.177 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B E4 48 05",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:27.000 UTC",
#       "not  after"         : "2023-12-29 13:45:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#           0010: 69 EE 26 37                                        i.&7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA EC 9F 22 EA 70 2F B8   7F 05 45 89 D0 32 2A B7  ...".p/...E..2*.
#           0010: 77 FF FC E7                                        w...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 F6 67 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 13:45:25.000 UTC",
#       "not  after"         : "2023-12-29 13:45:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD EB 7A 6A 48 15 73 57   39 80 B0 4B B4 CF 00 22  ..zjH.sW9..K..."
#           0010: 69 EE 26 37                                        i.&7
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 13:46:12.193 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:12.423 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:12.425 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 13:46:12.425 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.430 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.442 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 13:46:12.444 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C2 36 96 A5 31 7D 08 62 12 05 3F DC A2 18 25 93 A8 0E B1 14 D1 74 85 AB DD 8C CB 1D 12 24 AD 5D",
#     "session id"          : "E5 89 F4 67 B9 28 9A D8 91 46 A8 EB 8D 3D 1C 14 FB B4 ED AD DD CC 22 5A 7E 49 5D 1F 9D 9F D3 29",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E5 78 32 A1 EE 28 49 EE   71 45 FF D4 4C CF 64 68  .x2..(I.qE..L.dh
#               0010: A5 18 2E 6D BE 1C 40 80   65 A7 DE 9C 5F E3 F2 06  ...m..@.e..._...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.463 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "39 9D EE 1C FA 8E 24 94 71 5E 5C 93 91 4C CF F4 77 2A 10 FF E7 27 6E 1D C4 92 29 94 73 F5 EA DE",
#     "session id"          : "E5 89 F4 67 B9 28 9A D8 91 46 A8 EB 8D 3D 1C 14 FB B4 ED AD DD CC 22 5A 7E 49 5D 1F 9D 9F D3 29",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 34 6A 98 6F 39 30 5A EC   D8 A4 23 7F 21 07 3D B7  4j.o90Z...#.!.=.
#             0010: B9 87 85 8D 11 A9 2F 37   5F DE 6E 5A 3F 6D 85 1E  ....../7_.nZ?m..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.464 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.464 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 13:46:12.465 UTC|SSLExtensions.java:163|Ignore unsupport

[...truncated too long message...]

RNING|21|h2sc-1-thread-5|2023-09-30 13:47:32.921 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:47:32.969 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:47:32.970 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:47:32.970 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 13:47:32.971 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42700/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28333ms
ok 65 stop command for single port in 31943ms
ok 66 status detects locally running solr in 14337ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2181ms
ok 69 copying files around in 6563ms
ok 70 upconfig in 2649ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1261ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=DDEB203AECB36F34 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 23m 6s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 23m29.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5579 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5579/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33927/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-30 01:52:26.552; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 01:52:26.558; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-30 01:52:27.447; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-30 01:52:27.488; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22203ms
ok 61 start solr with client truststore and security manager in 24913ms
not ok 62 start solr with mTLS needed in 58393ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-kt304i/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33927.
#
# Started Solr server on port 33927 (pid=202565). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33928.
#
# Started Solr server on port 33928 (pid=202994). Happy searching!
#
# INFO  - 2023-09-30 01:53:49.698; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 01:53:49.704; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 01:53:50.079; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 01:53:50.082; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 01:53:50.082; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:50.114 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 65 CE C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:25.000 UTC",
#     "not  after"         : "2023-12-29 01:53:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0D 56 76 A3 76 72 BA   D3 2E D9 D6 15 01 FD 4F  ..Vv.vr........O
#         0010: F2 1F 12 A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:50.119 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 8B 1B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:17.000 UTC",
#     "not  after"         : "2023-12-29 01:53:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:50.133 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:50.360 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.360 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:50.362 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:50.362 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.367 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.379 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.379 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.379 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:50.381 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 CA 5C F5 1D 9E 8A AF 08 E4 93 B6 91 1B 66 6F BF 1F 95 0F 91 9A 7A CD 9E 59 95 4E E4 FC 59 7B",
#   "session id"          : "F2 7E 1C E1 E6 0F 9E 68 93 87 1B 57 BC D7 51 75 07 A8 F1 B7 AE FE 42 AB 15 14 FB 67 07 AE 27 5D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 53 79 A8 61 1E 96 03 21   5C 9C 24 8F 68 02 A4 D7  Sy.a...!\.$.h...
#             0010: 65 4E DF 0A 85 77 09 62   94 E0 54 EE B6 E8 FD 4A  eN...w.b..T....J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.487 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BB 5D 20 18 FD 93 52 15 B1 49 3E A8 2E 50 7E 05 A8 6D 5C 6B B5 A0 F8 A1 1F 03 B6 B7 A4 45 46 88",
#   "session id"          : "F2 7E 1C E1 E6 0F 9E 68 93 87 1B 57 BC D7 51 75 07 A8 F1 B7 AE FE 42 AB 15 14 FB 67 07 AE 27 5D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 02 7A FC 48 B0 99 E1 4B   67 5A 77 63 90 2F E7 44  .z.H...KgZwc./.D
#           0010: 5F D0 FB 5E 90 CF 9C B0   6F 3E D5 29 7F A1 E4 07  _..^....o>.)....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.487 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.488 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.489 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.489 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.489 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.489 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.489 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.490 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.490 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.490 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.491 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.492 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.492 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.492 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.493 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.494 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.494 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.501 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.503 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.504 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.507 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.507 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.509 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.510 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.510 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.511 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.511 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.512 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.512 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.513 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.515 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F CD C8 65",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:22.000 UTC",
#       "not  after"         : "2023-12-29 01:53:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EF 4B 85 88 66 CF 85 E4   99 D3 0E A2 6E E9 71 A7  .K..f.......n.q.
#           0010: B5 36 F0 75                                        .6.u
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.515 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:50.574 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:50.575 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:50.575 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:50.575 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.605 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.608 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 18 8D 11 EA C2 1E F2   17 FC 48 D0 0A 47 9A BD  W.........H..G..
#     0010: 6E D9 1A AC 5D EA DA FF   85 BE 61 0F 6A 91 D2 96  n...].....a.j...
#     0020: 0A C9 8E 39 B5 F2 48 26   F0 4A 68 74 11 0A 0B 68  ...9..H&.Jht...h
#     0030: F4 7D 25 D6 37 C4 34 82   BE FD 68 2A 4E 32 D8 7F  ..%.7.4...h*N2..
#     0040: 5A 75 BE BA 82 5E B5 D4   AC AC DB 74 FD D6 19 48  Zu...^.....t...H
#     0050: 9E 12 A5 76 E7 41 44 63   FA A4 55 25 2D A1 DF C3  ...v.ADc..U%-...
#     0060: 76 EB 6A 50 16 FC C4 0D   F5 D1 9D C6 A6 F5 37 80  v.jP..........7.
#     0070: 00 BB D4 15 09 94 DE E2   DB 6A 4B 0E 5B 60 30 38  .........jK.[`08
#     0080: 1D 58 E1 BB D2 EB 8A D3   A9 74 18 18 52 60 47 2B  .X.......t..R`G+
#     0090: BF 5D 5B DB 1C 65 4B DF   CB C4 C3 5F 0C 92 D9 A4  .][..eK...._....
#     00A0: 5B 6A 5A 23 B9 1F BC 7E   3C 5A 2C 89 95 A1 1E E8  [jZ#....<Z,.....
#     00B0: 4A 1A C1 AF 7B 31 05 6C   AF 7A 2C 71 77 3B ED 44  J....1.l.z,qw;.D
#     00C0: B5 AD 71 56 4B 41 A4 6C   64 96 10 16 61 3E 82 25  ..qVKA.ld...a>.%
#     00D0: 57 34 D4 C2 28 07 FF 12   EE EE 8F 6F 7B 88 E7 B7  W4..(......o....
#     00E0: 6F 10 7B 30 7F 7B 97 1D   CA 33 72 4E 0E E1 07 B7  o..0.....3rN....
#     00F0: 96 53 EB D8 D4 BD E4 28   A0 F9 9B 98 B0 A8 4B 2F  .S.....(......K/
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.610 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 58 27 DA 86 92 36 74 D9   0B 01 44 FB 4C FF 6D 7D  X'...6t...D.L.m.
#     0010: 6E 95 79 11 F9 E4 D3 52   A7 BE 18 B5 6E 67 0C E2  n.y....R....ng..
#     0020: BE B8 A3 27 D7 3C C9 27   79 85 89 2D 0E 74 B4 F1  ...'.<.'y..-.t..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:50.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:50.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:50.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:50.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.615 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.617 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 65 CE C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:25.000 UTC",
#       "not  after"         : "2023-12-29 01:53:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0D 56 76 A3 76 72 BA   D3 2E D9 D6 15 01 FD 4F  ..Vv.vr........O
#           0010: F2 1F 12 A7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 BE E7 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:19.000 UTC",
#       "not  after"         : "2023-12-29 01:53:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#           0010: 16 6B 3A C9                                        .k:.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.641 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 89 85 C1 4D AC F9 C5   0F 54 EC 76 60 89 98 52  e...M....T.v`..R
#     0010: 55 F7 08 D4 45 D0 B1 6B   90 5F 24 20 38 E2 B0 C8  U...E..k._$ 8...
#     0020: BF 15 6B 26 73 5E AD 07   94 75 4D B9 4C 09 F2 BD  ..k&s^...uM.L...
#     0030: F4 2D AD 74 27 B9 39 39   EA 85 2C 4E 0A 21 FA B2  .-.t'.99..,N.!..
#     0040: 7A 5C 60 3C 6B A5 9A E5   AA A3 2A D4 56 99 88 F4  z\`<k.....*.V...
#     0050: DD FF EC 08 D0 6D B0 51   74 98 12 AC 7E EA 7F 4E  .....m.Qt......N
#     0060: 28 D0 C4 DB 69 C5 C5 7C   DE 9E AA 9E 5A 27 BC 08  (...i.......Z'..
#     0070: 7D 84 EA E3 7E DE E6 9D   03 9B 55 24 98 51 14 03  ..........U$.Q..
#     0080: 56 87 AE 77 D0 0F E9 95   7E AE 0E 9A 2A 12 00 DE  V..w........*...
#     0090: C7 CD 75 42 7F B8 46 FC   E2 C9 80 E2 B1 F2 47 43  ..uB..F.......GC
#     00A0: 2F 42 20 AF 8B C0 36 46   FF 54 67 6F 9E 3C DD EB  /B ...6F.Tgo.<..
#     00B0: D2 05 E2 5D 78 37 66 92   36 46 B1 A5 56 4F EE 82  ...]x7f.6F..VO..
#     00C0: CA 40 92 73 4A 97 7B A3   73 FF 29 0A 4B DA 48 79  .@.sJ...s.).K.Hy
#     00D0: 60 1E 33 A6 B8 76 18 09   5E 64 3C 54 35 FA 63 97  `.3..v..^d<T5.c.
#     00E0: 52 46 E3 83 38 67 76 24   97 E0 AC 81 17 14 3C F3  RF..8gv$......<.
#     00F0: 15 A2 0A 6F 96 C0 54 9D   AC 39 D0 D8 A9 85 FA F7  ...o..T..9......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.643 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4E 0B EE A3 42 E8 38 DD   74 26 C2 4C 36 3F F8 79  N...B.8.t&.L6?.y
#     0010: E7 2A 60 61 4E EB EA F4   60 7B 39 2E B5 13 26 F6  .*`aN...`.9...&.
#     0020: 8B ED 25 CF 64 5F 4F C0   E8 6A 7B 60 B8 13 15 A1  ..%.d_O..j.`....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.643 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:50.690 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 9C F9 F8 9A C2 4A 45 FA 71 82 52 7A DA EA 30 8F 10 01 CA BC 7B 49 EB 65 09 79 7D E6 36 8D E9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 01:53:50.956 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 01:53:50.957 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 01:53:51.871; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 01:53:51.876; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 01:53:52.267; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 01:53:52.271; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 01:53:52.271; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kt304i/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:52.307 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 65 CE C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:25.000 UTC",
#     "not  after"         : "2023-12-29 01:53:25.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CE 0D 56 76 A3 76 72 BA   D3 2E D9 D6 15 01 FD 4F  ..Vv.vr........O
#         0010: F2 1F 12 A7                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:52.312 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0D 8B 1B D9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:17.000 UTC",
#     "not  after"         : "2023-12-29 01:53:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 01:53:52.330 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:52.438 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:52.443 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:52.444 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:53:52.445 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:52.591 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.591 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:52.593 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:53:52.593 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.611 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:53:52.614 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "66 F0 DD 77 43 25 F6 4C 0A 1C CC 67 E5 A3 60 8F EC C0 96 67 9D 9D 32 19 AD 77 81 5F A4 2C DE 23",
#   "session id"          : "8E 61 90 86 4E 80 D9 9D CB 59 A2 1B FD F4 E7 CA 6F 77 F1 76 09 6C AE 71 B2 E4 44 B6 91 D1 5B 60",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 46 AD 1E 6D B3 E3 E4 F6   2F 2C C0 95 76 DB 70 85  F..m..../,..v.p.
#             0010: 90 27 53 B5 04 A9 2A 8D   11 B1 3A 0E F8 05 1D 1A  .'S...*...:.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.716 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EE 78 4D 13 0D D1 43 75 68 C1 6F 49 83 5C B2 F3 7A 2E 78 0A 3B AE F2 EE 77 FB 0F 2B AD 5C FD 3F",
#   "session id"          : "8E 61 90 86 4E 80 D9 9D CB 59 A2 1B FD F4 E7 CA 6F 77 F1 76 09 6C AE 71 B2 E4 44 B6 91 D1 5B 60",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A 50 17 3D 5C EF C4 F2   99 3B 8C 5E A9 83 25 D1  :P.=\....;.^..%.
#           0010: C7 6A A7 19 DE B8 0F ED   C4 86 81 09 E8 39 3B 31  .j...........9;1
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.717 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.717 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.720 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.720 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.722 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.722 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.723 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.731 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.732 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.733 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.737 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.737 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.738 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.739 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.740 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.741 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.741 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.741 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.742 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.744 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.747 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F CD C8 65",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:22.000 UTC",
#       "not  after"         : "2023-12-29 01:53:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EF 4B 85 88 66 CF 85 E4   99 D3 0E A2 6E E9 71 A7  .K..f.......n.q.
#           0010: B5 36 F0 75                                        .6.u
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.748 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.837 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 BE E7 8B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 01:53:19.000 UTC",
#     "not  after"         : "2023-12-29 01:53:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#         0010: 16 6B 3A C9                                        .k:.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#         0010: 00 43 99 9C                                        .C..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.841 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 B4 C9 F3 20 DA C1 88   A5 71 7A 3D 26 8B E5 85  C... ....qz=&...
#     0010: 2B AD 56 F0 C5 78 3C 33   94 2E 22 F8 4F 6E D7 03  +.V..x<3..".On..
#     0020: 2B 02 65 6E 45 DC 90 EF   05 10 A7 3F AF E4 C9 06  +.enE......?....
#     0030: D5 A4 98 C4 37 61 B6 F4   53 79 6C 6D 56 F1 AC 97  ....7a..SylmV...
#     0040: F5 FA 39 CA AD E3 43 5A   DB 07 DA 3F 87 B2 CD 84  ..9...CZ...?....
#     0050: 37 00 EE AD 90 1D F6 32   81 35 A3 09 77 64 5A AE  7......2.5..wdZ.
#     0060: 27 A3 76 46 85 6B CF B1   3F FC 34 84 08 F7 C7 81  '.vF.k..?.4.....
#     0070: 77 3D 39 61 33 3C 2E 1B   F3 B2 99 90 67 FE 02 6B  w=9a3<......g..k
#     0080: 19 6D C7 08 C4 D5 BC A4   34 DB 6B 39 FD 06 8C 5C  .m......4.k9...\
#     0090: E1 A7 8E F0 B7 EA 7E 1D   43 D5 CD 6A 97 65 81 64  ........C..j.e.d
#     00A0: 6A 35 5D 4F D8 7A 9D 42   0F B0 1A 8B 77 45 AC EB  j5]O.z.B....wE..
#     00B0: 92 5E 43 2B 72 96 22 77   29 C8 88 46 29 67 DF BD  .^C+r."w)..F)g..
#     00C0: 6B 9C DD A6 0A 79 C5 2E   92 B5 73 8A 04 78 D2 66  k....y....s..x.f
#     00D0: 26 1F D0 48 A0 95 F2 8B   F7 09 14 61 CF 66 67 51  &..H.......a.fgQ
#     00E0: 32 2A 40 E5 DD D3 BA 36   EC F8 D1 F8 5E 4C 38 4D  2*@....6....^L8M
#     00F0: 6D DA 84 E2 6F 25 70 C9   61 83 1C 32 C7 65 DF 0E  m...o%p.a..2.e..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.843 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A3 FE 4C 79 55 EA 05 53   CD 0B 8F 75 01 8A 08 16  ..LyU..S...u....
#     0010: 8D ED B1 44 FB F4 84 47   AF 6C 36 4D 57 A6 37 A6  ...D...G.l6MW.7.
#     0020: A6 85 1E 6B 95 05 9A 8B   03 21 E8 DB 05 97 CD 93  ...k.....!......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:52.846 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.846 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:52.846 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.847 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 01:53:52.847 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:53:52.847 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.848 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.851 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 65 CE C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:25.000 UTC",
#       "not  after"         : "2023-12-29 01:53:25.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CE 0D 56 76 A3 76 72 BA   D3 2E D9 D6 15 01 FD 4F  ..Vv.vr........O
#           0010: F2 1F 12 A7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 BE E7 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:19.000 UTC",
#       "not  after"         : "2023-12-29 01:53:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#           0010: 16 6B 3A C9                                        .k:.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.879 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 6B 8D 3A 32 63 61 65   A5 18 58 26 18 FC 7B 5C  7k.:2cae..X&...\
#     0010: 09 30 AA 71 A3 69 E1 C5   CB 85 70 00 09 17 FF 54  .0.q.i....p....T
#     0020: 34 14 63 FB 84 F8 00 01   89 53 89 BA 3A D5 21 66  4.c......S..:.!f
#     0030: 3C 53 C0 99 55 A1 10 08   7B 3A E9 A6 F1 CA 63 1A  <S..U....:....c.
#     0040: 93 0B A9 27 3A 98 10 92   2A FF A0 66 77 DF 24 F0  ...':...*..fw.$.
#     0050: 16 26 D8 DE 59 44 AA 80   25 49 FF EB 99 F7 47 63  .&..YD..%I....Gc
#     0060: 4E AE 78 D2 56 84 B4 D1   4D 75 A0 E4 F9 E8 BD 12  N.x.V...Mu......
#     0070: FF 33 77 D3 16 30 4E FD   6C FC 6A A5 3C CF 3C 2D  .3w..0N.l.j.<.<-
#     0080: D0 01 B8 74 28 99 A6 0A   F6 BE 07 45 00 43 A2 BB  ...t(......E.C..
#     0090: DB 61 8C 2B 88 AB AB 7D   54 3D 62 B2 E0 FB 11 A7  .a.+....T=b.....
#     00A0: A1 F7 4E 77 83 0E 84 7C   A1 23 74 BD 01 A7 00 09  ..Nw.....#t.....
#     00B0: 6C E1 92 07 38 03 20 19   04 74 CD 2D 1A C3 F2 67  l...8. ..t.-...g
#     00C0: C4 DC 2D DC 36 E2 79 7E   6E EA FB 32 12 46 3D D1  ..-.6.y.n..2.F=.
#     00D0: 63 0B C5 0B 29 E4 BE 8C   6C 5E 22 2C A1 3E 7A 84  c...)...l^",.>z.
#     00E0: 02 A2 87 92 2B C0 E9 F7   E2 54 03 00 6F 5D 2C D0  ....+....T..o],.
#     00F0: 12 31 25 2D BA 90 02 FB   D4 6D 32 09 1F 1E 9F 80  .1%-.....m2.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.880 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 6D 00 0B 55 3E 20 04   68 29 03 23 64 40 36 C8  .m..U> .h).#d@6.
#     0010: 76 1C 36 7E 7B BC 85 C1   F2 2E E5 10 B8 67 C1 E2  v.6..........g..
#     0020: C4 07 CB D9 B2 9F 7A 5E   26 3C 39 7E 09 C5 3E 12  ......z^&<9...>.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.880 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:53:52.930 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CD 0B E6 00 11 F0 BC 62 D0 B3 CE 77 A9 2D CD 88 46 9C A9 CF 02 71 7C 8A F8 B5 E0 E1 2E 1D D2 5F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 01:53:53.207 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 01:53:53.207 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 01:54:04.226; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 01:54:04.564 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0D 8B 1B D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:17.000 UTC",
#       "not  after"         : "2023-12-29 01:53:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#           0010: 16 6B 3A C9                                        .k:.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 BE E7 8B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 01:53:19.000 UTC",
#       "not  after"         : "2023-12-29 01:53:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E D7 1C 61 32 23 CC D9   57 DE A7 07 E7 A5 A4 73  ...a2#..W......s
#           0010: 16 6B 3A C9                                        .k:.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 70 C5 63 5E 00 3C AD C7   A8 77 AF 5F 26 E0 6A 6B  p.c^.<...w._&.jk
#           0010: 00 43 99 9C                                        .C..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 01:54:04.580 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:54:04.835 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:54:04.838 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 01:54:04.838 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.845 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.857 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.857 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.857 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 01:54:04.860 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "FC 2C A2 2B 78 34 41 9E 08 E8 FE 54 B5 D1 BB 6E CE AD 89 C1 C4 04 54 9F 9C FB 04 9B F8 81 3C 24",
#     "session id"          : "B8 C9 02 DE 5A E3 AE FB C0 A3 81 15 28 53 B5 CA 9F B3 0C 2C D0 2C D1 BC D1 92 20 A1 26 39 EC 47",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: BC 65 6A 99 F4 6B 4F 28   4E E2 F1 EE E6 EA BE 73  .ej..kO(N......s
#               0010: F8 DA 73 D7 52 96 AA 70   44 E2 0A B4 1B 99 A7 4E  ..s.R..pD......N
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.880 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3D 7D A1 89 D9 75 09 4D FD CE 9B 93 19 7B 19 2E 06 31 F5 F7 55 E4 39 A1 A8 B5 3B A1 E4 F3 25 8E",
#     "session id"          : "B8 C9 02 DE 5A E3 AE FB C0 A3 81 15 28 53 B5 CA 9F B3 0C 2C D0 2C D1 BC D1 92 20 A1 26 39 EC 47",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A6 37 99 65 60 F5 D0 24   5C DE 23 5F 6B 79 72 D9  .7.e`..$\.#_kyr.
#             0010: 03 5A 4E 6E 99 D1 55 32   FE 6F DA C8 88 C2 64 4C  .ZNn..U2.o....dL
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.880 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.880 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.883 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.885 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.885 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.885 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:54:04.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:54:04.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.887 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.895 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.897 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.898 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.903 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.903 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.904 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:54:04.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:54:04.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 01:54:04.906 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsa

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 01:55:25.147 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:55:25.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:55:25.203 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:55:25.203 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 01:55:25.203 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33928/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28363ms
ok 65 stop command for single port in 30966ms
ok 66 status detects locally running solr in 14595ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2162ms
ok 69 copying files around in 6598ms
ok 70 upconfig in 2679ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1234ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1242ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 58s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m22.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5578 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5578/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35843/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 23:59:57.440; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 23:59:57.446; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 23:59:58.349; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 23:59:58.390; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22190ms
ok 61 start solr with client truststore and security manager in 24788ms
not ok 62 start solr with mTLS needed in 56866ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-M71u5u/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35843.
#
# Started Solr server on port 35843 (pid=199932). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35844.
#
# Started Solr server on port 35844 (pid=200360). Happy searching!
#
# INFO  - 2023-09-30 00:01:20.436; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 00:01:20.441; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 00:01:20.832; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 00:01:20.834; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 00:01:20.835; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:20.869 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 69 63 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:56.000 UTC",
#     "not  after"         : "2023-12-29 24:00:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 EB D8 3B 9B 7D 6D 40   EC C4 64 A3 92 7D 95 62  c..;..m@..d....b
#         0010: B1 AF E7 92                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:20.874 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 8D 11 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:48.000 UTC",
#     "not  after"         : "2023-12-29 24:00:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:20.889 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:21.144 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.144 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:21.146 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:21.146 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.153 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.165 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.165 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.165 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:21.168 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D4 DC 48 20 14 4F 63 61 39 FE 6B FB 17 83 C4 CE 34 8D 81 74 30 26 E2 66 33 34 90 84 3B 46 23 CC",
#   "session id"          : "B3 F7 2C 5D F2 72 08 22 3A C2 E2 70 43 1D 5D 05 FD 7D 7F DE 4F CD 1D 3E 9D 61 4B 7E 09 D0 2F E7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 90 8E FA C9 EC C6 50   C7 7B E5 33 E6 B4 21 A2  $......P...3..!.
#             0010: 40 93 AC 8B 6A 9E 6D 52   08 AE D4 35 57 08 86 3A  @...j.mR...5W..:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.284 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FE 98 B0 74 3A 7E 58 D8 5F 2B BD F2 1F 65 03 D2 25 57 52 82 B6 6B D8 21 E6 D9 FF BA 39 0B 4F C1",
#   "session id"          : "B3 F7 2C 5D F2 72 08 22 3A C2 E2 70 43 1D 5D 05 FD 7D 7F DE 4F CD 1D 3E 9D 61 4B 7E 09 D0 2F E7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 94 22 0B 5E 82 D7 D2 07   7A 3D 4E 35 14 25 97 17  .".^....z=N5.%..
#           0010: 36 44 4B 52 91 6D 92 4D   1A B6 51 3E F8 1A 7D 7C  6DKR.m.M..Q>....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.285 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.285 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.286 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.287 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.287 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.289 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.289 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.289 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.290 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.291 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.291 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.291 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.298 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.299 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.300 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.304 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.304 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.304 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.304 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.306 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.307 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.307 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.308 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.311 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E E9 50 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:52.000 UTC",
#       "not  after"         : "2023-12-29 24:00:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 40 F4 11 1E 1B 17 55   30 DD 0B FC 20 F1 8F 0B  +@.....U0... ...
#           0010: E1 4C CB 44                                        .L.D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.312 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:21.355 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:21.355 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:21.356 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:21.356 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.390 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.394 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 74 02 58 88 A4 B5 F6   76 E1 C9 38 D7 11 98 FE  .t.X....v..8....
#     0010: 72 5F 5E E5 83 F0 03 19   D3 FA 60 95 9B 3F 93 24  r_^.......`..?.$
#     0020: 10 3E 6C 40 89 58 83 09   C4 2B D7 DA 79 DC B9 E5  .>l@.X...+..y...
#     0030: 84 72 20 D0 FF A8 BC AB   D4 86 66 4F 10 11 5A 5E  .r .......fO..Z^
#     0040: E2 CD 01 B1 65 8D 49 40   2C 69 7C 7E D3 26 30 A7  ....e.I@,i...&0.
#     0050: 7E 48 84 18 93 C7 E1 5A   48 82 BB 44 EB 76 56 F9  .H.....ZH..D.vV.
#     0060: 63 AB AF FA 13 D5 80 AF   29 CE 9F 98 B8 7C A7 BF  c.......).......
#     0070: 85 AA C9 BF AD 25 C2 D6   1C 93 2C DB 15 C5 48 57  .....%....,...HW
#     0080: DF 69 D4 03 2B 93 94 C7   B5 3E 3F C4 96 2C 29 01  .i..+....>?..,).
#     0090: 29 D8 C2 81 41 B0 20 DB   F0 12 84 1F 55 53 BC DC  )...A. .....US..
#     00A0: EA B0 AE 04 86 A8 BA 35   FC 88 14 EC 9E 7D B8 E9  .......5........
#     00B0: 5B 92 03 E2 EC 3F 36 DF   38 3E 63 85 C3 FE 44 BE  [....?6.8>c...D.
#     00C0: 0C AC B2 A8 68 8B FD 3D   13 D9 31 E9 82 DF 31 87  ....h..=..1...1.
#     00D0: 8F 38 51 60 E7 DA 78 C8   13 63 0C 1B 37 17 C2 28  .8Q`..x..c..7..(
#     00E0: E4 B5 42 64 81 CF 96 ED   81 4A 56 66 0F ED 9B 54  ..Bd.....JVf...T
#     00F0: BB BE 94 69 D4 28 79 68   75 3B 5C 0F EE 4A E5 CB  ...i.(yhu;\..J..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.396 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C D0 8E 74 38 82 F8 E4   84 89 3E B3 91 25 7C E6  ,..t8.....>..%..
#     0010: 4C 15 0D 0C 6E 60 85 C3   5B 3F 5C 62 64 69 6F 7E  L...n`..[?\bdio.
#     0020: 04 36 65 F6 71 5A 73 AF   DE FC 4C 03 27 55 CF E4  .6e.qZs...L.'U..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.398 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:21.399 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.399 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:21.399 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.399 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:21.400 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:21.400 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.400 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.403 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 69 63 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:56.000 UTC",
#       "not  after"         : "2023-12-29 24:00:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 EB D8 3B 9B 7D 6D 40   EC C4 64 A3 92 7D 95 62  c..;..m@..d....b
#           0010: B1 AF E7 92                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C EA 7E 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:50.000 UTC",
#       "not  after"         : "2023-12-29 24:00:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#           0010: 75 FC 07 D0                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.427 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: D1 34 33 09 23 BA 12 D9   A4 3A 8D 11 69 18 7A F2  .43.#....:..i.z.
#     0010: 50 03 81 97 A7 95 A0 74   EA 15 8C 04 FC EE 36 59  P......t......6Y
#     0020: 86 84 9E 56 F9 7B 16 09   D3 0D 2B 8D D3 DE 80 3F  ...V......+....?
#     0030: 78 E0 EB F9 B4 F9 6E 79   1E 99 2A B4 EB C8 3C A5  x.....ny..*...<.
#     0040: 62 2B 66 F1 2B 1B 31 01   B4 7C 20 B5 22 9E D5 03  b+f.+.1... ."...
#     0050: A0 B7 6A 9C 56 6D E7 3D   D9 14 CF 47 F6 ED 4B AF  ..j.Vm.=...G..K.
#     0060: 1A 49 76 7B B0 99 26 7D   88 05 1D AE E0 09 EF 4B  .Iv...&........K
#     0070: C4 FE DD A5 F2 D9 AB 91   76 1A C8 A6 E1 22 1F 57  ........v....".W
#     0080: 49 5C 6F B6 B2 BF 09 F1   0F 7B D6 DF A3 8A E7 91  I\o.............
#     0090: 24 A1 C1 06 9C CF FD AF   99 D9 22 95 3E 1F 1C 1C  $.........".>...
#     00A0: 08 E0 92 D5 F3 9D 7B FB   CD 05 DF E7 AE D1 31 10  ..............1.
#     00B0: 5C 41 9F 1F 00 F7 EF AF   91 31 11 1A 99 2D 05 62  \A.......1...-.b
#     00C0: 41 7D 69 99 CD 28 C7 F2   11 3F C2 5E 81 8F 88 A6  A.i..(...?.^....
#     00D0: E3 2A D9 91 5F FC 60 68   E0 63 A0 20 27 69 13 44  .*.._.`h.c. 'i.D
#     00E0: 43 5D 32 0C 76 9B 4F 22   1B BD 9B AD AC 95 69 B8  C]2.v.O"......i.
#     00F0: 1D E1 63 8D 3F 43 00 BD   13 D1 80 C6 FC EC DC 9C  ..c.?C..........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.428 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF E4 D2 F1 2F FE C6 A1   AF 5D AC 3C EA 2D 1E A5  ..../....].<.-..
#     0010: 34 0A 53 5A D8 7E DC 40   C8 7E 29 BD BF 74 CE B3  4.SZ...@..)..t..
#     0020: C8 62 21 07 50 AE AB C2   34 69 C0 EA C0 20 96 99  .b!.P...4i... ..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.428 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:21.473 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AF 31 34 39 4E C0 D7 31 53 07 E1 7C FD 92 D5 66 7B CB 1C A5 6E 7E 83 3D 63 DA AA D2 FE DF AD 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 24:01:21.740 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 24:01:21.741 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-30 00:01:22.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-30 00:01:22.687; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-30 00:01:23.095; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 00:01:23.098; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-30 00:01:23.099; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-M71u5u/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:23.134 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 69 63 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:56.000 UTC",
#     "not  after"         : "2023-12-29 24:00:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 EB D8 3B 9B 7D 6D 40   EC C4 64 A3 92 7D 95 62  c..;..m@..d....b
#         0010: B1 AF E7 92                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:23.139 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "56 8D 11 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:48.000 UTC",
#     "not  after"         : "2023-12-29 24:00:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:23.155 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:23.486 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:23.486 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:23.486 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:23.487 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:23.638 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.639 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:23.641 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:23.641 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.648 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.660 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.661 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:23.664 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7A 6A 25 F4 29 73 72 97 84 31 AE 37 86 D2 16 1D 37 54 35 E0 73 D7 7E 4B 7F 34 CE 06 B2 B4 27 DE",
#   "session id"          : "95 FF 84 92 9D 18 5B A8 2D B3 3A 7C E4 85 DA 15 24 94 9D 41 BD 1B 27 34 66 A8 9C AC 04 86 34 7A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4A D3 E9 8A B7 AF 47 83   0E 3A B3 F3 56 36 2F 9E  J.....G..:..V6/.
#             0010: 9D AC A8 82 F4 03 6A DB   20 54 6A EC E4 33 24 5F  ......j. Tj..3$_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.772 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8E 60 03 1D 91 34 99 FD A4 B5 DB F5 67 31 95 FF CB 22 AE B4 BC D6 40 29 A0 63 66 03 D8 90 99 DF",
#   "session id"          : "95 FF 84 92 9D 18 5B A8 2D B3 3A 7C E4 85 DA 15 24 94 9D 41 BD 1B 27 34 66 A8 9C AC 04 86 34 7A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A6 2B E0 EE 29 88 E3 C2   C0 1E D6 BD 9E D5 BC CD  .+..)...........
#           0010: FA 79 E5 44 1A 3D 0C C7   31 13 3C AE 69 F7 FE 64  .y.D.=..1.<.i..d
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.773 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.773 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.775 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.775 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.777 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.777 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.777 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.779 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.779 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.779 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.786 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.788 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.789 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.792 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.793 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.795 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.795 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.796 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.796 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.797 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.797 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.798 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.800 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E E9 50 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:52.000 UTC",
#       "not  after"         : "2023-12-29 24:00:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 40 F4 11 1E 1B 17 55   30 DD 0B FC 20 F1 8F 0B  +@.....U0... ...
#           0010: E1 4C CB 44                                        .L.D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.801 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.883 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C EA 7E 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-30 24:00:50.000 UTC",
#     "not  after"         : "2023-12-29 24:00:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#         0010: 75 FC 07 D0                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#         0010: 3B 5B 4E 46                                        ;[NF
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.887 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 1C 2F F4 00 CB 77 B8   1E 12 52 CD B0 EE 37 10  ../...w...R...7.
#     0010: FC 3D 5E 10 10 25 9C A0   B1 41 96 6A EE CB EE 97  .=^..%...A.j....
#     0020: A0 EB D2 DC BA 4D 9E B5   BC 00 71 0F 63 90 04 CA  .....M....q.c...
#     0030: 8F C1 28 32 71 3D 89 50   CA 43 12 87 0E 60 C7 31  ..(2q=.P.C...`.1
#     0040: 6A A0 7D F0 65 6A 89 FC   74 B3 FE BC BE 1C 36 C2  j...ej..t.....6.
#     0050: BA 4E 1B 62 DA 17 AA D7   D6 B0 D0 FE 74 A0 88 68  .N.b........t..h
#     0060: D2 DB 09 AD 85 63 5D 1E   CE 41 E7 45 53 D6 43 67  .....c]..A.ES.Cg
#     0070: AD A2 BA A6 97 2C 91 94   C3 0F 5C DE 2E 2F 50 2B  .....,....\../P+
#     0080: 95 DE 5E C0 36 F8 FC 9E   45 63 89 72 AE 6F 8B F1  ..^.6...Ec.r.o..
#     0090: 81 0D 81 80 1F D4 8E 8F   1F 26 D4 65 E7 47 BE 6A  .........&.e.G.j
#     00A0: 2C EC AD 7B 67 F5 07 9F   55 95 C4 07 AE A1 C9 57  ,...g...U......W
#     00B0: 32 57 AE 88 34 F8 F4 78   38 2B 64 9C 0B 72 0D D2  2W..4..x8+d..r..
#     00C0: DC DA 24 94 B5 6B AB 6D   51 F2 54 26 78 5D 28 CF  ..$..k.mQ.T&x](.
#     00D0: 51 1D 1D 35 B3 E1 23 E8   F0 56 44 FA 02 4F 93 7C  Q..5..#..VD..O..
#     00E0: B6 E4 2F 53 FF 1D E7 72   26 98 C3 70 75 AF F0 F0  ../S...r&..pu...
#     00F0: D9 6A 50 C3 D6 FC 23 1D   56 0C A9 0A C1 80 2E 2E  .jP...#.V.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.889 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE 9D FD 20 70 D3 A6 B5   83 31 10 C8 98 97 57 E7  ... p....1....W.
#     0010: D7 E0 13 51 BA 0B 2C 41   3D C1 12 B9 AC 73 65 F9  ...Q..,A=....se.
#     0020: 7F 47 E2 F6 ED 91 43 83   A7 26 E6 E7 7E 0D D4 5E  .G....C..&.....^
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.891 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:23.892 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.892 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:23.892 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.893 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-30 24:01:23.893 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:23.893 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.893 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.896 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 69 63 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:56.000 UTC",
#       "not  after"         : "2023-12-29 24:00:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 EB D8 3B 9B 7D 6D 40   EC C4 64 A3 92 7D 95 62  c..;..m@..d....b
#           0010: B1 AF E7 92                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C EA 7E 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:50.000 UTC",
#       "not  after"         : "2023-12-29 24:00:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#           0010: 75 FC 07 D0                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.921 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: DC 5A 09 61 23 90 2E 20   39 26 A3 21 FF E5 9B 28  .Z.a#.. 9&.!...(
#     0010: 87 1C C3 78 1A 5F 2C 63   29 23 59 7C EF E3 7A 9B  ...x._,c)#Y...z.
#     0020: 31 54 BE B1 EE E7 BA 60   D0 2A DD 53 62 A2 39 84  1T.....`.*.Sb.9.
#     0030: D9 CC 62 42 A1 C1 B2 77   E7 92 93 28 DB 69 62 9D  ..bB...w...(.ib.
#     0040: 4C 8D 6C 66 3B 3A 79 50   E6 FC D1 A1 CB 0C D7 90  L.lf;:yP........
#     0050: 8A E8 42 84 7A 06 07 F5   E2 0E 58 3C 46 19 2C B4  ..B.z.....X<F.,.
#     0060: 84 2E 41 7F 0A 62 48 FC   C1 94 4F BF 5E 02 70 23  ..A..bH...O.^.p#
#     0070: 82 94 E5 0D 02 5D 3C 77   54 51 01 37 23 8C 09 AE  .....]<wTQ.7#...
#     0080: 7D 73 D8 42 5B DC 56 C0   E8 21 A5 78 F7 86 2A 39  .s.B[.V..!.x..*9
#     0090: 4C DE 3D 43 8E 4B 4D F7   FE 0B EF 21 65 CE A6 22  L.=C.KM....!e.."
#     00A0: 08 F0 C2 E0 10 83 9F 92   9B EC 57 E2 0C AC EB 13  ..........W.....
#     00B0: E7 3F 75 78 E2 F0 9A 95   23 73 14 63 5C 7C A2 F3  .?ux....#s.c\...
#     00C0: C5 B4 C5 FA DB C0 DA 9C   A1 74 13 8E A3 40 3A 86  .........t...@:.
#     00D0: 25 74 8A A8 E6 9C BB FC   BF 61 AA 61 6B 2A 4D EB  %t.......a.ak*M.
#     00E0: 60 C0 AD A9 75 E1 CF 21   46 9B 56 A9 5D B6 ED B3  `...u..!F.V.]...
#     00F0: 8D 02 73 BD 8E EA B0 7D   6E A6 6D F1 F9 A1 11 5A  ..s.....n.m....Z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.922 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF C6 82 CF 12 B2 90 FA   02 2F EE F0 4B 85 86 D9  ........./..K...
#     0010: BE D8 12 B9 C3 28 4B CC   1A CF 80 28 D6 C0 88 3F  .....(K....(...?
#     0020: 5B 67 00 C4 3C B2 3A 88   4B D5 55 EF 28 0B C7 A6  [g..<.:.K.U.(...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.923 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:23.969 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CE 36 55 92 EF AF 14 29 00 31 AE 04 0B 7E 87 EC 4C 47 23 25 37 14 C7 D2 EC 18 95 FC 5E CF C3 58",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-30 24:01:24.230 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-30 24:01:24.231 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-30 00:01:35.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:35.635 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C EA 7E 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:50.000 UTC",
#       "not  after"         : "2023-12-29 24:00:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#           0010: 75 FC 07 D0                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 13 4D 9D D8 25 86 B2   02 70 A2 3A 8D 7E CD B0  ^.M..%...p.:....
#           0010: 3B 5B 4E 46                                        ;[NF
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 8D 11 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-30 24:00:48.000 UTC",
#       "not  after"         : "2023-12-29 24:00:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B4 E3 9B 1C 0E 14 4A D6   40 4A C2 AB 32 39 DF F2  ......J.@J..29..
#           0010: 75 FC 07 D0                                        u...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-30 24:01:35.652 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:36.044 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:36.044 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:36.044 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:01:36.045 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:36.134 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.134 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:36.136 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-30 24:01:36.136 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.143 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.155 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.155 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.155 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-30 24:01:36.158 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "14 67 BE 46 DA A2 1E B3 74 CB 3F 14 55 C7 E8 D8 48 67 35 F0 FB 46 E6 9F FF 8A D1 24 BA 0F 24 C1",
#     "session id"          : "2B A4 36 89 7E 60 DA 3C F5 8B 85 3A BE 65 5E C8 EF D2 9C 6C 3F DE 33 07 D2 22 99 14 93 81 87 9A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 01 57 B7 2F B4 0A 96 2C   F2 A1 64 40 DF BB B5 64  .W./...,..d@...d
#               0010: 39 B1 1A 31 0A 48 AC 57   D0 4D 2A E5 A9 70 2D 34  9..1.H.W.M*..p-4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.176 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3D 93 41 90 DD 14 0C 6F 79 85 B9 68 C0 50 0F 92 6E 3A 1D 17 9C 81 98 15 0F 0B 7D CA C5 62 E8 58",
#     "session id"          : "2B A4 36 89 7E 60 DA 3C F5 8B 85 3A BE 65 5E C8 EF D2 9C 6C 3F DE 33 07 D2 22 99 14 93 81 87 9A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 06 82 DB 65 93 F9 AF 9E   0A 05 C0 D4 66 02 AE 27  ...e........f..'
#             0010: 44 57 3A 60 20 E0 16 DE   D4 D6 8D 6E 65 F7 6D 3B  DW:` ......ne.m;
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.177 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.177 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.179 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.181 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.191 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.192 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.193 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.197 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.197 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.197 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:01:36.198 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-30 24:01:36.200 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-30 24:02:54.708 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:02:54.749 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:02:54.749 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:02:54.749 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-30 24:02:54.749 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35844/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28457ms
ok 65 stop command for single port in 30968ms
ok 66 status detects locally running solr in 14664ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6554ms
ok 70 upconfig in 2657ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1241ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 48s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m11s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5577 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5577/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40355/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 21:57:50.898; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 21:57:50.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 21:57:51.807; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 21:57:51.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22970ms
ok 61 start solr with client truststore and security manager in 25151ms
not ok 62 start solr with mTLS needed in 58202ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hA4TXM/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40355.
#
# Started Solr server on port 40355 (pid=197984). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40356.
#
# Started Solr server on port 40356 (pid=198409). Happy searching!
#
# INFO  - 2023-09-29 21:59:15.455; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 21:59:15.461; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 21:59:15.846; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 21:59:15.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 21:59:15.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:15.882 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F E0 35 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:51.000 UTC",
#     "not  after"         : "2023-12-28 21:58:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 23 21 ED EA BD 3A 4C   A2 3E 8A 80 AB 6F 73 9F  I#!...:L.>...os.
#         0010: 20 E8 A9 5A                                         ..Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:15.887 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 88 89 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:43.000 UTC",
#     "not  after"         : "2023-12-28 21:58:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:15.902 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:16.150 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:16.152 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:16.152 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.158 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.171 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:16.174 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8A D9 80 05 B9 C9 CB BB 4B 19 F4 42 C0 5D C0 2F 40 74 E5 74 A8 BC 1B 9B E6 C6 6D 77 93 C2 08 9B",
#   "session id"          : "61 9E 57 98 5E 7F 93 FE DE 00 D7 E0 CD 52 A9 1B 43 B6 45 6D CB BA A7 38 D6 11 B0 E5 59 1C D4 02",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 33 AF 95 EA 9D 16 A4 1E   7B 1E 8E 51 F0 88 86 6B  3..........Q...k
#             0010: 92 3F 4C 51 F8 6C 4F 6A   A6 E7 72 E2 9A 54 C9 18  .?LQ.lOj..r..T..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.290 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "96 90 57 3B 01 D3 62 97 B5 56 77 12 28 95 6B 1B B9 B5 08 33 3F 5E B7 42 F3 90 02 59 DB 7C 47 B7",
#   "session id"          : "61 9E 57 98 5E 7F 93 FE DE 00 D7 E0 CD 52 A9 1B 43 B6 45 6D CB BA A7 38 D6 11 B0 E5 59 1C D4 02",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6F 39 3E 1E 20 A3 4E BE   A9 87 25 0A FE CF DB 4A  o9>. .N...%....J
#           0010: 9A 3C 21 91 61 09 9C C5   20 4F 46 A4 BC 1F 36 23  .<!.a... OF...6#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.290 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.290 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.291 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.293 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.293 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.293 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.295 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.295 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.295 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.296 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.297 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.297 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.304 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.306 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.307 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.311 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.311 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.311 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.312 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.314 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.314 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.315 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.315 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.316 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.316 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.316 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.319 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 89 55 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:47.000 UTC",
#       "not  after"         : "2023-12-28 21:58:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF E0 FC 2A D7 B9 D1 5F   46 BE 5B F0 2B 6C 78 B7  ...*..._F.[.+lx.
#           0010: F9 32 57 63                                        .2Wc
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.320 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:16.372 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:16.373 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:16.373 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:16.373 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.403 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.406 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 64 76 FB 7B F6 A6 E5   62 92 14 65 21 9F F2 90  gdv.....b..e!...
#     0010: F8 67 3D D8 2A 29 47 EC   49 54 D4 EE BC 33 B9 D0  .g=.*)G.IT...3..
#     0020: B4 0B BD EA 1B CC 0C 1A   E4 E2 A3 37 85 16 70 E7  ...........7..p.
#     0030: F0 5F 4B 67 1C 25 55 96   BE D3 C4 A2 EB 09 68 80  ._Kg.%U.......h.
#     0040: 0C 12 67 F3 25 E3 78 B5   97 7D 4C 31 A1 84 28 5E  ..g.%.x...L1..(^
#     0050: 31 8C CA 39 08 97 1B C7   FB 67 18 2D C8 1D 2A 44  1..9.....g.-..*D
#     0060: 83 F8 6D 1F BE ED 8F 90   DC 86 22 F0 F8 76 BE BC  ..m......."..v..
#     0070: D6 69 0F 83 CB 9E 05 97   79 26 5B 9C 07 09 3C 9A  .i......y&[...<.
#     0080: 2B 74 CF 21 79 D9 8D 79   8E AF 24 AD 93 C5 73 11  +t.!y..y..$...s.
#     0090: 56 26 D6 91 0E 1D 42 06   74 15 BB FA CC 3D 54 E5  V&....B.t....=T.
#     00A0: 92 82 C6 30 A6 92 8E 92   35 CC 87 B1 AB 22 21 81  ...0....5...."!.
#     00B0: 3E 5F 6F B9 AD 3E 6A 5C   14 78 86 CE 92 85 E1 7F  >_o..>j\.x......
#     00C0: A5 99 3E E3 9B FC 53 82   9E 20 07 85 94 A0 AF 22  ..>...S.. ....."
#     00D0: 38 9F 93 86 BE 79 35 55   60 4F EF 03 12 F7 AC 41  8....y5U`O.....A
#     00E0: D1 1C 81 1C 32 55 1E AC   ED FB A8 46 21 D4 5F 0C  ....2U.....F!._.
#     00F0: AE 50 1A 70 D2 58 4A B3   74 24 22 62 D8 EC CB 90  .P.p.XJ.t$"b....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.408 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B9 AE EF 70 01 10 D7 40   6B 86 74 3E 8E 21 76 A9  ...p...@k.t>.!v.
#     0010: 98 6F A0 9C DE 9F 59 F7   9D 3D E0 1E 10 5C 14 C4  .o....Y..=...\..
#     0020: 7B 23 04 34 A4 82 23 E0   BB AE 69 CB 30 E9 7C 00  .#.4..#...i.0...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.411 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:16.412 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.412 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:16.412 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.412 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:16.413 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:16.413 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.414 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.416 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F E0 35 AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:51.000 UTC",
#       "not  after"         : "2023-12-28 21:58:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 23 21 ED EA BD 3A 4C   A2 3E 8A 80 AB 6F 73 9F  I#!...:L.>...os.
#           0010: 20 E8 A9 5A                                         ..Z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F C3 48 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:44.000 UTC",
#       "not  after"         : "2023-12-28 21:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#           0010: 1F 47 1C 2E                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.443 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 48 AC B5 DF 28 3D E6   3A 77 FF 52 1E E7 F2 AA  .H...(=.:w.R....
#     0010: 82 CA D6 77 E2 45 4E F1   6D 11 B9 0E 27 2F 42 DA  ...w.EN.m...'/B.
#     0020: F0 8A DE 01 4E 46 B3 A3   78 4F 66 C8 9D 3C F0 34  ....NF..xOf..<.4
#     0030: 88 65 00 F5 FE 3C 7A A1   F1 6C 6D E7 C0 A7 D7 83  .e...<z..lm.....
#     0040: B9 BB 65 EB F5 9C A5 C5   B1 B1 AF 2B F0 B6 6A E6  ..e........+..j.
#     0050: EB F1 13 3F CD FE 9D 53   99 58 CD 5B 9F 6A A3 28  ...?...S.X.[.j.(
#     0060: 2F 50 4F 96 B8 A3 1F 94   FF 61 91 DA 14 F5 11 21  /PO......a.....!
#     0070: D5 3C CF 5C B3 92 43 68   C9 C7 7C 4A 42 93 52 77  .<.\..Ch...JB.Rw
#     0080: 81 E5 33 C4 8A 18 43 F1   FF 14 79 86 63 51 B8 50  ..3...C...y.cQ.P
#     0090: C2 06 26 AF 9F 85 87 18   88 76 BF 46 58 CA 33 B7  ..&......v.FX.3.
#     00A0: 7B F3 5B 67 2F F7 58 7F   C9 69 FE 8B CB E9 9D 03  ..[g/.X..i......
#     00B0: C4 37 B0 FE 17 C8 16 2F   65 52 8D 41 17 45 AA 7B  .7...../eR.A.E..
#     00C0: D3 B2 60 52 FD 4E EA A6   4E 14 D0 9D 00 3C BC 2A  ..`R.N..N....<.*
#     00D0: 1D 0D EB FE A6 81 49 E9   97 FF 1C F3 8C 8C 2C 35  ......I.......,5
#     00E0: 1A D3 FE 32 4B 30 A3 A6   A9 7D 3F D5 A2 74 53 DD  ...2K0....?..tS.
#     00F0: 98 F4 86 76 BC 3A 8D 3A   1B B2 BD 56 CA 88 F5 98  ...v.:.:...V....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.444 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 16 B0 1F 03 D6 8A 52   C6 67 97 B8 AD 65 ED 1C  .......R.g...e..
#     0010: 58 49 F2 1A 15 49 90 32   F9 E9 7F 81 5A AF D1 B9  XI...I.2....Z...
#     0020: DB F7 D6 2B E5 96 FB 0A   EF AB 9C B2 F1 2D 89 A9  ...+.........-..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.445 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:16.497 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 AE 42 0B 6F 0B 70 AA E4 97 EB 0D 73 A5 65 1D FA 4C 7C 0F 4F D0 43 8E E9 38 97 3B CA 5E BB E9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 21:59:16.773 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 21:59:16.774 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 21:59:17.750; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 21:59:17.756; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 21:59:18.139; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 21:59:18.142; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 21:59:18.143; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hA4TXM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:18.175 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F E0 35 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:51.000 UTC",
#     "not  after"         : "2023-12-28 21:58:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 23 21 ED EA BD 3A 4C   A2 3E 8A 80 AB 6F 73 9F  I#!...:L.>...os.
#         0010: 20 E8 A9 5A                                         ..Z
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:18.180 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 88 89 5B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:43.000 UTC",
#     "not  after"         : "2023-12-28 21:58:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:18.195 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:18.269 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:18.269 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:18.270 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:18.270 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:18.438 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:18.441 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:18.441 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.447 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.459 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.459 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.460 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:18.462 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "43 7B 6E 97 D4 36 B5 85 37 50 77 D1 EC 05 3F D1 69 5B 71 ED 5B 26 9B 70 B6 19 58 91 58 10 E1 06",
#   "session id"          : "8A 42 F5 24 E8 A4 61 6E 7F 4C 13 06 46 D3 E1 15 0E 9D 5F DE 31 70 F6 D4 2B BF 99 C4 13 73 4A 09",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C 95 E3 B3 60 D9 CE 63   57 19 CB 9B 4D 30 69 95  ,...`..cW...M0i.
#             0010: 6A FA ED 34 73 AC BA 32   F8 D1 D2 8E 45 B7 D8 4E  j..4s..2....E..N
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.575 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "36 75 91 C0 15 5D 91 C0 7B 52 68 D0 89 DC A4 A2 92 19 DB AF CA 71 7E 2A 50 59 FD 17 3D C9 28 DD",
#   "session id"          : "8A 42 F5 24 E8 A4 61 6E 7F 4C 13 06 46 D3 E1 15 0E 9D 5F DE 31 70 F6 D4 2B BF 99 C4 13 73 4A 09",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 50 DC 1F E0 8D F8 8A   77 F2 D9 1C 24 C6 77 39  .P......w...$.w9
#           0010: 02 26 8A C7 84 7C FD FC   67 0D 77 80 CE 9B D0 69  .&......g.w....i
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.576 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.576 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.579 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.580 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.581 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.581 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.590 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.591 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.593 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.596 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.596 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.599 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.600 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.605 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 89 55 0C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:47.000 UTC",
#       "not  after"         : "2023-12-28 21:58:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF E0 FC 2A D7 B9 D1 5F   46 BE 5B F0 2B 6C 78 B7  ...*..._F.[.+lx.
#           0010: F9 32 57 63                                        .2Wc
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.688 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F C3 48 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 21:58:44.000 UTC",
#     "not  after"         : "2023-12-28 21:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#         0010: 1F 47 1C 2E                                        .G..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#         0010: 6C AD AD 92                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.692 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 69 70 3E 1C 96 23 DB   EA A1 35 5D DE DB 0E B2  .ip>..#...5]....
#     0010: 49 C2 75 09 CD BE BA EF   2E 54 BE 9D 21 17 98 D0  I.u......T..!...
#     0020: B6 3C 82 6F 4D AD 07 99   14 75 D9 39 24 3F E5 63  .<.oM....u.9$?.c
#     0030: 4C 91 67 25 3A BA 92 D6   E6 F5 D5 65 03 2E A0 16  L.g%:......e....
#     0040: 16 AC E8 72 65 B1 64 C7   13 9A 25 7C 54 66 AB CA  ...re.d...%.Tf..
#     0050: 0B 3F B1 9D D2 16 66 26   60 63 94 CF DC FB 54 36  .?....f&`c....T6
#     0060: FC F5 6B 71 62 BF 45 41   67 AF 02 E5 7C 15 9E 30  ..kqb.EAg......0
#     0070: 4F 44 46 25 22 21 1A BD   79 07 E5 41 A0 EF 9D 3B  ODF%"!..y..A...;
#     0080: B2 09 12 5D 9B 9A A7 F3   06 44 70 AD CA 7A B7 1B  ...].....Dp..z..
#     0090: 2B 5C 56 93 CE EA 07 9F   49 98 51 21 FC 8A 25 51  +\V.....I.Q!..%Q
#     00A0: 20 71 AF AF 0B 14 0C 24   77 22 0A 56 3F A8 A1 FB   q.....$w".V?...
#     00B0: 5E 0C CB AD 01 8F 9D 1B   0C DA E4 21 C4 FF C4 1A  ^..........!....
#     00C0: 4E 13 2B 94 FB 8A E6 0B   F8 C8 5D C9 FA C9 A0 08  N.+.......].....
#     00D0: B0 D8 B5 AB 84 BD C3 C7   7A 98 E8 03 7C 2D E2 AD  ........z....-..
#     00E0: 6D BE 78 5F DC 88 B9 01   4D BC A8 B5 72 E3 30 27  m.x_....M...r.0'
#     00F0: 82 0F 63 18 46 A6 FD 33   F6 4D 0E 5A 95 A5 32 9B  ..c.F..3.M.Z..2.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.694 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B DE 3F 08 E6 A4 5D 2D   75 47 46 1D AF 56 A3 23  +.?...]-uGF..V.#
#     0010: BC 59 FE 1F 12 CF AA AD   36 C3 87 5A 97 E1 78 43  .Y......6..Z..xC
#     0020: DE FE D3 BB D4 B1 77 A3   6D 4F 83 44 7E F7 28 38  ......w.mO.D..(8
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.696 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:18.697 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.697 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:18.698 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.698 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 21:59:18.698 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:18.698 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.699 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.701 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F E0 35 AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:51.000 UTC",
#       "not  after"         : "2023-12-28 21:58:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 23 21 ED EA BD 3A 4C   A2 3E 8A 80 AB 6F 73 9F  I#!...:L.>...os.
#           0010: 20 E8 A9 5A                                         ..Z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F C3 48 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:44.000 UTC",
#       "not  after"         : "2023-12-28 21:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#           0010: 1F 47 1C 2E                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.728 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C 0A 17 58 5C 42 F4 DB   3F AA 2B CD 68 45 B3 F9  ...X\B..?.+.hE..
#     0010: 84 16 C8 9F CF 08 B2 2A   34 B7 BA F7 C4 E8 46 79  .......*4.....Fy
#     0020: 27 F9 7A D7 50 C3 DA AF   7E C1 EC CF F8 7D BE 10  '.z.P...........
#     0030: 94 D4 2D B4 73 BE 4A 08   BD 46 CA 15 14 FF 94 3D  ..-.s.J..F.....=
#     0040: 6F 8C 17 CB E9 9E CE AD   D9 F5 CD 11 07 BD 8A 55  o..............U
#     0050: 0B 6C 16 59 21 16 BA BB   4D B5 7F 1E 6C 58 33 8B  .l.Y!...M...lX3.
#     0060: B5 50 6C 04 C1 83 29 75   5B 72 5A CA AF C7 E2 F1  .Pl...)u[rZ.....
#     0070: 58 16 CB EA B3 81 6F 42   4B 92 8E 1A BA 13 57 A1  X.....oBK.....W.
#     0080: D0 1F DF BC 88 2F 16 76   2E B1 FD 1A BB 84 9D 26  ...../.v.......&
#     0090: 7D CE 71 43 2E D0 90 10   7F 7C 87 33 D8 FA 5B A2  ..qC.......3..[.
#     00A0: 46 74 BC E6 BC 15 5D 27   42 9E 29 A1 23 BD 0D 57  Ft....]'B.).#..W
#     00B0: 34 F6 59 89 E7 4F CD 2B   F5 50 B2 00 20 5C 3B F1  4.Y..O.+.P.. \;.
#     00C0: 3F 8D 9C 1A 00 5B 0F 76   2E 8E C8 27 42 48 2C EC  ?....[.v...'BH,.
#     00D0: 9D 62 2A 3C 5B 99 6C B0   BE 4B 27 4F 76 C8 14 E8  .b*<[.l..K'Ov...
#     00E0: C1 4A C6 95 1F 30 F1 B2   6C 1E 4E 32 4D 58 C9 E4  .J...0..l.N2MX..
#     00F0: 9E 6D F9 FF 71 A6 D2 1F   3B DC BF 80 80 29 44 81  .m..q...;....)D.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.729 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 72 2F 24 C9 77 F2 05 CC   A8 A8 E0 AA 87 B0 9A 1E  r/$.w...........
#     0010: AD 45 1C EF 1B 27 65 04   80 78 DB 91 6C 70 9F 66  .E...'e..x..lp.f
#     0020: 3B 04 C4 59 6B CE 8C 90   C0 3B 48 56 80 B7 E3 F4  ;..Yk....;HV....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.730 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:18.779 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "83 31 85 5C 24 BA 5D 17 7A 3B 37 E1 BA AC D0 BC 53 1B D8 B3 9A FA B1 23 7C 48 1A F4 CD 83 53 19",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 21:59:19.088 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 21:59:19.089 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 21:59:31.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:31.628 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 88 89 5B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:43.000 UTC",
#       "not  after"         : "2023-12-28 21:58:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#           0010: 1F 47 1C 2E                                        .G..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F C3 48 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 21:58:44.000 UTC",
#       "not  after"         : "2023-12-28 21:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DC 24 62 76 2D 3D D8 90   6F C3 26 E8 08 58 3A F2  .$bv-=..o.&..X:.
#           0010: 1F 47 1C 2E                                        .G..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 A8 F4 26 07 1B 86 37   7D 4D CC 6D 37 51 D0 8B  ...&...7.M.m7Q..
#           0010: 6C AD AD 92                                        l...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 21:59:31.644 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:31.743 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:31.743 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:31.743 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 21:59:31.744 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:31.887 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.888 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:31.890 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 21:59:31.890 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.895 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.907 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.908 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.908 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 21:59:31.910 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "50 15 8D FD C5 C3 C3 96 D0 76 6D 3C F8 FD 57 51 7F 00 A7 A7 81 3B FA 35 D8 4A 4A ED 03 80 00 F6",
#     "session id"          : "75 8C 29 16 15 F4 D6 43 70 30 2C B1 62 7B B4 49 53 BF D3 B1 6B 1D 37 AD 5D B4 8A 0C 51 32 4B 31",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2C EF 90 5E 87 18 9E B8   02 5F 2D 77 19 27 A2 A8  ,..^....._-w.'..
#               0010: 85 41 A0 BD 74 03 E9 AD   AE 5E 48 CC 60 63 3D 55  .A..t....^H.`c=U
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.929 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C7 FA 8C C0 AF 62 7C F8 0D 58 CE 64 D5 A4 5F B8 AC 60 55 92 9A 5C 7A 25 75 ED B2 AB 02 0A 41 43",
#     "session id"          : "75 8C 29 16 15 F4 D6 43 70 30 2C B1 62 7B B4 49 53 BF D3 B1 6B 1D 37 AD 5D B4 8A 0C 51 32 4B 31",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DA FA E8 BF 71 3C 09 97   CA 3E 84 8F 1D 60 75 0E  ....q<...>...`u.
#             0010: A0 01 F9 6D F6 70 F5 21   E1 06 B1 38 C0 3A 03 66  ...m.p.!...8.:.f
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.930 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.930 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.933 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.936 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.936 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.937 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.944 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.946 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.947 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.951 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.951 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.951 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.951 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.952 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.952 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:31.952 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 21:59:31.952 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 21:59:31.954 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature sch

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 22:00:51.930 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 22:00:51.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 22:00:51.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 22:00:51.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 22:00:51.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40356/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28268ms
ok 65 stop command for single port in 31229ms
ok 66 status detects locally running solr in 14444ms
ok 67 status does not expose cli parameters to end user in 224ms
ok 68 listing out files in 2233ms
ok 69 copying files around in 6777ms
ok 70 upconfig in 2769ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1237ms
ok 73 Cleanup in 1231ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 5s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m28s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5576 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5576/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33827/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 19:40:32.841; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 19:40:32.846; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 19:40:33.747; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 19:40:33.789; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22616ms
ok 61 start solr with client truststore and security manager in 25461ms
not ok 62 start solr with mTLS needed in 59407ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-u83dfr/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33827.
#
# Started Solr server on port 33827 (pid=201519). Happy searching!
#
# /tmp/src/solr/solr/packaging/build/solr-9.4.0-SNAPSHOT/bin/solr: line 2406: bc: command not found
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33828.
#
# Started Solr server on port 33828 (pid=201950). Happy searching!
#
# INFO  - 2023-09-29 19:41:57.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 19:41:57.057; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 19:41:57.428; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 19:41:57.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 19:41:57.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:57.464 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 55 7C 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:33.000 UTC",
#     "not  after"         : "2023-12-28 19:41:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 BC 69 93 DA F6 27 D8   F9 84 E1 CD 41 C5 A2 AD  ..i...'.....A...
#         0010: 45 CB A4 97                                        E...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:57.468 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 3B 89 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:24.000 UTC",
#     "not  after"         : "2023-12-28 19:41:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:57.483 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:41:57.574 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:41:57.575 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:41:57.576 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:41:57.576 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:41:57.720 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:41:57.722 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:41:57.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.728 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.740 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.740 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.740 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:41:57.742 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "08 5D 24 D7 93 DC 4A B4 AD 9F 1A B8 26 AD 8B 2A C0 B8 7D AC 7D 19 1C B9 78 43 E9 05 B6 5D A9 5B",
#   "session id"          : "F7 BE DC EF 4A 04 24 E7 88 04 A0 0A 12 27 DE 8A 2E 06 70 73 64 BB EA C0 44 18 F9 57 09 E0 28 6B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E5 1E F9 F8 6E 90 CE C7   E1 FC 22 35 DF CE 8F 78  ....n....."5...x
#             0010: C7 74 8F F3 55 21 02 01   31 B8 30 4F 76 F0 26 78  .t..U!..1.0Ov.&x
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.866 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "90 91 E3 C8 C3 1A 6D 68 D1 42 0A F8 06 DD A5 DD 3E E2 3A F4 00 EE 59 03 38 4E 9C 2F DD 64 8C 30",
#   "session id"          : "F7 BE DC EF 4A 04 24 E7 88 04 A0 0A 12 27 DE 8A 2E 06 70 73 64 BB EA C0 44 18 F9 57 09 E0 28 6B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EE 16 FA BC 49 7D 2F E0   1A E8 14 DE 8D 5C B5 40  ....I./......\.@
#           0010: 3F 84 A8 6A ED F7 EF 3C   F9 96 77 D6 87 01 97 71  ?..j...<..w....q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.867 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.867 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.869 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.880 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.882 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.883 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.887 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.887 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.887 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.887 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.888 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.888 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.888 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.888 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.888 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.890 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.890 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.890 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.891 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.891 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.892 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.892 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.895 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 B8 B4 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:29.000 UTC",
#       "not  after"         : "2023-12-28 19:41:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 C7 FA 00 93 A7 9F 55   C8 FF A0 C5 89 3D 7E DF  .......U.....=..
#           0010: E8 BD 38 F3                                        ..8.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.895 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.977 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.981 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 06 42 E9 9B 61 1E F9 B4   33 1D 6F 0F D9 D2 C7 39  .B..a...3.o....9
#     0010: 94 DF D7 6B 2C EC 4A A5   79 A7 50 0C 9F E0 D4 DC  ...k,.J.y.P.....
#     0020: 8F 3C 6F B7 CE DA 16 9C   31 74 5B 91 E5 8D 6C F9  .<o.....1t[...l.
#     0030: 78 AD E8 10 2E 7D 0B BC   72 D1 07 D8 28 07 3F DC  x.......r...(.?.
#     0040: E9 22 4D 58 42 71 31 55   8F 55 4B F8 77 71 F3 A5  ."MXBq1U.UK.wq..
#     0050: C4 BC 99 02 F2 96 28 BC   88 7D 7F B9 8A EE 51 38  ......(.......Q8
#     0060: 68 6B F0 DF 89 FD 26 37   61 16 8C B2 7F BD 65 D4  hk....&7a.....e.
#     0070: 07 6D A3 05 6D B7 80 B8   4E 6A 6B 59 97 88 53 70  .m..m...NjkY..Sp
#     0080: 85 C9 28 7A DE 10 21 8A   45 9D 9D 88 D6 AB 8B 79  ..(z..!.E......y
#     0090: D5 78 D7 22 FC A1 C2 81   6A B8 F8 5F 02 0E A4 15  .x."....j.._....
#     00A0: 55 C0 8E 1C 61 EA 03 49   AF 77 71 F0 71 D8 1C D7  U...a..I.wq.q...
#     00B0: 49 E7 8E D7 A3 8F 93 4D   15 91 D3 1A 68 11 1F 2E  I......M....h...
#     00C0: A3 25 29 94 26 0A 2A 68   A1 CE 11 A7 7D 59 F4 B9  .%).&.*h.....Y..
#     00D0: 3F D1 1D E3 F2 62 54 57   4B F0 FF 78 E7 BD 16 C8  ?....bTWK..x....
#     00E0: 52 3D DD 6B D8 1D D9 BE   BC 95 27 62 6A E3 B6 D1  R=.k......'bj...
#     00F0: 98 57 C1 33 38 21 C0 EC   40 25 2D F9 25 13 E1 D4  .W.38!..@%-.%...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.983 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 8F 66 4F A1 49 2A 44   FF 0B 9C 0D 2A FB 86 6E  ..fO.I*D....*..n
#     0010: E1 9A D5 1A 3B 43 D0 C5   38 7C AD C2 92 9E BD 2F  ....;C..8....../
#     0020: F3 67 A7 ED 47 82 84 12   27 EB 0A FC 64 3C 8A 9C  .g..G...'...d<..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.985 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:41:57.986 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.986 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:41:57.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:41:57.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:41:57.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.988 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:57.990 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 55 7C 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:33.000 UTC",
#       "not  after"         : "2023-12-28 19:41:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 BC 69 93 DA F6 27 D8   F9 84 E1 CD 41 C5 A2 AD  ..i...'.....A...
#           0010: 45 CB A4 97                                        E...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9B 5A 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:26.000 UTC",
#       "not  after"         : "2023-12-28 19:41:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#           0010: 5B 65 DC BF                                        [e..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:58.017 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 78 91 F1 5B 42 F5 D5   11 99 A2 B5 17 3C 72 27  .x..[B.......<r'
#     0010: D1 CF D9 92 68 15 DF B2   D1 D3 9A 37 58 2A 81 E3  ....h......7X*..
#     0020: 99 AE EA 6D 76 2C 51 08   BD 76 CE CE DD 1D 13 34  ...mv,Q..v.....4
#     0030: CC D4 2E A3 0D D8 80 90   8C 5C 3B 8F 39 3C 78 10  .........\;.9<x.
#     0040: 83 44 0D 06 92 5A 10 BB   9C 98 6A D1 A8 61 0D 28  .D...Z....j..a.(
#     0050: 56 9F E7 1F 86 54 A2 3D   4C A1 3D 10 EC 3B B6 62  V....T.=L.=..;.b
#     0060: 99 9B 92 98 EB 15 88 33   26 00 3D D3 33 7C BD 43  .......3&.=.3..C
#     0070: BE 69 86 3E 09 2A CE 29   0B 77 BE 0E A0 57 62 9F  .i.>.*.).w...Wb.
#     0080: 28 BE 78 9D E6 EA DF 4E   D7 99 65 53 07 BA 8B 2B  (.x....N..eS...+
#     0090: D7 59 4E 6D AA 71 89 BF   4E 81 F1 7D DC 54 7B C2  .YNm.q..N....T..
#     00A0: EF A5 59 33 49 18 B3 83   63 EB 8C 2E AF C7 62 65  ..Y3I...c.....be
#     00B0: CF FB 3A 88 4F C1 E5 39   EF 1B 98 B1 95 F9 17 C3  ..:.O..9........
#     00C0: D0 0F 53 A1 08 92 02 61   28 43 33 4F E9 2B 48 DC  ..S....a(C3O.+H.
#     00D0: BF 58 17 26 EE 65 AE 6E   73 86 BE 42 32 87 02 86  .X.&.e.ns..B2...
#     00E0: 5F E9 23 77 DC 88 6B 48   A1 08 6A EF 6E A9 B8 BE  _.#w..kH..j.n...
#     00F0: C2 C3 7F ED F8 D8 C8 13   F9 46 6E B3 30 71 D5 0D  .........Fn.0q..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:58.018 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 60 F4 30 8E FE C2 49 85   33 66 88 57 BB 73 68 CE  `.0...I.3f.W.sh.
#     0010: 40 99 19 E9 0C 17 C8 FF   BB 3C 3A C9 AE 8C 02 A3  @........<:.....
#     0020: 28 28 20 38 78 EC E6 35   EB AB 63 08 99 86 1B E7  (( 8x..5..c.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:58.019 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:41:58.070 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0F 9B 09 D4 FB 99 CA 34 51 D2 A0 1D 0E D5 88 54 40 49 06 EA A8 A4 82 95 EC 41 37 B0 3E 0A 5A AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 19:41:58.367 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 19:41:58.368 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 19:41:59.330; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 19:41:59.336; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 19:41:59.705; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 19:41:59.709; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 19:41:59.709; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-u83dfr/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:59.743 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 55 7C 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:33.000 UTC",
#     "not  after"         : "2023-12-28 19:41:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 BC 69 93 DA F6 27 D8   F9 84 E1 CD 41 C5 A2 AD  ..i...'.....A...
#         0010: 45 CB A4 97                                        E...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:59.748 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 3B 89 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:24.000 UTC",
#     "not  after"         : "2023-12-28 19:41:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 19:41:59.764 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:00.004 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.005 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:00.007 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:00.007 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.012 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.024 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.024 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:00.027 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "47 5E 0F 49 D8 E4 88 22 D5 DB 44 B1 74 3C C2 9C EB 90 EC 5B 41 24 E7 82 0D 0A 34 1B D7 BA F5 96",
#   "session id"          : "4C 39 96 73 E5 CC 3B 75 56 5B D3 1D 2C FB D8 AF 49 7F C5 CC C4 B5 A5 24 D6 C4 25 FD 07 55 99 04",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8B E5 44 99 8B 89 E4 A0   C2 31 09 F0 CF 1A 37 7A  ..D......1....7z
#             0010: 61 7B A4 F7 90 40 F8 A4   E6 AA 37 5F 3B 12 67 1D  a....@....7_;.g.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.142 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D8 92 9B C4 0F 83 88 13 E4 0E 78 9E 0B A9 61 27 25 7A E5 BC 7F 93 D2 1E 9C 74 70 5F 1A 16 AC DD",
#   "session id"          : "4C 39 96 73 E5 CC 3B 75 56 5B D3 1D 2C FB D8 AF 49 7F C5 CC C4 B5 A5 24 D6 C4 25 FD 07 55 99 04",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E2 2C C3 D6 CB 12 06 70   9C DB AE C9 B9 88 6A A9  .,.....p......j.
#           0010: CB 11 51 88 D5 95 F2 47   2B B1 CD B7 5C 54 E4 71  ..Q....G+...\T.q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.143 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.143 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.144 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.145 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.147 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.158 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.159 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.163 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.163 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.163 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.164 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.166 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.166 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.166 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.167 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.167 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.168 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.168 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.171 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 B8 B4 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:29.000 UTC",
#       "not  after"         : "2023-12-28 19:41:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 C7 FA 00 93 A7 9F 55   C8 FF A0 C5 89 3D 7E DF  .......U.....=..
#           0010: E8 BD 38 F3                                        ..8.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.171 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:00.224 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:00.224 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:00.225 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:00.225 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.254 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9B 5A 64",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 19:41:26.000 UTC",
#     "not  after"         : "2023-12-28 19:41:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#         0010: 5B 65 DC BF                                        [e..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#         0010: 07 AF 1F 50                                        ...P
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.258 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 EF 7C 0B D0 61 DF 91   27 07 06 24 54 2D 90 B1  F....a..'..$T-..
#     0010: 2B 3D E2 81 B6 53 94 CD   96 42 47 34 BC 5F B1 56  +=...S...BG4._.V
#     0020: 43 5B 80 B2 ED 2A 31 56   1F D5 B4 02 F3 B9 8D 2F  C[...*1V......./
#     0030: 50 A2 39 E1 C0 0D DF 10   AA 2C D2 65 43 92 03 0E  P.9......,.eC...
#     0040: 96 6D 4B 9A B1 42 1E 97   EE EF 2D 4C EA CB 4D E7  .mK..B....-L..M.
#     0050: 98 00 F3 8B E1 75 12 8F   F7 75 5D 2A 04 27 EC 66  .....u...u]*.'.f
#     0060: F0 48 F5 1B D2 CF BE 00   1F 3E 00 4B CB 8D 96 D8  .H.......>.K....
#     0070: D6 BB 18 09 E7 E5 7C 7C   4F D0 50 8B 3C 90 6D 9B  ........O.P.<.m.
#     0080: C2 02 A8 2C A6 A2 CD 5D   95 5B 6A 2E 48 D7 80 D6  ...,...].[j.H...
#     0090: B7 E3 F7 8E B3 F0 36 5B   05 7F 98 81 EB 8F 6A E6  ......6[......j.
#     00A0: A3 0F 0D 45 27 01 BF 40   1D 45 75 88 71 48 CC 48  ...E'..@.Eu.qH.H
#     00B0: CB E7 4E 55 37 27 AC E2   B5 6A 86 25 AB 3D E4 0D  ..NU7'...j.%.=..
#     00C0: 13 99 8A 74 9A 0D A0 B7   1B D8 3E A7 3E FA B2 9C  ...t......>.>...
#     00D0: E7 9A 1C FE FF D1 A1 16   15 FC 91 27 D7 AF 09 8C  ...........'....
#     00E0: F2 E8 94 03 A5 D0 60 4F   A4 72 01 5F C4 D0 5E C9  ......`O.r._..^.
#     00F0: 16 6A 73 6E 19 C2 D4 EF   C8 EA E2 41 CE A9 66 EF  .jsn.......A..f.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.260 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 63 44 13 36 4F B0 75   09 63 7E 10 61 8C 5F D8  .cD.6O.u.c..a._.
#     0010: BF 71 56 D4 5C 34 09 ED   AD 95 CF AD 82 C6 00 33  .qV.\4.........3
#     0020: A6 3F A3 0C 61 F7 1E 28   8B 8F 74 E6 CB 0F B1 60  .?..a..(..t....`
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.262 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:42:00.263 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.264 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:42:00.264 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.264 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 19:42:00.264 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:00.264 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.265 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.267 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 55 7C 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:33.000 UTC",
#       "not  after"         : "2023-12-28 19:41:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 BC 69 93 DA F6 27 D8   F9 84 E1 CD 41 C5 A2 AD  ..i...'.....A...
#           0010: 45 CB A4 97                                        E...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9B 5A 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:26.000 UTC",
#       "not  after"         : "2023-12-28 19:41:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#           0010: 5B 65 DC BF                                        [e..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.294 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 3B CD 3A 02 B6 09 A9   A9 16 3B 0D 49 C8 18 09  .;.:......;.I...
#     0010: 4D 0B EF 87 F5 EC 32 17   3C E0 3F 9E 33 84 6D F3  M.....2.<.?.3.m.
#     0020: 28 F9 06 99 14 EA F3 2A   63 D1 10 AA 97 29 A7 9B  (......*c....)..
#     0030: D0 02 BA BB BD 27 A9 4E   43 F9 B1 51 DE D5 68 DC  .....'.NC..Q..h.
#     0040: 05 0E F3 9A 35 13 EC 58   5E 01 E0 9A 6E A3 E9 0F  ....5..X^...n...
#     0050: BD 21 40 DA D8 37 68 4C   5A 23 4C 98 8E 60 F3 05  .!@..7hLZ#L..`..
#     0060: 04 87 E1 F1 C0 4C EA 15   58 96 9A 32 E9 94 34 1F  .....L..X..2..4.
#     0070: D6 FF B4 74 7E B7 FD 70   FF 25 C4 31 74 13 3E 54  ...t...p.%.1t.>T
#     0080: 80 5E C1 F3 C3 29 FF EB   82 F5 1A C4 A8 2C E1 48  .^...).......,.H
#     0090: D6 AA 21 75 9D 5F 1B 84   D0 75 65 5F 6A B7 31 9A  ..!u._...ue_j.1.
#     00A0: 70 A9 A0 77 EF A0 7E 4B   29 9F 4C 9F 2D A6 B0 3E  p..w...K).L.-..>
#     00B0: 5C 2C 79 17 DD 9C FF B7   D5 A0 2D A9 8C 61 0F DA  \,y.......-..a..
#     00C0: C8 B0 8B B2 2C 9C 75 20   17 FB 80 9B 29 BF 40 CC  ....,.u ....).@.
#     00D0: 59 DF 84 9D 65 4A 21 33   A4 65 94 AF 2C F9 A6 12  Y...eJ!3.e..,...
#     00E0: 1F 57 D2 3A 6C ED EE 1C   D3 7A 12 AA 3B 9E E9 C7  .W.:l....z..;...
#     00F0: 69 AD B0 27 F3 A0 47 2F   3E 9A 1B C8 BA D1 C7 C0  i..'..G/>.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.295 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AA 34 F4 13 EB 0D 81 6F   F4 21 46 2F 28 33 0F 19  .4.....o.!F/(3..
#     0010: FE B2 3D 33 20 FE 1E 84   EF D9 5C D2 6E FC 6A 01  ..=3 .....\.n.j.
#     0020: 8A 7F 49 C8 35 02 3A 5B   62 E5 88 71 67 59 73 46  ..I.5.:[b..qgYsF
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.296 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:00.347 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "43 2D E3 78 DC 92 57 18 FE 80 82 80 62 85 25 35 60 CE 5F 99 99 6F EB 7C A5 14 30 FD B7 97 01 16",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 19:42:00.628 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 19:42:00.630 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 19:42:11.852; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 19:42:12.193 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C 3B 89 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:24.000 UTC",
#       "not  after"         : "2023-12-28 19:41:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#           0010: 5B 65 DC BF                                        [e..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9B 5A 64",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 19:41:26.000 UTC",
#       "not  after"         : "2023-12-28 19:41:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E4 C4 F9 99 13 EA 6C 9B   EF 7D 4F 54 DF 76 46 61  ......l...OT.vFa
#           0010: 5B 65 DC BF                                        [e..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 44 9A D3 90 2D 7E A5   5C EB 24 11 3D 65 CB 4A  .D...-..\.$.=e.J
#           0010: 07 AF 1F 50                                        ...P
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 19:42:12.210 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:12.601 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:12.602 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:12.602 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:42:12.602 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:12.701 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.701 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:12.703 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 19:42:12.704 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.710 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.722 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.723 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 19:42:12.726 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "CD F0 01 FF F1 22 4B F2 57 26 16 8D 12 8E 5E 71 E6 E5 C5 3D 67 BE 54 C9 D4 45 94 9D 07 EF BD B3",
#     "session id"          : "5C 79 F4 B9 40 85 CF CF 5F 28 A4 E7 EC E0 BA 93 73 D5 CD 1F E5 D2 F9 0C 38 52 DB 17 FB 1D 5C B9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: EB 09 E8 84 73 40 A0 10   96 8C A2 99 7B 5C 40 6D  ....s@.......\@m
#               0010: 3E 8B 76 A8 43 31 03 0A   E3 B7 63 F2 CF BC 06 33  >.v.C1....c....3
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.746 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8D EC 37 6E 8B E1 F8 08 03 06 E4 16 9C 6E BA 93 E9 E5 E6 FC 3D 8C 02 9C 45 E2 4B F5 47 4C 5B 30",
#     "session id"          : "5C 79 F4 B9 40 85 CF CF 5F 28 A4 E7 EC E0 BA 93 73 D5 CD 1F E5 D2 F9 0C 38 52 DB 17 FB 1D 5C B9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 57 E6 5D 9E 26 3E 4D C0   A7 E2 2C F0 A6 61 66 92  W.].&>M...,..af.
#             0010: 07 F0 3A 9A 9E 3B 3C F7   1F 73 49 AD AD B8 BB 15  ..:..;<..sI.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.747 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.747 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.748 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.748 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.748 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.749 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.749 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.751 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.752 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.752 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:12.753 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.754 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.761 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.763 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.764 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.768 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.768 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.768 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:42:12.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 19:42:12.771 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature s

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 19:43:34.871 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:43:34.908 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:43:34.909 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:43:34.909 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 19:43:34.910 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33828/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28336ms
ok 65 stop command for single port in 31040ms
ok 66 status detects locally running solr in 14755ms
ok 67 status does not expose cli parameters to end user in 222ms
ok 68 listing out files in 2205ms
ok 69 copying files around in 6710ms
ok 70 upconfig in 2657ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1250ms
ok 73 Cleanup in 1237ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5575 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5575/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33169/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 16:44:32.440; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 16:44:32.446; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 16:44:33.359; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 16:44:33.400; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22399ms
ok 61 start solr with client truststore and security manager in 25095ms
not ok 62 start solr with mTLS needed in 60214ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-EFbisD/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33169.
#
# Started Solr server on port 33169 (pid=202498). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33170.
#
# Started Solr server on port 33170 (pid=202923). Happy searching!
#
# INFO  - 2023-09-29 16:45:55.699; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 16:45:55.705; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 16:45:56.075; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 16:45:56.077; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 16:45:56.078; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:56.110 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 3D BF 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:31.000 UTC",
#     "not  after"         : "2023-12-28 16:45:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 F4 EB C0 7C 07 BE 37   03 FC A4 B6 12 D4 05 71  .......7.......q
#         0010: 44 D8 69 9E                                        D.i.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:56.114 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 35 C0 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:23.000 UTC",
#     "not  after"         : "2023-12-28 16:45:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:56.129 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:56.355 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:56.357 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:56.357 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.362 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.373 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.373 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.374 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:56.376 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A7 18 B1 AC 7C 82 56 F8 AF C4 5D 2E BF D2 D1 20 E3 36 F0 DC 2D 8B A0 D2 8A 39 C5 E2 38 8F 89 CC",
#   "session id"          : "43 15 A1 5D 68 58 94 C9 3B A2 51 B3 90 D6 0E 83 74 5F 73 4A 7C 39 F5 8F DE 40 38 E9 85 1E 54 D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C DC 9A 15 02 60 AB 3F   B6 50 01 C7 6E 80 4B 7C  .....`.?.P..n.K.
#             0010: 41 19 B2 A5 07 DF 08 02   63 3D 3A 76 00 AA E2 31  A.......c=:v...1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.483 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA 53 EA B0 30 ED C6 69 49 41 41 73 0B 09 A5 27 D0 C7 AA 3C 5D 8A 3C 34 83 1B A0 48 97 8D 8D EE",
#   "session id"          : "43 15 A1 5D 68 58 94 C9 3B A2 51 B3 90 D6 0E 83 74 5F 73 4A 7C 39 F5 8F DE 40 38 E9 85 1E 54 D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 32 EC AE 65 DC DC 6A BB   29 A9 BF C0 FB 9B 1A E4  2..e..j.).......
#           0010: 59 E8 40 FD 4F 0A 42 03   A7 B8 84 50 EA 06 2B 4D  Y.@.O.B....P..+M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.483 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.483 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.485 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.487 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.487 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.496 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.498 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.499 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.502 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.503 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.504 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.504 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.505 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.505 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.506 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.506 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.507 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.507 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.508 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.511 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 81 B0 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:28.000 UTC",
#       "not  after"         : "2023-12-28 16:45:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 E8 B1 23 24 5E 2D 0F   48 00 32 49 F7 6D 20 EB  ...#$^-.H.2I.m .
#           0010: 38 E6 50 CB                                        8.P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.511 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:56.565 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:56.566 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:56.566 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:56.566 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.594 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.598 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5A 6D 5C D0 69 4B 16 FF   93 92 4A 34 A2 80 C2 49  Zm\.iK....J4...I
#     0010: 72 07 3C 4C 3D 85 29 68   8C 72 B8 6B 3C 58 61 1C  r.<L=.)h.r.k<Xa.
#     0020: 9E 15 A8 6F A0 B2 17 BD   C3 98 75 76 28 8D 68 BF  ...o......uv(.h.
#     0030: D5 94 D3 31 0E 5D AD 4A   E4 8A BF 69 70 9D 72 6D  ...1.].J...ip.rm
#     0040: 92 B9 83 BF 9E A8 2F 95   2B 70 AC 04 0B 25 80 2B  ....../.+p...%.+
#     0050: CD 98 1D 88 81 BF 8B A5   54 79 DD F1 6E 7B CF 82  ........Ty..n...
#     0060: 8B 35 31 AE 47 0A B9 E5   32 82 28 9E 27 70 85 5C  .51.G...2.(.'p.\
#     0070: 01 FF 3C BC 2B 3F 57 FE   A7 F9 80 48 ED 90 33 62  ..<.+?W....H..3b
#     0080: DF 50 7C 13 E5 C4 C6 45   28 E8 89 3B D2 21 FF 1E  .P.....E(..;.!..
#     0090: 5B 86 D4 BA 97 66 B0 C1   B7 10 A0 7B 06 FE 54 37  [....f........T7
#     00A0: 32 83 0F A8 CE FA 95 00   90 5D 5F 3C 5C 00 E4 9B  2........]_<\...
#     00B0: EB B3 11 3F 17 40 64 A9   B8 C9 AF 69 52 DD A2 7D  ...?.@d....iR...
#     00C0: EA 62 FA 4B 23 ED 7E F3   C1 70 CB 9F 29 8D C4 60  .b.K#....p..)..`
#     00D0: 60 1F 8A CF 77 16 FF 3A   FD 58 4B BB DA B4 6A 6C  `...w..:.XK...jl
#     00E0: 1E 2C EF 06 95 C7 F5 EE   25 0C 4B AC 62 35 B7 F0  .,......%.K.b5..
#     00F0: F9 B7 CB 54 A6 08 C5 8B   3A 9E E1 F2 5A 9F D4 12  ...T....:...Z...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.600 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F3 8F B6 B9 9B 2F AE 95   F5 E9 6D 81 29 0E 95 78  ...../....m.)..x
#     0010: D4 FD 6B 1D C5 F2 93 78   2B FD 46 28 68 58 28 82  ..k....x+.F(hX(.
#     0020: DF DC 97 AE 22 75 D2 80   86 32 72 25 8E 93 CE 8B  ...."u...2r%....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.602 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:56.603 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.604 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:56.604 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.604 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:56.604 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:56.604 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.605 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.607 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 3D BF 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:31.000 UTC",
#       "not  after"         : "2023-12-28 16:45:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 F4 EB C0 7C 07 BE 37   03 FC A4 B6 12 D4 05 71  .......7.......q
#           0010: 44 D8 69 9E                                        D.i.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C4 80 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:25.000 UTC",
#       "not  after"         : "2023-12-28 16:45:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#           0010: FF 26 79 30                                        .&y0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.633 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 1D 0E 38 C6 AE F7 62   82 9F 62 86 66 08 E5 E8  E..8...b..b.f...
#     0010: 6D 17 84 FE 67 ED 9E 37   9A 5A B8 13 98 0B 63 C5  m...g..7.Z....c.
#     0020: 78 CA D2 53 AE D7 9F 4B   9A 9B 8F C6 AA 88 1D 33  x..S...K.......3
#     0030: 2C B9 24 2F AE 67 DD C3   E9 A5 50 1D 20 CF 8D B0  ,.$/.g....P. ...
#     0040: 5D 58 9C C8 E6 AE 75 19   FF BE 56 67 22 E9 10 CC  ]X....u...Vg"...
#     0050: 39 8F 83 5C 91 02 3F C0   EC 5A 98 94 B3 72 2F C5  9..\..?..Z...r/.
#     0060: 7F 11 7C A5 27 2C 85 64   F1 EC EC 23 56 C4 83 2E  ....',.d...#V...
#     0070: 3C 82 B3 F8 39 30 42 49   21 0D 57 C0 98 6C 40 0F  <...90BI!.W..l@.
#     0080: AF 48 40 55 AE 4C 6A 1F   AF 12 5F F4 84 C0 E1 69  .H@U.Lj..._....i
#     0090: 78 C8 45 79 20 0E 48 8A   43 ED C6 77 83 7A 22 70  x.Ey .H.C..w.z"p
#     00A0: CF 7E DD 27 D0 38 64 91   A7 8F 0F 6C A1 BD 57 9C  ...'.8d....l..W.
#     00B0: C6 A2 BC 8F 5F 5C 42 1B   26 59 35 D1 50 D8 58 56  ...._\B.&Y5.P.XV
#     00C0: 31 C7 7C 49 C9 58 36 0A   76 F9 81 D8 A9 7F 65 52  1..I.X6.v.....eR
#     00D0: 7A 2C 4D 2D DA AC 83 BA   F6 F2 21 A6 82 0C A8 59  z,M-......!....Y
#     00E0: D5 CB 3C E6 54 9B FC 60   68 7F ED 4D 11 46 CE 11  ..<.T..`h..M.F..
#     00F0: 8D 2A 46 DE D7 8F B4 90   D2 76 4B C2 20 0B 42 21  .*F......vK. .B!
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.634 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 61 19 E0 65 BB 93 42 95   1F 01 0D 54 FC F9 40 5C  a..e..B....T..@\
#     0010: 4A 6E D2 01 86 53 CB 37   E8 19 40 05 DA 12 65 FE  Jn...S.7..@...e.
#     0020: B8 58 15 2C B5 9F CA B5   65 3D 7E 82 2F BE D3 4B  .X.,....e=../..K
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.634 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:56.680 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 69 7C DF DA E5 0C 5F 8D 20 64 D0 DD 83 5C A4 6B A7 10 98 C1 33 1F D0 94 49 F0 75 FF 56 F0 FB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 16:45:56.994 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 16:45:56.995 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 16:45:57.931; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 16:45:57.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 16:45:58.319; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 16:45:58.322; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 16:45:58.322; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-EFbisD/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:58.355 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 3D BF 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:31.000 UTC",
#     "not  after"         : "2023-12-28 16:45:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F3 F4 EB C0 7C 07 BE 37   03 FC A4 B6 12 D4 05 71  .......7.......q
#         0010: 44 D8 69 9E                                        D.i.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:58.359 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 35 C0 90",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:23.000 UTC",
#     "not  after"         : "2023-12-28 16:45:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 16:45:58.374 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:58.710 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:58.711 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:58.712 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:45:58.712 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:58.863 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.863 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:58.865 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:45:58.865 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.884 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.884 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.885 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:45:58.887 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF 3F 08 61 95 74 88 54 72 CF 18 58 49 56 4C 08 39 98 26 67 28 15 E4 CF 11 04 EF 38 0A 6E 46 F1",
#   "session id"          : "18 F3 98 F9 31 CA B6 38 40 CC 0C AC 58 F6 C6 9D 7C E9 9F 65 8C CE 8D BD 37 49 6F 23 E6 92 E1 C9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 09 2F 85 E4 66 FC 4E 67   32 0B 42 79 9B 22 0F 48  ./..f.Ng2.By.".H
#             0010: F8 80 A8 43 DD F4 F8 96   57 82 6B 1D 0F C2 7B 58  ...C....W.k....X
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.996 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FE 14 8B 22 BF BF 0B ED 73 79 D3 1C 83 44 48 88 AB FA 7A D2 B9 04 23 0A D4 59 DF 78 D0 FD E1 16",
#   "session id"          : "18 F3 98 F9 31 CA B6 38 40 CC 0C AC 58 F6 C6 9D 7C E9 9F 65 8C CE 8D BD 37 49 6F 23 E6 92 E1 C9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 1C E8 2F 5F E5 88 9A   A8 68 4B CF 30 13 AB AF  .../_....hK.0...
#           0010: C6 AD 76 53 85 90 10 01   EE 79 38 0F 51 26 8D 38  ..vS.....y8.Q&.8
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.997 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.997 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.998 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:58.999 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.001 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.001 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.001 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.003 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.010 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.011 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.012 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.016 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.016 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.016 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.016 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.016 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.018 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.019 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.019 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.019 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.020 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.021 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.024 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 81 B0 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:28.000 UTC",
#       "not  after"         : "2023-12-28 16:45:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B2 E8 B1 23 24 5E 2D 0F   48 00 32 49 F7 6D 20 EB  ...#$^-.H.2I.m .
#           0010: 38 E6 50 CB                                        8.P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.024 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.120 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 C4 80 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 16:45:25.000 UTC",
#     "not  after"         : "2023-12-28 16:45:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#         0010: FF 26 79 30                                        .&y0
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#         0010: E1 B4 88 97                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.124 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 DC D5 3E 25 D5 6A FD   02 78 06 40 CC 4C 95 1E  U..>%.j..x.@.L..
#     0010: 50 59 30 32 11 19 ED DB   9B 01 6B C5 46 32 5F A4  PY02......k.F2_.
#     0020: 97 DF 7C 0D E2 B7 2B BD   68 4F A6 B7 7F 45 8D 9A  ......+.hO...E..
#     0030: A0 AD 80 DC 1B FF 2F 29   36 EA F0 29 67 FA A7 7D  ....../)6..)g...
#     0040: 18 24 ED 2F 71 D4 86 AB   F7 FE 32 E9 64 E0 86 4F  .$./q.....2.d..O
#     0050: 39 92 56 E1 30 F4 E5 AE   A7 C8 B7 04 25 9D 0D F7  9.V.0.......%...
#     0060: E5 D6 3F F9 67 E7 2F BB   B1 5B 78 AC EF B4 98 1C  ..?.g./..[x.....
#     0070: DC C4 E4 3C C2 F6 13 F2   C3 5F 0A 4A D6 53 19 8D  ...<....._.J.S..
#     0080: 21 BE 9D C4 3B 69 8E 22   63 C0 7F C4 66 C3 BF 80  !...;i."c...f...
#     0090: EE 5A FF BF 39 A6 62 CC   D2 74 F0 00 4C CD 4C A4  .Z..9.b..t..L.L.
#     00A0: 3B C4 5E 72 A4 63 17 F9   7E 12 17 12 56 01 36 C6  ;.^r.c......V.6.
#     00B0: B9 60 12 EC 8F 6F 20 BD   4D 88 E4 96 7A 59 64 6B  .`...o .M...zYdk
#     00C0: DA 63 F8 86 D3 4C 36 63   C2 92 99 74 8F AC 46 49  .c...L6c...t..FI
#     00D0: CC E2 17 D7 D8 50 C5 8B   4C 3E 06 D4 6B B7 80 D0  .....P..L>..k...
#     00E0: 01 A9 10 E8 DE FD A1 E6   9F 20 99 41 0B D3 D6 2B  ......... .A...+
#     00F0: 84 56 C6 9A 4F E2 58 BD   53 79 E6 2F D9 D5 68 07  .V..O.X.Sy./..h.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.126 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E 9A 88 A7 2C E9 14 A9   3D 96 37 BB 1F 20 6A E9  ....,...=.7.. j.
#     0010: 09 CD AD FF 98 21 96 BC   1C CA CF 76 DC 89 9F 6D  .....!.....v...m
#     0020: 99 0B 2A BE 11 A6 FD 93   ED 59 6E EE 10 C9 AF A8  ..*......Yn.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.128 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:59.129 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.129 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:59.129 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.129 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 16:45:59.129 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:45:59.130 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.130 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.133 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 3D BF 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:31.000 UTC",
#       "not  after"         : "2023-12-28 16:45:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F3 F4 EB C0 7C 07 BE 37   03 FC A4 B6 12 D4 05 71  .......7.......q
#           0010: 44 D8 69 9E                                        D.i.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C4 80 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:25.000 UTC",
#       "not  after"         : "2023-12-28 16:45:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#           0010: FF 26 79 30                                        .&y0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.158 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 B2 95 5F 3A D8 2E 3D   17 49 FC EB F3 84 3E B2  R.._:..=.I....>.
#     0010: B3 EC B9 2A 22 D2 47 F4   53 8D B0 41 32 3F CF E7  ...*".G.S..A2?..
#     0020: E8 55 23 E2 22 CD FC 06   AD 71 1C 79 B9 96 0E E6  .U#."....q.y....
#     0030: 80 91 AE A8 E4 0C 4F ED   66 C2 3A F2 F3 F5 C7 FE  ......O.f.:.....
#     0040: 45 6D 3F BE 76 82 A4 58   1D 6E 8D 7F 15 86 22 BD  Em?.v..X.n....".
#     0050: FE E3 FF 3A B7 36 19 69   D6 64 95 E0 9E BC 0B 0E  ...:.6.i.d......
#     0060: EA 6D EC E8 46 AB 2E 33   EB 96 F4 C0 30 6E 1F 66  .m..F..3....0n.f
#     0070: 4F 27 FD 0E 5A 41 50 13   EC E7 EB 09 AF 25 9E 0D  O'..ZAP......%..
#     0080: B2 F4 16 56 90 D5 B6 EB   29 B6 F2 BB 01 9E 81 DE  ...V....).......
#     0090: 5F EA 68 FC B3 72 A1 41   17 21 7D 09 64 8D 38 36  _.h..r.A.!..d.86
#     00A0: 4C 0B 96 B1 CB 0E F1 D1   46 F8 4C CB A5 03 E0 5C  L.......F.L....\
#     00B0: 99 FB C0 42 C5 00 33 CB   DB 77 4E A4 83 5F 89 1F  ...B..3..wN.._..
#     00C0: 4F 0C 6D 24 32 3F 9E 09   85 34 1E A0 0C D3 41 30  O.m$2?...4....A0
#     00D0: 69 52 34 B9 6F C4 53 07   28 05 6A 6F AB 46 67 71  iR4.o.S.(.jo.Fgq
#     00E0: 55 43 C0 49 FF 4D CF 53   10 D4 1B 7F 6B 57 E4 78  UC.I.M.S....kW.x
#     00F0: F9 5B D3 50 87 80 A3 96   7B 65 91 01 06 E1 D4 30  .[.P.....e.....0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.159 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 F0 74 97 A4 A1 3E 0C   1F 62 A3 5B 6F 53 7E A8  ..t...>..b.[oS..
#     0010: F2 7E AC DC 33 64 03 60   78 EF 27 D5 A4 FA 2B 2D  ....3d.`x.'...+-
#     0020: 12 12 1A 0A CA CF 83 3F   1F C3 1D 41 66 30 85 F9  .......?...Af0..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.160 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:45:59.211 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C1 33 C3 80 31 50 8C 1E 3E 59 05 18 E0 0A F6 94 AE 21 D3 AD BB CD 17 C3 2D 02 5E 6E 73 E1 79 B5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 16:45:59.479 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 16:45:59.480 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 16:46:10.285; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 16:46:10.615 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 35 C0 90",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:23.000 UTC",
#       "not  after"         : "2023-12-28 16:45:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#           0010: FF 26 79 30                                        .&y0
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 C4 80 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 16:45:25.000 UTC",
#       "not  after"         : "2023-12-28 16:45:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 59 7E 27 B6 7B E7 91   DE 69 AF 0E 48 69 E4 4E  .Y.'.....i..Hi.N
#           0010: FF 26 79 30                                        .&y0
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 C5 A7 C8 61 46 1C EE   CA 8C CA D4 0A 31 56 9E  W...aF.......1V.
#           0010: E1 B4 88 97                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 16:46:10.633 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:46:10.745 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:46:10.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:46:10.745 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:46:10.745 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:46:10.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:46:10.895 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 16:46:10.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.902 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.914 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.915 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 16:46:10.918 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B9 F8 B6 4C 7D F1 6D 5C 36 BB 56 AF 3A 7A B3 70 B9 3F 0E 95 66 13 44 CC 90 A6 E2 06 E8 74 78 80",
#     "session id"          : "45 41 0D 86 71 25 F7 56 00 BB 2F 53 40 73 B1 A5 93 A9 AF 95 72 C6 9B 7B 84 AC FA 34 D3 31 A3 C3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B3 1F D4 41 07 70 AB DC   38 DC 47 3C D7 22 E3 DC  ...A.p..8.G<."..
#               0010: 58 AE CB 0C 70 89 78 B4   00 07 49 12 AE 4E 0F 74  X...p.x...I..N.t
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.939 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "77 89 98 0C A5 AA 65 FA 95 7F 61 F7 CF 82 00 35 AA 6E 89 B2 03 D6 C2 2D 36 9A A3 9E C4 31 E9 D3",
#     "session id"          : "45 41 0D 86 71 25 F7 56 00 BB 2F 53 40 73 B1 A5 93 A9 AF 95 72 C6 9B 7B 84 AC FA 34 D3 31 A3 C3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: B4 74 49 DC 55 81 96 6F   13 89 4F 82 E0 12 44 31  .tI.U..o..O...D1
#             0010: 5E 4F 2A A5 48 CF 75 D3   03 B0 78 B8 FC BE 1E 14  ^O*.H.u...x.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.939 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.939 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.941 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.944 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.944 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.944 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:46:10.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:46:10.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.946 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.946 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.954 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.956 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.957 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.961 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.961 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.961 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.961 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.962 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.962 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:46:10.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:46:10.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 16:46:10.964 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 16:47:33.441 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:47:33.483 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:47:33.483 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:47:33.483 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 16:47:33.483 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33170/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28619ms
ok 65 stop command for single port in 31003ms
ok 66 status detects locally running solr in 14316ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2157ms
ok 69 copying files around in 6534ms
ok 70 upconfig in 2591ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 9s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m31s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5574 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5574/

All tests passed

Build Log:
[...truncated 1320 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41919/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 14:17:00.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 14:17:00.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 14:17:01.473; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 14:17:01.516; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22560ms
ok 61 start solr with client truststore and security manager in 25022ms
not ok 62 start solr with mTLS needed in 56948ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eqd5tn/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41919.
#
# Started Solr server on port 41919 (pid=200484). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41920.
#
# Started Solr server on port 41920 (pid=200891). Happy searching!
#
# INFO  - 2023-09-29 14:18:24.589; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 14:18:24.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 14:18:24.955; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 14:18:24.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 14:18:24.959; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:24.990 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 B4 5B 85",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:18:00.000 UTC",
#     "not  after"         : "2023-12-28 14:18:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E A8 97 D6 44 A2 DE 3A   97 F3 8B C1 68 A0 EA 7B  ^...D..:....h...
#         0010: 70 C2 E2 F2                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:24.995 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 49 02 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:52.000 UTC",
#     "not  after"         : "2023-12-28 14:17:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:25.009 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:25.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.240 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:25.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:25.242 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.247 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.261 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.261 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.261 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:25.264 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AA B3 F8 C6 AD B5 24 08 7F C6 CF 57 52 59 2F A5 B6 A8 AA EA 4D 40 3A AE BE D9 50 0B 14 92 E7 87",
#   "session id"          : "7C 09 09 DA 15 BD 44 75 E9 BC FE AA 5A 4D 08 B1 62 0C 4C 6B 12 21 B9 02 50 09 2C 18 56 1B 8E 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B0 79 97 59 97 CD 4B B1   43 A2 E1 E1 C5 4D 89 A7  .y.Y..K.C....M..
#             0010: 85 47 2A A2 13 BF D4 5E   F9 C5 71 D4 FD 5D 45 5C  .G*....^..q..]E\
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.390 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C4 D6 A3 0D 56 FC C3 07 FD C1 38 9C 21 7E 6D 35 A9 76 65 E2 74 65 18 A2 B9 AB 88 70 59 3C 77 1D",
#   "session id"          : "7C 09 09 DA 15 BD 44 75 E9 BC FE AA 5A 4D 08 B1 62 0C 4C 6B 12 21 B9 02 50 09 2C 18 56 1B 8E 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 41 28 18 31 B4 0E AF 28   04 C3 75 EC D5 62 5B F3  A(.1...(..u..b[.
#           0010: 63 C6 92 A0 79 A3 FA 9E   6E 03 78 78 19 90 3C 4B  c...y...n.xx..<K
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.391 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.391 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.392 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.392 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.393 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.393 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.393 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.393 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.394 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.394 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.395 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.396 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.396 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.397 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.398 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.398 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.406 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.408 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.409 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.418 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.420 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.421 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.422 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.424 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.428 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 50 E5 F9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:56.000 UTC",
#       "not  after"         : "2023-12-28 14:17:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 29 34 1C C7 94 59 4E   35 3C 70 97 B2 87 8C 3E  .)4...YN5<p....>
#           0010: EE F5 B0 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.428 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:25.487 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:25.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:25.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:25.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.513 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.519 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 93 04 84 9D B5 E9 E2   26 3E 99 9A A0 6C 5F 3B  T.......&>...l_;
#     0010: DE 4C C0 6F F7 28 6F 8D   1D DD D1 E5 FE B8 2E E9  .L.o.(o.........
#     0020: 40 53 D6 F9 75 53 FE D3   B6 82 B4 57 6E 38 07 9B  @S..uS.....Wn8..
#     0030: 5A 68 6E F4 5B 05 C8 5A   64 6E C3 32 44 4D 2A D9  Zhn.[..Zdn.2DM*.
#     0040: 28 C4 DC 01 DC 98 7F AC   63 B8 21 61 8A F8 FB FB  (.......c.!a....
#     0050: 6C 0D 1C 3A A3 DE EA C5   DE 62 87 C1 33 05 88 68  l..:.....b..3..h
#     0060: 1A A7 50 F4 C3 14 EE 6B   F5 7A 33 43 05 3F 63 68  ..P....k.z3C.?ch
#     0070: F4 44 7F 42 D4 9F 38 E0   AD 63 DD DE EB B6 E4 A6  .D.B..8..c......
#     0080: A8 90 0D CB A0 0D 80 20   57 DA 17 CE 09 3B 12 7D  ....... W....;..
#     0090: 47 17 94 5E 3B 68 0B 47   A5 82 3D 47 CF D1 17 EE  G..^;h.G..=G....
#     00A0: 34 42 2C 68 13 5A 6A 80   15 D4 04 F1 07 B3 3B 9B  4B,h.Zj.......;.
#     00B0: 74 DE A9 99 64 7A F4 E3   9A FF 18 FF 06 5F 1E 18  t...dz......._..
#     00C0: 37 51 5B 8B F3 DD 11 AB   02 1F E5 0B 1E 72 D5 0D  7Q[..........r..
#     00D0: CA 61 33 2A 64 12 65 AE   4B 8F EF 40 E8 86 8F 41  .a3*d.e.K..@...A
#     00E0: 24 6B 40 10 AD BE E3 5D   B2 F7 D0 0F 8E 34 AF 80  $k@....].....4..
#     00F0: 4F F0 B2 B8 89 FB 8E 37   39 83 68 F8 4E CE 6C F8  O......79.h.N.l.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.521 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 40 60 3A 3A 33 1C 7B   83 11 A7 4E 51 F5 F5 79  .@`::3.....NQ..y
#     0010: AD E8 F8 E2 38 5B 5D C0   5B FB D2 F6 8A 61 1D 5B  ....8[].[....a.[
#     0020: 87 19 85 CC 18 46 AC C7   12 BE D3 99 97 4E B2 C2  .....F.......N..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.524 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:25.525 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.525 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:25.525 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.525 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:25.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:25.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.526 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.529 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 B4 5B 85",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:18:00.000 UTC",
#       "not  after"         : "2023-12-28 14:18:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E A8 97 D6 44 A2 DE 3A   97 F3 8B C1 68 A0 EA 7B  ^...D..:....h...
#           0010: 70 C2 E2 F2                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E AC F6 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:54.000 UTC",
#       "not  after"         : "2023-12-28 14:17:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#           0010: 2A 48 F7 26                                        *H.&
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.570 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 DF 37 44 EC 8D 44 A7   53 19 EB E4 94 1E 72 3F  P.7D..D.S.....r?
#     0010: 8B 17 C0 C2 36 56 72 5E   2D 17 CA 31 B0 17 A4 52  ....6Vr^-..1...R
#     0020: EC 07 5A 3A 65 07 55 E9   D9 92 2E 03 92 7F 6F 08  ..Z:e.U.......o.
#     0030: 52 06 BF 75 B6 22 04 E7   6C 4E C5 D9 67 29 F4 89  R..u."..lN..g)..
#     0040: 16 8B C1 9A 86 C2 7E D6   E1 C2 97 3F E3 97 98 9A  ...........?....
#     0050: F5 85 69 0E 83 94 31 D4   39 4F 02 A0 37 D3 E7 57  ..i...1.9O..7..W
#     0060: 06 95 AC 2B 10 12 53 EB   AD B0 66 EE 4C A9 44 FB  ...+..S...f.L.D.
#     0070: 85 D4 66 CB E3 F8 F9 06   5B 27 79 8D CF 95 63 CE  ..f.....['y...c.
#     0080: BF 00 46 12 87 25 7C 91   2F 38 DF 8E D7 AC 24 10  ..F..%../8....$.
#     0090: C3 A8 6F E9 A1 BA 08 79   14 FF C4 36 22 C7 6D 40  ..o....y...6".m@
#     00A0: DF 50 1E 24 69 59 8B A9   69 CD 2C 16 C6 82 C3 C0  .P.$iY..i.,.....
#     00B0: 8D 73 0C B5 A1 7D 47 EA   D3 B3 75 3A E0 4F F9 6D  .s....G...u:.O.m
#     00C0: 9F 15 D7 FE 96 E5 DB 76   00 1E 15 73 D0 4A E7 B0  .......v...s.J..
#     00D0: 75 D3 8B AF 0C D3 A2 35   34 6A 02 66 28 AF 0D 13  u......54j.f(...
#     00E0: A2 40 E1 EF F9 AB 50 45   06 53 55 65 55 0C 46 67  .@....PE.SUeU.Fg
#     00F0: 38 12 7F 3B 3B 2A A1 D5   D5 BB 6E 0B 6D 26 59 6F  8..;;*....n.m&Yo
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.571 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5F 8C 51 F1 63 BE B4 BA   FC 78 CE 7F 44 89 9B D6  _.Q.c....x..D...
#     0010: A8 81 C0 6E 3A 36 BA 66   55 CA E0 65 30 2D 19 7E  ...n:6.fU..e0-..
#     0020: 38 5D 28 6B D8 82 FD CE   59 F2 BF C9 15 DE D1 62  8](k....Y......b
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.572 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:25.620 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EC 5F B7 FD 72 01 22 C7 B9 6E A4 D0 28 CD E5 0B 26 87 F8 EE 10 EF 68 EA 78 1F C1 3B E4 48 24 17",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 14:18:25.966 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 14:18:25.967 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 14:18:26.899; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 14:18:26.905; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 14:18:27.296; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 14:18:27.299; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 14:18:27.300; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eqd5tn/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:27.333 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 B4 5B 85",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:18:00.000 UTC",
#     "not  after"         : "2023-12-28 14:18:00.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E A8 97 D6 44 A2 DE 3A   97 F3 8B C1 68 A0 EA 7B  ^...D..:....h...
#         0010: 70 C2 E2 F2                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:27.338 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 49 02 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:52.000 UTC",
#     "not  after"         : "2023-12-28 14:17:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:27.352 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:27.446 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:27.448 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:27.453 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:27.453 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:27.604 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.604 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:27.606 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:27.606 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.612 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.625 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.625 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.625 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:27.628 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C5 01 5D DF B9 0D 55 31 42 75 1A AB E3 7D 20 78 44 B5 8F 36 9A E8 F9 33 D2 49 93 D2 FF 3D B4 75",
#   "session id"          : "F7 A6 EB 93 AA DA 9E 53 26 BD 03 56 17 3F 4C 47 72 17 06 BB 99 AA 74 58 41 44 C8 49 DC 16 BE 6D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C5 13 F0 CC DD 45 B8 3D   94 FF 6F 04 4A 64 75 B8  .....E.=..o.Jdu.
#             0010: D3 26 8F 18 05 28 F8 E3   C2 65 0D BD AB C7 CD 55  .&...(...e.....U
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.744 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D5 0B 14 6B 67 03 C9 B9 2D 48 1B 5F BD D2 71 6E D9 6A 77 A1 72 2C 0B 62 75 6A 8F 28 D3 85 A6 D3",
#   "session id"          : "F7 A6 EB 93 AA DA 9E 53 26 BD 03 56 17 3F 4C 47 72 17 06 BB 99 AA 74 58 41 44 C8 49 DC 16 BE 6D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 50 DC E3 96 74 0A 59 E7   F9 52 E3 D6 2A 78 1D 92  P...t.Y..R..*x..
#           0010: C3 BF 59 71 AA 6D 60 9C   1E 3D 3D 4C 70 97 4C 74  ..Yq.m`..==Lp.Lt
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.745 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.746 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.747 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.747 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.747 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.747 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.748 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.748 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.749 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.750 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.750 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.750 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.751 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.752 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.752 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.761 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.763 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.764 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.773 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.773 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.773 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.773 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.774 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.774 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.774 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.776 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.777 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.777 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.777 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.778 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.779 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.784 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 50 E5 F9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:56.000 UTC",
#       "not  after"         : "2023-12-28 14:17:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 29 34 1C C7 94 59 4E   35 3C 70 97 B2 87 8C 3E  .)4...YN5<p....>
#           0010: EE F5 B0 B7                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.784 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.871 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E AC F6 20",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 14:17:54.000 UTC",
#     "not  after"         : "2023-12-28 14:17:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#         0010: 2A 48 F7 26                                        *H.&
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#         0010: 65 F6 A0 28                                        e..(
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.877 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F B8 DC 04 F3 4E 4E 53   7E 61 5A 2D 0B 77 FF F4  .....NNS.aZ-.w..
#     0010: 84 BB D7 07 8A FD F4 B8   54 E6 8B 56 A2 11 E1 A2  ........T..V....
#     0020: 4C D7 B4 3C C2 C3 14 34   53 A2 73 24 B2 C1 FD 48  L..<...4S.s$...H
#     0030: 68 C4 64 0F DF B2 F9 86   49 C0 60 4B C1 6F B3 14  h.d.....I.`K.o..
#     0040: D5 3A 1D 12 BC 84 62 2A   BA 42 5B FB 39 00 7C 9E  .:....b*.B[.9...
#     0050: 86 97 98 4E F4 EE 49 99   AB 4E DF 52 14 76 D8 47  ...N..I..N.R.v.G
#     0060: 6F 41 11 24 2D 2F 77 8A   78 F0 95 13 1A E4 38 6C  oA.$-/w.x.....8l
#     0070: 29 B9 C2 5E F9 AF 30 94   67 F0 DB 31 F1 04 B2 F4  )..^..0.g..1....
#     0080: 8B B4 1F 32 BD 4A E9 48   F2 BF 64 9D 23 39 2C 45  ...2.J.H..d.#9,E
#     0090: 2F 4A 10 48 67 79 CE EF   A0 A3 13 9E 5E 03 1D EA  /J.Hgy......^...
#     00A0: EC 08 A8 E6 2B 0B 44 AE   5F F1 D7 3A 0C 84 94 CA  ....+.D._..:....
#     00B0: EA 0C 02 45 82 E5 52 50   4E 55 95 86 39 0E AC 08  ...E..RPNU..9...
#     00C0: 5B D1 3E FA BE E0 FE BB   38 44 71 EA 33 90 02 66  [.>.....8Dq.3..f
#     00D0: B4 5C 08 E7 F5 C3 62 14   CF 39 E1 B4 5E 55 12 51  .\....b..9..^U.Q
#     00E0: CB F8 D2 2D DD B3 83 D0   D9 5D 93 89 08 26 4F 29  ...-.....]...&O)
#     00F0: 3B F1 15 21 45 8A A2 CF   42 FE 39 5A 94 FE 33 0B  ;..!E...B.9Z..3.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.879 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 84 EF 31 B4 64 35 0A DA   7B 95 D6 70 98 33 22 AC  ..1.d5.....p.3".
#     0010: 32 85 05 04 BE F6 65 89   30 D7 40 22 F2 A8 54 13  2.....e.0.@"..T.
#     0020: 44 06 0F 7A 38 8C 78 C3   94 B9 C5 B0 73 75 AA 84  D..z8.x.....su..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.883 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:27.884 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.885 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.888 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 B4 5B 85",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:18:00.000 UTC",
#       "not  after"         : "2023-12-28 14:18:00.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E A8 97 D6 44 A2 DE 3A   97 F3 8B C1 68 A0 EA 7B  ^...D..:....h...
#           0010: 70 C2 E2 F2                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E AC F6 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:54.000 UTC",
#       "not  after"         : "2023-12-28 14:17:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#           0010: 2A 48 F7 26                                        *H.&
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.928 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 27 CB 04 5E 6E A1 38 57   71 A7 B5 52 73 57 EB 3A  '..^n.8Wq..RsW.:
#     0010: F5 17 03 2D 92 2B 03 38   2C C4 D8 A9 62 3E E2 26  ...-.+.8,...b>.&
#     0020: DE F1 16 76 72 73 0D A3   86 55 C0 8E 36 84 FA BD  ...vrs...U..6...
#     0030: 0D EE CF D2 2B 0B 3F 50   78 5F C8 D5 F5 D5 0D E8  ....+.?Px_......
#     0040: 0B 14 0A DD AD D0 F0 7E   DC 93 3D 8E 11 67 F2 35  ..........=..g.5
#     0050: C3 C8 86 F3 D1 5F 70 21   3A 3B 60 0B AE 56 6D BB  ....._p!:;`..Vm.
#     0060: 83 41 64 CF 38 39 9C A9   97 88 0D 72 F7 47 F9 34  .Ad.89.....r.G.4
#     0070: 59 89 A3 89 2C 4B 5C 05   D7 FA 87 55 C2 BC B7 6E  Y...,K\....U...n
#     0080: 48 19 94 D8 B0 C7 33 D5   D5 A0 46 99 FE 74 82 01  H.....3...F..t..
#     0090: 2C CB 3D B8 9C 7C B3 C4   E3 E3 32 43 80 5A 54 E2  ,.=.......2C.ZT.
#     00A0: 45 F1 49 49 EA D6 0E 8F   15 B8 78 9A 13 C3 7C C9  E.II......x.....
#     00B0: 22 1A 2D 07 0E FF 1C 3F   CA DC AC 4C D5 16 AF FB  ".-....?...L....
#     00C0: D2 78 17 E3 C9 FB 99 4C   05 E1 8A 62 24 FE 46 4C  .x.....L...b$.FL
#     00D0: 1C AF BB 8E 6F 9E 23 D3   2F A3 F2 33 BA E4 9E 1D  ....o.#./..3....
#     00E0: A7 39 7B 75 FD AE 0D 77   D3 FB 24 7F A0 E4 BB 33  .9.u...w..$....3
#     00F0: A9 27 DE 6A 09 07 04 B1   EA F3 57 50 1F 8F 61 6A  .'.j......WP..aj
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.929 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 84 60 52 94 B4 17 33 23   69 68 61 C5 B8 60 0F 72  .`R...3#iha..`.r
#     0010: D3 02 FD A6 57 61 EF 84   90 26 BD 50 43 D8 7D 09  ....Wa...&.PC...
#     0020: 78 92 39 C0 01 14 54 1B   FF 48 46 9E 19 3A 37 E5  x.9...T..HF..:7.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.930 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:27.987 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B3 98 32 56 8C 58 E1 BA C9 AF A5 6D E3 FF 22 F4 74 EA 96 26 EA 60 BE BC E9 F8 CA CC DB F9 CA 82",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 14:18:28.260 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 14:18:28.261 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 14:18:39.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:39.496 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 49 02 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:52.000 UTC",
#       "not  after"         : "2023-12-28 14:17:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#           0010: 2A 48 F7 26                                        *H.&
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E AC F6 20",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 14:17:54.000 UTC",
#       "not  after"         : "2023-12-28 14:17:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 4F 5C 2E 3F 69 86 2C   DA 5A 69 EE 5F 38 82 F1  hO\.?i.,.Zi._8..
#           0010: 2A 48 F7 26                                        *H.&
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 25 AC 56 B0 CF 5F 59 E9   95 62 6A 2E 59 E3 A1 03  %.V.._Y..bj.Y...
#           0010: 65 F6 A0 28                                        e..(
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 14:18:39.511 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:39.606 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:39.611 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:39.611 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:18:39.611 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:39.746 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.746 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:39.748 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 14:18:39.748 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.753 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.767 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 14:18:39.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E D2 E4 EB 44 05 27 96 1A 68 46 25 23 31 74 0C B2 95 52 AB 16 B4 E7 D9 A8 FD 47 72 39 32 3D 21",
#     "session id"          : "2F 9E 90 F3 4C 74 65 F7 F7 D0 9E 95 2B 99 A9 58 18 77 0D 28 E7 B1 04 C4 2A 8D 30 7B 69 FF 1D 1E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: FC 93 48 9C 4C 2A 57 4E   B2 82 E9 CF 9C 4C 46 9A  ..H.L*WN.....LF.
#               0010: EE AC F9 69 3F FD 84 AE   71 9B 6A 09 41 3E F7 00  ...i?...q.j.A>..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.790 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EE 65 29 84 07 F2 50 A0 16 77 36 17 5C 16 F6 28 29 90 20 CF 2E 14 29 0B EF 34 22 C2 29 25 A6 0B",
#     "session id"          : "2F 9E 90 F3 4C 74 65 F7 F7 D0 9E 95 2B 99 A9 58 18 77 0D 28 E7 B1 04 C4 2A 8D 30 7B 69 FF 1D 1E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D2 6E 93 9E 01 5B 4B 75   73 C7 C5 22 C5 CF A3 D5  .n...[Kus.."....
#             0010: 0D A0 76 68 16 0F F1 28   E2 35 42 F4 1F DD 38 2B  ..vh...(.5B...8+
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.791 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.791 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.792 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.793 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.793 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.796 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.796 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.796 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.797 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.805 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.807 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.808 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:39.819 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:18:39.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 14:18:39.821 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

yptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 14:20:00.337 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:20:00.383 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:20:00.383 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:20:00.383 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 14:20:00.383 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41920/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28367ms
ok 65 stop command for single port in 30985ms
ok 66 status detects locally running solr in 14387ms
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2164ms
ok 69 copying files around in 6575ms
ok 70 upconfig in 2747ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1253ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 25m
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 25m27s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5573 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5573/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46533/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 12:08:55.933; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 12:08:55.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 12:08:56.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 12:08:56.887; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23208ms
ok 61 start solr with client truststore and security manager in 25355ms
not ok 62 start solr with mTLS needed in 56287ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2rwnf8/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46533.
#
# Started Solr server on port 46533 (pid=201496). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46534.
#
# Started Solr server on port 46534 (pid=201920). Happy searching!
#
# INFO  - 2023-09-29 12:10:20.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 12:10:20.312; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 12:10:20.696; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 12:10:20.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 12:10:20.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:20.732 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 15 8F 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:56.000 UTC",
#     "not  after"         : "2023-12-28 12:09:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 01 7E 43 18 23 C2 6F   78 C2 6F 0E F4 C1 6C 95  ...C.#.ox.o...l.
#         0010: 2C CF 06 5E                                        ,..^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:20.736 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 19 12 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:48.000 UTC",
#     "not  after"         : "2023-12-28 12:09:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:20.750 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:20.848 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:20.848 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:20.848 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:20.848 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:20.993 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:20.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:20.995 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:20.996 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:21.002 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:21.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:21.015 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:21.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:21.018 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AC FE 0E 8B D3 F1 D6 BD 2A 2B D2 C8 4F D3 00 D5 79 ED 7A 19 E3 E9 FB 57 B4 68 4B F4 53 82 14 AD",
#   "session id"          : "F7 19 3B 74 90 EC B8 00 AD 89 80 94 D1 AC 8C 12 28 9B 2D 02 43 90 05 75 62 DB 72 73 1E 00 2B 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 00 6B 25 DB 5C AF A1   31 62 56 3B 20 91 0C F0  ..k%.\..1bV; ...
#             0010: A5 A2 2C 47 49 19 DB 29   7B 94 A6 6E DB D4 B5 10  ..,GI..)...n....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.130 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "ED FE 1D EA F1 04 CF 6C ED 05 A5 65 6A E8 07 2A 5C 2F AE 4B 79 CC 99 44 71 37 59 E4 BD 3C D5 80",
#   "session id"          : "F7 19 3B 74 90 EC B8 00 AD 89 80 94 D1 AC 8C 12 28 9B 2D 02 43 90 05 75 62 DB 72 73 1E 00 2B 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B5 85 EC B9 62 83 B7 75   F4 93 14 1C EC EE EB 60  ....b..u.......`
#           0010: 37 E3 9E F4 2C B8 9E C9   74 C2 D2 5D 6A 1A 7B 50  7...,...t..]j..P
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.130 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.131 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.132 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.133 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.133 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.135 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.135 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.135 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.136 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.137 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.137 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.145 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.146 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.147 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.151 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.151 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.152 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.154 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.155 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.155 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.156 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.157 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.158 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.158 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.162 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 3F C8 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:52.000 UTC",
#       "not  after"         : "2023-12-28 12:09:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E D2 5B 8A CA 3A 48 4F   D6 E8 48 E4 10 86 A3 1E  >.[..:HO..H.....
#           0010: 91 7B 69 C0                                        ..i.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.162 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.247 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.251 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8D 8E 79 56 FE DA CA 0B   3D B5 E2 FB C0 C9 DB A1  ..yV....=.......
#     0010: 2F 6A 02 D3 5F 94 AE B0   99 5D EB 56 DF 5F 0A 8F  /j.._....].V._..
#     0020: 74 35 CA 5D 78 8E F0 07   61 CB 7B 32 AA 80 63 2A  t5.]x...a..2..c*
#     0030: B2 A8 FE F0 03 49 D6 86   8F 86 69 E9 8E 36 32 74  .....I....i..62t
#     0040: F9 69 2D EC 81 22 B7 9F   B3 33 06 5C 69 57 63 83  .i-.."...3.\iWc.
#     0050: E4 BF 95 38 6A F1 A7 40   AA F0 82 78 BC 2D C5 E2  ...8j..@...x.-..
#     0060: 72 67 54 3C 90 9A A9 D6   41 93 0F 9D 53 80 8A 1D  rgT<....A...S...
#     0070: 14 3F 7A 6F AA CB C3 FA   89 5C 63 B7 30 75 ED 47  .?zo.....\c.0u.G
#     0080: 07 2F B9 64 9E E2 EA 09   87 88 9E DB CD 2D 0C 8A  ./.d.........-..
#     0090: 69 E0 A5 0D A5 58 E3 70   75 ED 6F 03 23 AA 9E DF  i....X.pu.o.#...
#     00A0: 2F C9 90 DC CC 22 48 38   71 E9 DC 73 B2 0C 71 5E  /...."H8q..s..q^
#     00B0: 5F DD EA 94 1C 50 EE CE   24 DD 00 05 68 B7 A7 34  _....P..$...h..4
#     00C0: 28 9B 01 1F 60 CF A6 F9   C6 0A 0E 3E C4 2A EA DC  (...`......>.*..
#     00D0: ED 99 6A 51 15 2D D1 A4   EF E9 16 8B 05 3D CA BF  ..jQ.-.......=..
#     00E0: 7E AF 51 6E 2C 38 C8 04   92 11 D3 F8 01 5B 0E 5E  ..Qn,8.......[.^
#     00F0: D4 A1 AB BD 58 52 58 B7   AB E4 57 14 BD CB F1 63  ....XRX...W....c
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.253 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 50 62 C2 F5 D6 D8 A7   4A 31 AF 56 56 7E 3D 2C  RPb.....J1.VV.=,
#     0010: 7F 21 B3 7A A3 51 D5 36   BF 3C 6A F6 6A 21 1A FA  .!.z.Q.6.<j.j!..
#     0020: 72 F2 3F 22 F4 33 D2 4E   06 20 1A 1E 31 E1 76 CD  r.?".3.N. ..1.v.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.255 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:21.256 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.257 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:21.257 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.257 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:21.257 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:21.258 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.258 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.260 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 15 8F 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:56.000 UTC",
#       "not  after"         : "2023-12-28 12:09:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 01 7E 43 18 23 C2 6F   78 C2 6F 0E F4 C1 6C 95  ...C.#.ox.o...l.
#           0010: 2C CF 06 5E                                        ,..^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C E4 1A F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:50.000 UTC",
#       "not  after"         : "2023-12-28 12:09:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#           0010: CE D9 E1 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.286 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 26 7A CF 1D 71 BA 8F 60   89 CD 46 42 7F 7F D6 D4  &z..q..`..FB....
#     0010: FE FB 82 C8 B3 55 F3 8C   22 8F 7D 88 61 1B 34 3B  .....U.."...a.4;
#     0020: 8B 72 C1 C4 6B D1 E3 A7   10 55 E7 AF 95 B9 E1 2E  .r..k....U......
#     0030: BA 4D 3F 52 07 7F 22 5B   37 07 90 71 81 96 89 99  .M?R.."[7..q....
#     0040: 5D 8C 78 A5 62 34 7D 00   2A ED 29 4F 3F 59 A9 D0  ].x.b4..*.)O?Y..
#     0050: 45 50 72 4B 59 9B 47 B0   F7 C9 0D A8 BD 6A 54 04  EPrKY.G......jT.
#     0060: F8 7A 07 D1 EB CD 22 24   F1 CB EC 0B 6D D3 FD C5  .z...."$....m...
#     0070: 4A F4 63 0B CE E2 BA 7B   FA 73 36 28 0C 9D AE 78  J.c......s6(...x
#     0080: 70 8D 01 A9 32 57 0E 4F   97 8C 05 4D 3F 24 C6 A9  p...2W.O...M?$..
#     0090: 2E 99 5E 4B 0A 84 EC F0   5F 1C F0 32 80 E1 13 19  ..^K...._..2....
#     00A0: C9 46 63 EF 7C E7 30 67   B4 3A F7 C8 39 37 84 93  .Fc...0g.:..97..
#     00B0: D5 34 89 55 94 88 83 76   90 80 7B 3A FE 27 F4 7D  .4.U...v...:.'..
#     00C0: EB B9 1F 0A B5 92 EB C6   56 E9 36 56 B0 A1 79 D7  ........V.6V..y.
#     00D0: CF AE 08 A1 6B 33 91 7F   F4 62 84 6D 1E 89 21 A8  ....k3...b.m..!.
#     00E0: 22 C1 8E 06 E5 E0 C0 60   C1 8B FA 9B B9 C6 35 C2  "......`......5.
#     00F0: 4A EB E0 B9 64 99 B2 3A   3A 40 78 9E A7 22 73 30  J...d..::@x.."s0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.287 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 73 49 7F 15 D4 40 3C   78 F5 11 A8 06 49 74 FC  .sI...@<x....It.
#     0010: DF 3E 4E 19 51 5E 6B 0B   C4 1C 8E 3B 37 9A 6C 19  .>N.Q^k....;7.l.
#     0020: 4F 72 85 60 BD 82 CA A7   8C 11 23 A7 4A F2 02 A8  Or.`......#.J...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:21.343 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "69 1C AF 6E 3E ED 90 9A B1 03 0E 17 78 CD 81 EE 1E 02 B6 30 7B 0A 4B 83 C9 B7 B6 70 EA EE B8 6C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 12:10:21.647 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 12:10:21.649 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 12:10:22.586; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 12:10:22.592; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 12:10:22.959; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 12:10:22.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 12:10:22.963; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2rwnf8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:22.994 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 15 8F 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:56.000 UTC",
#     "not  after"         : "2023-12-28 12:09:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 01 7E 43 18 23 C2 6F   78 C2 6F 0E F4 C1 6C 95  ...C.#.ox.o...l.
#         0010: 2C CF 06 5E                                        ,..^
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:22.999 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 19 12 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:48.000 UTC",
#     "not  after"         : "2023-12-28 12:09:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:23.014 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:23.374 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:23.374 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:23.375 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:23.375 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:23.522 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.523 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:23.524 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:23.525 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.543 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.543 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:23.545 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 F4 F2 CC 07 89 AD 09 A3 D5 B1 3D AF 5E 93 B4 63 D8 AF BB 1A B6 9C DA 79 2E 4F E3 B4 91 C9 FB",
#   "session id"          : "3C 38 E3 FA B2 65 4A 9D B1 1A C1 65 55 BC 7B 47 4F 28 AD DD BF F2 86 4C 5D 7C EC 31 6E 9A 25 6A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 4E 0B 1C 5E CA 17 F4   37 5A DB 82 94 AC 9D 6E  .N..^...7Z.....n
#             0010: A8 76 30 AF F3 3F 79 86   61 6C D3 EF 73 9A 16 0D  .v0..?y.al..s...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.654 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8A 9C 3D 76 63 3F 75 06 D6 6D 34 6D 26 A2 0C B1 F6 DB 94 59 FB 98 A3 9E 3A 1C AF 2F DC 72 FD BE",
#   "session id"          : "3C 38 E3 FA B2 65 4A 9D B1 1A C1 65 55 BC 7B 47 4F 28 AD DD BF F2 86 4C 5D 7C EC 31 6E 9A 25 6A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 79 A3 DD 52 48 4E 8D 0A   B6 7E E7 00 1E 9C 3B 97  y..RHN........;.
#           0010: A3 08 3C 3C 1D 49 40 71   83 A7 60 A0 11 FF C5 4A  ..<<.I@q..`....J
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.654 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.655 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.657 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.659 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.659 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.659 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.659 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.660 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.661 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.668 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.669 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.670 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.674 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.674 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.674 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.677 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.677 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.677 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.678 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.678 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.679 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.679 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.682 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 3F C8 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:52.000 UTC",
#       "not  after"         : "2023-12-28 12:09:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E D2 5B 8A CA 3A 48 4F   D6 E8 48 E4 10 86 A3 1E  >.[..:HO..H.....
#           0010: 91 7B 69 C0                                        ..i.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.682 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.779 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C E4 1A F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 12:09:50.000 UTC",
#     "not  after"         : "2023-12-28 12:09:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#         0010: CE D9 E1 37                                        ...7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#         0010: F2 16 D4 F4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.782 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 27 B6 07 DE 8B 3C C6 20   DC 83 18 7C 6C B8 BA DB  '....<. ....l...
#     0010: D0 0A 28 F0 67 DE BF 0D   0F 0E D8 26 B5 C0 5C BD  ..(.g......&..\.
#     0020: 22 78 8F FA D6 0C F1 78   A2 16 B8 79 9D AD 06 19  "x.....x...y....
#     0030: 83 2B BA 0F 58 37 60 34   D9 18 D7 68 8D 8A F5 F8  .+..X7`4...h....
#     0040: 04 7D 76 80 C6 0E A2 21   DD B8 7D 52 E2 DA 5D 0C  ..v....!...R..].
#     0050: 63 3B AC CE 8D FF 24 8A   54 CA F0 CE 91 B3 A9 BF  c;....$.T.......
#     0060: 98 E6 EE 84 92 C1 04 AC   E6 3C 3B 3F 1D 26 A1 5C  .........<;?.&.\
#     0070: 83 70 BA 48 16 D4 33 44   1F 5E 35 3A 8C A9 29 E9  .p.H..3D.^5:..).
#     0080: D5 A6 E9 EB E7 36 3D CD   52 2B E8 C9 4D E6 B6 D9  .....6=.R+..M...
#     0090: AC ED 06 3D C7 F1 04 62   DD 66 B0 B4 F3 87 EF A4  ...=...b.f......
#     00A0: E4 CA BA 34 7B 60 2E 3A   B8 EA E0 7E 50 7D 29 13  ...4.`.:....P.).
#     00B0: 27 FC FF 8F 6C 4B 49 B6   14 A9 AC 8F 6A 84 65 FC  '...lKI.....j.e.
#     00C0: 80 61 25 1F 6A 1E 69 D1   95 19 59 48 3D A8 48 C7  .a%.j.i...YH=.H.
#     00D0: 1A C7 DE C4 B9 68 A6 E6   6B C3 82 00 EA 08 92 45  .....h..k......E
#     00E0: 5E E6 0A C0 AF 3F 15 71   85 A4 68 CE DB B1 B0 45  ^....?.q..h....E
#     00F0: 9A D6 14 CD 8E 9D 20 10   D1 63 DC DA 2B 39 CE 13  ...... ..c..+9..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.784 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CF 1E C2 DD D6 C1 37 9B   34 C5 54 93 0C 96 FC C1  ......7.4.T.....
#     0010: 17 93 3C 48 C4 0B 44 FD   77 B5 FF 44 9D FB 67 3B  ..<H..D.w..D..g;
#     0020: D8 6E FC AB 10 73 A0 8E   35 31 34 5E 56 F3 00 22  .n...s..514^V.."
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.787 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:23.788 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.788 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:23.788 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.788 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 12:10:23.789 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:23.789 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.789 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.792 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 15 8F 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:56.000 UTC",
#       "not  after"         : "2023-12-28 12:09:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 01 7E 43 18 23 C2 6F   78 C2 6F 0E F4 C1 6C 95  ...C.#.ox.o...l.
#           0010: 2C CF 06 5E                                        ,..^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C E4 1A F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:50.000 UTC",
#       "not  after"         : "2023-12-28 12:09:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#           0010: CE D9 E1 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.816 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E 4B 1F D3 C0 53 D4 D7   E5 D1 3E FB 96 1D 8A 46  ^K...S....>....F
#     0010: 45 42 61 71 A1 00 6A 34   E2 10 A0 04 E1 97 40 25  EBaq..j4......@%
#     0020: 04 9E DF 6C BB 09 6C AA   BA 9C 12 0A C4 E1 5B 6E  ...l..l.......[n
#     0030: FF 95 26 B3 B5 60 B6 15   C7 54 C1 A2 6C 68 7D 64  ..&..`...T..lh.d
#     0040: 2B CC F9 CA B1 81 2B D1   23 71 C4 5D DE EF 48 D1  +.....+.#q.]..H.
#     0050: 9E B8 50 D3 34 15 3F 93   14 93 E7 0E 1B 52 A6 4E  ..P.4.?......R.N
#     0060: E5 84 BC 34 40 8E 3A B4   37 CC D2 4F 23 73 3D F5  ...4@.:.7..O#s=.
#     0070: 9B C7 52 2D 42 89 9B AB   74 AE F5 62 E0 F3 D3 D6  ..R-B...t..b....
#     0080: 88 12 09 BD 0B B6 1E B2   C1 7C 9D 6D 49 5E 32 57  ...........mI^2W
#     0090: DB E7 0B 77 6B B8 01 A2   1E C7 AC 23 AC AD 6C 33  ...wk......#..l3
#     00A0: BF 54 58 9E ED 87 E6 75   F2 78 5B C2 95 A0 B3 23  .TX....u.x[....#
#     00B0: F9 5F D3 1A 47 23 10 F8   5A BE 05 44 21 41 0E 3F  ._..G#..Z..D!A.?
#     00C0: 76 63 A7 09 80 F7 8B 23   4E CF 7F 20 B6 0E FF 51  vc.....#N.. ...Q
#     00D0: 4A 34 2C AE B5 29 AF FF   1F 39 8F 24 62 D9 CE F0  J4,..)...9.$b...
#     00E0: 56 2D EE D5 6B 29 1B F4   15 3D C1 BA 17 DE 38 A6  V-..k)...=....8.
#     00F0: 54 5D 06 CE 28 9B 0D 70   87 DA 19 B7 76 AC A5 7C  T]..(..p....v...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.817 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F3 A2 07 2D 55 51 03 80   20 EC DC C3 5A FD 1C 36  ...-UQ.. ...Z..6
#     0010: 1B F5 7A 83 DD 05 96 6C   D6 68 AA A1 0A C7 48 3D  ..z....l.h....H=
#     0020: 0B 26 40 D5 0B 32 BC 7C   81 53 43 B8 9E DB 7A FF  .&@..2...SC...z.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.818 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:23.865 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "87 52 72 65 45 26 4B A9 08 CA B5 FE 09 6D C2 6D E6 90 AA D3 BB A1 21 CD 34 F3 C7 82 89 11 23 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 12:10:24.131 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 12:10:24.132 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 12:10:35.001; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:35.318 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C E4 1A F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:50.000 UTC",
#       "not  after"         : "2023-12-28 12:09:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#           0010: CE D9 E1 37                                        ...7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 EB F5 45 C6 56 29 F2   53 9A F2 41 B0 25 D4 6B  ...E.V).S..A.%.k
#           0010: F2 16 D4 F4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 19 12 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 12:09:48.000 UTC",
#       "not  after"         : "2023-12-28 12:09:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 F6 AA 27 B5 1C 56 16   73 AB 6D CB 93 93 DB 1E  `..'..V.s.m.....
#           0010: CE D9 E1 37                                        ...7
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 12:10:35.334 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:35.433 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:35.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:35.433 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:10:35.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:35.574 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.575 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:35.576 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 12:10:35.577 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.582 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.594 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.594 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.595 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 12:10:35.597 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "EE 1F 54 E3 F6 F7 15 4E 39 DE A5 DA 1C D3 0B 12 33 6C 95 C2 0A 31 07 30 E5 71 07 66 D3 B4 C5 86",
#     "session id"          : "D2 D8 8F E8 24 37 C5 50 1B 76 D4 22 CD 9B F7 5E E1 A1 59 C6 3D 22 CC 49 48 47 39 53 7E F9 C0 73",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 64 A3 AE 06 5C 6F 6B 85   38 96 55 8E 1A E9 7E 7A  d...\ok.8.U....z
#               0010: 3C C5 98 FE 74 F6 EF E0   BD 9E B0 10 B7 AB 35 2C  <...t.........5,
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "54 F2 D6 21 81 32 3F 42 04 5E 10 30 EE BC 47 39 EC 13 42 FD BC E7 21 9F 00 C0 7F 0A 1E D0 5F 10",
#     "session id"          : "D2 D8 8F E8 24 37 C5 50 1B 76 D4 22 CD 9B F7 5E E1 A1 59 C6 3D 22 CC 49 48 47 39 53 7E F9 C0 73",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC 7C B7 AA 84 37 D7 20   41 32 4C AC CB 48 06 A2  .....7. A2L..H..
#             0010: D5 55 7C 23 9D 7F 16 D5   6B DB 86 91 2F BF A3 46  .U.#....k.../..F
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.622 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.622 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.625 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.627 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.627 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:35.629 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:35.629 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.629 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.638 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.639 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.641 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.644 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:35.645 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:10:35.646 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 12:10:35.647 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 12:11:54.385 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:11:54.439 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:11:54.439 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:11:54.439 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 12:11:54.440 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46534/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28352ms
ok 65 stop command for single port in 31247ms
ok 66 status detects locally running solr in 14391ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2159ms
ok 69 copying files around in 6557ms
ok 70 upconfig in 2621ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 36s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 20m57s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5572 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5572/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41925/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 10:14:33.250; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 10:14:33.256; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 10:14:34.171; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 10:14:34.214; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22709ms
ok 61 start solr with client truststore and security manager in 25323ms
not ok 62 start solr with mTLS needed in 57998ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-md6m4c/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41925.
#
# Started Solr server on port 41925 (pid=201740). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41926.
#
# Started Solr server on port 41926 (pid=202162). Happy searching!
#
# INFO  - 2023-09-29 10:15:57.292; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 10:15:57.298; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 10:15:57.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 10:15:57.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 10:15:57.678; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:57.709 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 FF 55 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:33.000 UTC",
#     "not  after"         : "2023-12-28 10:15:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 D6 3C 32 8E EB C0 0E   C9 4C DE 12 78 7E BB C2  ..<2.....L..x...
#         0010: 8B 69 62 C8                                        .ib.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:57.714 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 07 E4 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:25.000 UTC",
#     "not  after"         : "2023-12-28 10:15:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:57.728 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:15:57.948 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.949 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:15:57.950 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:15:57.951 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.968 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:15:57.970 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "68 24 0F 2D E4 40 4E BA ED DC 12 1D 93 E9 C9 D7 70 FF 56 68 43 41 C2 85 8E DF 03 38 FA 19 59 26",
#   "session id"          : "DD D0 3F E3 A6 6D 00 98 9A 53 79 6C 7F 79 42 2F C5 B3 06 4F 39 1A 38 EA 22 B7 96 66 BD 10 45 16",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E5 09 0D 28 67 35 FB BB   56 65 E8 5C 83 79 24 09  ...(g5..Ve.\.y$.
#             0010: 94 5F 11 48 CC 80 79 A2   E4 49 0E 48 E4 D5 F2 2E  ._.H..y..I.H....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DC 1B 5A AD 5F F8 EC AD 75 57 02 87 F4 01 46 1D 68 75 7B C6 E2 4A 61 E7 5A 50 30 55 B7 1C 3A 7A",
#   "session id"          : "DD D0 3F E3 A6 6D 00 98 9A 53 79 6C 7F 79 42 2F C5 B3 06 4F 39 1A 38 EA 22 B7 96 66 BD 10 45 16",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 90 2B 40 D8 F8 64 D3 89   5D 68 9D A3 7E A1 53 D7  .+@..d..]h....S.
#           0010: 75 CB 83 F8 67 BE 57 2B   86 1E FB DC AD A7 F0 56  u...g.W+.......V
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.086 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.086 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.088 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.090 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.092 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.100 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.101 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.103 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.106 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.108 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.109 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.110 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.110 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.110 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.111 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.112 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.115 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 5D F1 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:29.000 UTC",
#       "not  after"         : "2023-12-28 10:15:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 77 B2 84 53 16 69 C2   73 43 43 60 DC 6A 5A 1E  ww..S.i.sCC`.jZ.
#           0010: 78 EA B5 7C                                        x...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.115 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:15:58.174 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:15:58.174 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:15:58.174 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:15:58.175 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.194 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.198 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 FE FE 1F AE FC 3F DB   E2 7A E9 44 0A EF D6 6E  ......?..z.D...n
#     0010: 21 00 DD 8C C3 18 E5 AA   BA 08 D0 2C 10 9D 80 3B  !..........,...;
#     0020: 48 EF 70 11 E7 7F F5 A9   32 18 BF 89 AE 46 76 A4  H.p.....2....Fv.
#     0030: 58 2E 37 51 24 E0 83 74   7D BD 28 DF B1 B7 91 CF  X.7Q$..t..(.....
#     0040: A8 70 07 54 0A A0 83 1B   E0 8C E8 41 8C 6A 4E 43  .p.T.......A.jNC
#     0050: B2 02 58 EB C5 13 E4 58   21 33 03 28 0A B4 68 31  ..X....X!3.(..h1
#     0060: FA C9 FB 6E B6 D6 90 11   4D E4 AC 9E 73 07 EE 07  ...n....M...s...
#     0070: B0 FE B7 D2 D6 A7 9D 28   79 65 4D 54 96 38 23 80  .......(yeMT.8#.
#     0080: E7 77 5E 8A 95 E2 D3 D6   C2 E5 57 E4 62 F0 CA 5F  .w^.......W.b.._
#     0090: BC 81 64 D0 3F 0A 65 ED   E8 E3 A7 83 40 8C EE 9F  ..d.?.e.....@...
#     00A0: 4A DD B1 8D F2 80 12 92   1A BC 8F E3 19 8D 46 21  J.............F!
#     00B0: 98 42 11 79 B8 2D 02 9B   74 12 C5 F3 E5 68 96 36  .B.y.-..t....h.6
#     00C0: CD 5E F1 B7 60 5A 14 35   C1 CA 23 C9 24 4E D8 A5  .^..`Z.5..#.$N..
#     00D0: 58 34 68 28 8B BF C1 7C   22 5A 88 FC F8 89 44 37  X4h(...."Z....D7
#     00E0: 1E 2A 8E A2 6E B9 E5 7A   60 FE A3 84 27 11 5C 23  .*..n..z`...'.\#
#     00F0: EB A6 0E 7F F0 EC 2A D8   9C 8B 5E B8 3C D9 44 D3  ......*...^.<.D.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.200 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 03 7B F8 9B 74 B4 8A   CB AD EE F1 00 BB ED 81  .....t..........
#     0010: 9E 76 B5 D4 0B F0 D4 9E   69 CC 17 6C D6 6C B0 16  .v......i..l.l..
#     0020: 63 D8 4A 2D 75 6C 98 93   B3 33 CA B1 8A 40 9E 83  c.J-ul...3...@..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.202 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:15:58.203 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.203 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:15:58.203 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.203 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:15:58.204 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:15:58.204 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.204 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.207 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 FF 55 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:33.000 UTC",
#       "not  after"         : "2023-12-28 10:15:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 D6 3C 32 8E EB C0 0E   C9 4C DE 12 78 7E BB C2  ..<2.....L..x...
#           0010: 8B 69 62 C8                                        .ib.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 8F 2D 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:27.000 UTC",
#       "not  after"         : "2023-12-28 10:15:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#           0010: B9 E4 0D C4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.233 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D 00 A1 DA 52 9F 0E 05   79 D7 C5 91 FA DA 20 3C  ]...R...y..... <
#     0010: 76 25 F7 C5 66 16 D9 13   6B ED E2 0A BA F4 BB 6E  v%..f...k......n
#     0020: 44 CE 34 C5 BF 27 22 6B   63 94 8F DD 42 F9 39 00  D.4..'"kc...B.9.
#     0030: D1 5B 24 58 92 C6 98 20   CC 02 CD 17 1C 62 05 FD  .[$X... .....b..
#     0040: E6 F7 47 5E B2 39 8F 32   E6 C6 CF 7E BC 5A 47 DE  ..G^.9.2.....ZG.
#     0050: FE A9 C6 AE DA DA A2 55   40 65 CB 04 72 54 20 BD  .......U@e..rT .
#     0060: 52 70 43 B1 17 F6 FA 40   58 AD 81 0F 00 18 CF 0A  RpC....@X.......
#     0070: 78 CE DF FC 4C 98 D4 7F   21 4A 8B A6 CD C6 07 E9  x...L...!J......
#     0080: 8F 72 87 72 11 79 B5 6E   B8 56 F8 29 71 BB 2E 4A  .r.r.y.n.V.)q..J
#     0090: 54 49 4F 14 D7 79 B4 04   CB 39 54 BA F7 C8 55 20  TIO..y...9T...U
#     00A0: 98 92 EE 68 41 D1 76 D1   8F 32 27 9B D3 93 6A EF  ...hA.v..2'...j.
#     00B0: B0 32 2D 37 4B 71 FE A1   BD 63 51 F6 2F 1E FB 48  .2-7Kq...cQ./..H
#     00C0: BC 82 69 60 6B 23 F1 AC   D3 84 DA 9E 08 A4 2F 12  ..i`k#......../.
#     00D0: 3D C8 75 33 95 B1 5C CC   A5 3F 92 91 84 A1 43 34  =.u3..\..?....C4
#     00E0: DD F3 B4 FB 0C 46 5F D0   2B EF EF 3F 20 8D 31 78  .....F_.+..? .1x
#     00F0: 8D 91 AF 9A 59 B5 B9 6A   43 85 16 E5 91 26 3B 39  ....Y..jC....&;9
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.235 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4E 5D 59 21 C1 6A 5A 61   0C F8 57 89 33 C6 A6 B7  N]Y!.jZa..W.3...
#     0010: 51 E2 2A 7A C9 9A 7F EA   DA 8D FD A3 3A 8D 96 C0  Q.*z........:...
#     0020: 68 26 5B 63 B2 DC 49 3B   9B DE 8C A1 D3 B2 6C DA  h&[c..I;......l.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.235 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:15:58.284 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 21 84 9A 06 B4 9B D9 96 CD 69 79 30 7D 12 72 EC 5A D9 77 87 5D 3D 6A D9 67 56 15 72 6F BC 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 10:15:58.565 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 10:15:58.567 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 10:15:59.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 10:15:59.503; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 10:15:59.872; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 10:15:59.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 10:15:59.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-md6m4c/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:59.907 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 FF 55 C6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:33.000 UTC",
#     "not  after"         : "2023-12-28 10:15:33.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 D6 3C 32 8E EB C0 0E   C9 4C DE 12 78 7E BB C2  ..<2.....L..x...
#         0010: 8B 69 62 C8                                        .ib.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:59.911 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 07 E4 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:25.000 UTC",
#     "not  after"         : "2023-12-28 10:15:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 10:15:59.926 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:00.023 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:00.024 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:00.024 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:00.025 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:00.166 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.166 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:00.168 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:00.168 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.174 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.185 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.185 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.185 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:00.187 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "75 AF 5E 7F A8 E9 9F 24 7A 59 70 D1 D0 37 60 7B EC A0 65 4F 6F E9 F9 56 9E 63 C3 A8 17 A2 A7 21",
#   "session id"          : "D2 BE 06 F3 98 48 BD 22 75 F7 00 A9 C0 7A 3A CD DD 9C FB 50 2F D8 67 76 E5 B0 E2 36 F3 9D DD 85",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 65 E9 F4 0F 59 FC 04 B4   D2 6B FD B2 43 4F 1F 65  e...Y....k..CO.e
#             0010: 7A 9F D4 A6 B9 DB 40 83   B0 00 3B 71 6B F7 4F 53  z.....@...;qk.OS
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.295 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4C A5 E3 CE 22 1B CC 3B 72 36 DB 75 BA A0 3C 90 A9 80 93 14 52 30 D6 D4 C3 5B 03 CA 2B A0 04 7D",
#   "session id"          : "D2 BE 06 F3 98 48 BD 22 75 F7 00 A9 C0 7A 3A CD DD 9C FB 50 2F D8 67 76 E5 B0 E2 36 F3 9D DD 85",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 76 C4 0C 89 89 DB C9 47   A4 8D 15 03 B9 1D 58 9D  v......G......X.
#           0010: A1 52 24 D8 DF 5A E7 E6   E2 8A E2 08 91 BD F1 10  .R$..Z..........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.296 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.296 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.297 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.298 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.298 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.300 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.300 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.300 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.301 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.302 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.302 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.309 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.311 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.312 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.315 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.316 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.318 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.318 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.319 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.319 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.320 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.320 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.321 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.323 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 5D F1 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:29.000 UTC",
#       "not  after"         : "2023-12-28 10:15:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 77 B2 84 53 16 69 C2   73 43 43 60 DC 6A 5A 1E  ww..S.i.sCC`.jZ.
#           0010: 78 EA B5 7C                                        x...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.324 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.400 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 8F 2D 55",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 10:15:27.000 UTC",
#     "not  after"         : "2023-12-28 10:15:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#         0010: B9 E4 0D C4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#         0010: 93 40 76 BE                                        .@v.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.404 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 64 71 5D 8E 35 C1 3F ED   02 46 C7 C6 5F 2E 8C 88  dq].5.?..F.._...
#     0010: 5E 45 19 16 5B D8 4A 1B   45 B9 B0 E4 FA 63 FC F8  ^E..[.J.E....c..
#     0020: 6D DB 41 9B 02 80 06 16   BD 40 DA 02 E0 74 96 A7  m.A......@...t..
#     0030: AB 6E 05 5D 9A 69 24 81   B6 CD 16 4B E2 59 82 3A  .n.].i$....K.Y.:
#     0040: E1 7D 0B F8 7E 38 46 D2   27 58 30 7E 80 47 E0 25  .....8F.'X0..G.%
#     0050: AA 5D CB D6 03 D1 EB 89   15 11 35 11 E9 D8 19 3D  .]........5....=
#     0060: 09 EC 4E 25 4B A1 F8 35   34 8D 43 7C EB 7D 5D DC  ..N%K..54.C...].
#     0070: 5D 3C 07 1E DB 20 53 69   72 49 2D 29 56 36 7C 84  ]<... SirI-)V6..
#     0080: E0 0D 24 90 D5 53 D4 49   6F F6 0F C4 20 E3 9B CB  ..$..S.Io... ...
#     0090: 8C 2E 30 CC 35 A8 B5 29   81 FE E6 5F 93 A1 D4 F5  ..0.5..)..._....
#     00A0: 33 C3 FF 6E 15 F1 FF 42   01 FE AC CA F2 F6 A6 08  3..n...B........
#     00B0: C2 2F 58 04 0B EA 69 9D   84 81 81 8D 2A 95 A4 51  ./X...i.....*..Q
#     00C0: DD F2 55 41 1A 22 99 F3   26 D9 75 BD 66 C9 C7 BE  ..UA."..&.u.f...
#     00D0: AF 68 F1 FC 4F 85 4B 14   2F C8 1E C3 9B 95 ED 3F  .h..O.K./......?
#     00E0: 96 89 D2 C9 CC B1 1A E4   F2 36 38 E7 32 4B D5 5B  .........68.2K.[
#     00F0: 4E A4 5F 30 18 87 73 A0   51 95 D0 E0 4A 80 DE 0A  N._0..s.Q...J...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.406 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 F2 9E B7 0F 97 DF 94   BA 27 B1 50 C9 1D 0A D7  v........'.P....
#     0010: BF E5 1F CE 0E FD B2 BC   E4 94 C0 A0 24 35 59 36  ............$5Y6
#     0020: 31 AA 15 50 27 C2 6E 29   58 FD CA 82 B9 83 C6 3B  1..P'.n)X......;
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.409 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:16:00.410 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.410 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:16:00.411 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.411 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 10:16:00.411 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:00.411 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.412 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.414 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 FF 55 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:33.000 UTC",
#       "not  after"         : "2023-12-28 10:15:33.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 D6 3C 32 8E EB C0 0E   C9 4C DE 12 78 7E BB C2  ..<2.....L..x...
#           0010: 8B 69 62 C8                                        .ib.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 8F 2D 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:27.000 UTC",
#       "not  after"         : "2023-12-28 10:15:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#           0010: B9 E4 0D C4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.438 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 D4 0C D1 C1 9A 24 CD   89 B8 9B 48 BB BC 06 BB  5.....$....H....
#     0010: DF C3 94 B7 A2 62 A3 1E   8E 58 4D FF DD E6 4B 9B  .....b...XM...K.
#     0020: 0B 22 7C C5 C0 6A 44 E5   A6 20 8E F8 17 C4 13 D2  ."...jD.. ......
#     0030: 37 2F D8 98 DD 78 6D 52   B3 50 11 0A 1A 9B 30 DA  7/...xmR.P....0.
#     0040: 27 4C 65 06 74 93 CC AF   F2 97 FC 02 8D D5 DD 60  'Le.t..........`
#     0050: 1D 7A F7 D0 4C 85 57 84   8D 16 D7 EB A8 40 6A E3  .z..L.W......@j.
#     0060: E4 3F 3C 63 CF 70 1E 36   83 2B 74 EB 91 F5 CF 7F  .?<c.p.6.+t.....
#     0070: 9C B4 90 34 BB 4F 27 44   F3 32 E9 E4 E1 2D 8F AB  ...4.O'D.2...-..
#     0080: 2B 9B BA F8 D7 BA 1F 48   29 88 4C 85 BB 65 A4 E7  +......H).L..e..
#     0090: 2B B7 9F E1 BC EE C3 57   BB 1F F5 97 1E 4F EA 47  +......W.....O.G
#     00A0: 4B 05 B8 26 82 DA DB 18   D1 66 C5 2C A8 04 7E 31  K..&.....f.,...1
#     00B0: 75 19 E3 DF 12 73 4A 93   20 60 90 59 9A 61 CB E2  u....sJ. `.Y.a..
#     00C0: 2B F1 B3 61 9A 94 2A 57   FE C6 18 F1 64 C5 6E 1F  +..a..*W....d.n.
#     00D0: 02 C8 9A AC EE DB BD 04   50 DE C0 0A B7 56 02 BF  ........P....V..
#     00E0: A0 DB 05 3A 39 C2 D6 51   DB 2C 92 72 73 A1 A0 16  ...:9..Q.,.rs...
#     00F0: CF 8E 51 72 96 9C CC 75   B1 2B 0B 3F 3B 38 8D 5F  ..Qr...u.+.?;8._
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.440 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4C FB 44 A5 14 93 51 C2   D1 86 79 7D 1D E4 E6 11  L.D...Q...y.....
#     0010: E3 1F F8 93 DF 77 1D CA   6A AC 77 C8 83 A8 C3 3B  .....w..j.w....;
#     0020: 3C D8 24 DB D7 0B 9F 62   0D 4E 18 27 97 FC F4 FB  <.$....b.N.'....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.440 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:00.492 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1B 8A 1A 52 BD 13 D2 96 BC 1E 65 D3 2F 18 F3 D6 42 DA C2 D3 15 7B 36 80 B8 BC 98 4D 51 E6 35 A8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 10:16:00.792 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 10:16:00.793 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 10:16:11.524; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 10:16:11.848 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 07 E4 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:25.000 UTC",
#       "not  after"         : "2023-12-28 10:15:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#           0010: B9 E4 0D C4                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 8F 2D 55",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 10:15:27.000 UTC",
#       "not  after"         : "2023-12-28 10:15:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 0E 71 B5 8A 74 3D 1B   D2 93 10 6A 49 EB 0B 42  ..q..t=....jI..B
#           0010: B9 E4 0D C4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 89 3E 79 78 2D 79 DB 87   AD E0 25 65 CD A6 C0 87  .>yx-y....%e....
#           0010: 93 40 76 BE                                        .@v.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 10:16:11.863 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:11.961 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:11.961 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:11.961 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:16:11.962 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:12.099 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.099 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:12.100 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 10:16:12.101 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.117 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 10:16:12.119 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "4F 19 EA 54 85 40 2F FE CD 05 A3 01 5B 77 76 DE 4D CF C0 F3 DA EA A0 9E 89 5F 4C 83 EE 36 4B 94",
#     "session id"          : "E8 0D 51 75 84 8D C2 A4 92 A3 D2 8D A5 A5 5F 90 2B 8C 5A F3 F0 4E 97 53 92 C9 90 39 DC 7F B0 F7",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 42 B7 E9 B0 82 16 D1 43   E8 8A 33 DB 9F 3A B4 A2  B......C..3..:..
#               0010: B9 CE FB 6A 74 3F AA EB   5C 55 53 48 4E 89 E9 78  ...jt?..\USHN..x
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.139 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CD 62 51 F5 A7 37 BB 59 6E BA 47 3B F5 FE 11 21 65 8D 2D B9 A0 FF 83 36 0B BF 7C AF 4D 58 45 2F",
#     "session id"          : "E8 0D 51 75 84 8D C2 A4 92 A3 D2 8D A5 A5 5F 90 2B 8C 5A F3 F0 4E 97 53 92 C9 90 39 DC 7F B0 F7",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6A 6C 54 DA C0 EC 35 AE   82 4A AB 4E D0 4A 66 91  jlT...5..J.N.Jf.
#             0010: CE 1C 22 A3 1C EC B3 40   FC 55 E5 46 BC 65 C9 00  .."....@.U.F.e..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.139 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.140 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.140 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.141 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.143 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.145 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.154 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.155 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.158 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:16:12.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 10:16:12.161 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 10:17:31.706 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:17:31.750 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:17:31.750 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:17:31.750 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 10:17:31.751 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41926/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28098ms
ok 65 stop command for single port in 31373ms
ok 66 status detects locally running solr in 14687ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2181ms
ok 69 copying files around in 6589ms
ok 70 upconfig in 2629ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1234ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 57s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m20s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5571 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5571/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45557/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 08:12:55.448; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 08:12:55.454; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 08:12:56.358; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 08:12:56.399; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22255ms
ok 61 start solr with client truststore and security manager in 25200ms
not ok 62 start solr with mTLS needed in 56317ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-C74cQN/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45557.
#
# Started Solr server on port 45557 (pid=200479). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 45558.
#
# Started Solr server on port 45558 (pid=200906). Happy searching!
#
# INFO  - 2023-09-29 08:14:18.673; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 08:14:18.679; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 08:14:19.044; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 08:14:19.046; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 08:14:19.047; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.081 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 45 25 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:54.000 UTC",
#     "not  after"         : "2023-12-28 08:13:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 74 D4 D0 B4 B1 00 DE   B8 80 30 32 02 7A ED 4C  .t........02.z.L
#         0010: 7E 3D 00 0D                                        .=..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.086 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 54 E6 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:46.000 UTC",
#     "not  after"         : "2023-12-28 08:13:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:19.103 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.203 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:19.204 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.354 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.357 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:19.357 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.363 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:19.379 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "21 25 D7 DA 38 87 3F 57 B0 3F 9B 8C 74 93 D9 0D BD 35 85 28 16 FD 43 9B E7 9C CD DA 14 2D A5 77",
#   "session id"          : "CF 8D 23 B3 D1 30 25 E5 1E 9C C1 5A 90 1F E7 92 53 6C C1 6F 1A 72 D6 C4 B7 5E 8B B9 80 D3 19 F4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AA 81 67 7B 3C 80 26 1D   7A C4 30 C9 AB 3D 25 F9  ..g.<.&.z.0..=%.
#             0010: 7D 95 24 D3 E5 B8 D7 52   DE C0 B6 FA 99 73 55 45  ..$....R.....sUE
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9A F0 78 D2 27 46 96 82 0E 32 BA 21 ED C2 54 52 E9 7A 8E 40 99 44 52 B9 2B 93 37 41 5E B8 3F 67",
#   "session id"          : "CF 8D 23 B3 D1 30 25 E5 1E 9C C1 5A 90 1F E7 92 53 6C C1 6F 1A 72 D6 C4 B7 5E 8B B9 80 D3 19 F4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 65 D6 7F 0E 54 0A CA 5C   F8 44 77 FA 50 CA A6 A0  e...T..\.Dw.P...
#           0010: 7D AF BE 96 5A 37 5E D0   C0 CD 3B 67 E1 57 0E 71  ....Z7^...;g.W.q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.492 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.493 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.493 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.494 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.496 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.497 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.498 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.506 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.507 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.508 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.512 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.513 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.514 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.515 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.515 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.516 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.516 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.517 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.517 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.520 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 F1 16 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:51.000 UTC",
#       "not  after"         : "2023-12-28 08:13:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 11 98 B2 45 A3 AC 43   8C 02 14 72 DF D0 FA 99  ....E..C...r....
#           0010: 73 E4 AE FC                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.520 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.604 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.608 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 8D 25 ED FA 10 2D 2D   C9 C1 B6 9F 00 80 A2 22  2.%...--......."
#     0010: 64 07 34 FD 18 D0 7F 4B   FC 6C E1 36 5B C5 1B 6B  d.4....K.l.6[..k
#     0020: 45 7E 10 96 02 7D FA 47   5F E8 DA 8A 27 2F E0 16  E......G_...'/..
#     0030: B3 CA 37 D7 55 37 77 6F   8C DF EB CC 46 D0 5C B8  ..7.U7wo....F.\.
#     0040: 46 AC 84 77 50 2E 7C 59   25 83 0C 8A A4 FF 89 FC  F..wP..Y%.......
#     0050: 91 96 9F AD 2E 64 15 01   4B 0D 0F B2 8F 2F 8E 3D  .....d..K..../.=
#     0060: 8D 8E 15 4F B0 C1 18 B8   76 0C 5F A9 C2 7E 40 64  ...O....v._...@d
#     0070: 6E 28 90 14 15 82 17 84   B5 C7 EC FE 99 C5 F6 51  n(.............Q
#     0080: 48 B5 DB 40 46 8E 1B A0   72 A4 7D 6B 2D 3F 75 5E  H..@F...r..k-?u^
#     0090: FA 0B A3 5F 99 31 7D 6E   5E 5A F7 5C 0B 4F 84 6A  ..._.1.n^Z.\.O.j
#     00A0: 26 07 85 30 29 53 2A D7   5F 53 EC C6 1D 6C 55 EB  &..0)S*._S...lU.
#     00B0: CB 82 57 A1 2D 80 9F 02   C1 61 CB 46 BA 43 41 F7  ..W.-....a.F.CA.
#     00C0: 8E 44 04 15 D8 AE 13 18   9A 7B 9D AE 98 70 00 F7  .D...........p..
#     00D0: 51 D4 2D B6 E6 EA AF CE   B8 0B FD 2D 4C 1D 70 8A  Q.-........-L.p.
#     00E0: BD 84 CC 01 CA 4B 91 2F   68 91 E0 7A 39 F3 50 31  .....K./h..z9.P1
#     00F0: 75 E1 90 BE 9D C7 9B 6B   15 14 54 62 E7 83 53 87  u......k..Tb..S.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.610 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC A4 E1 7F FF 48 10 6A   33 78 2B 16 37 B0 B7 44  .....H.j3x+.7..D
#     0010: 66 2C C0 9A D6 39 79 22   04 E4 0F 8D 76 DA 3D E2  f,...9y"....v.=.
#     0020: 41 DD FC 5D A1 B3 83 0C   7F F4 68 7A A8 97 9A 20  A..]......hz...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:19.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:19.615 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.615 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.617 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 45 25 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:54.000 UTC",
#       "not  after"         : "2023-12-28 08:13:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 74 D4 D0 B4 B1 00 DE   B8 80 30 32 02 7A ED 4C  .t........02.z.L
#           0010: 7E 3D 00 0D                                        .=..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 5C BF 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:48.000 UTC",
#       "not  after"         : "2023-12-28 08:13:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#           0010: 0A 14 81 CA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.642 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 68 4A E5 AE F6 71 12 D3   18 86 86 9E 3A 4A 27 49  hJ...q......:J'I
#     0010: 72 F9 B2 C6 ED 69 0B 86   C9 DB E7 4E 50 00 D5 0C  r....i.....NP...
#     0020: 1E AF 23 22 6B AE C1 DF   99 DE B7 3F 30 4F 60 15  ..#"k......?0O`.
#     0030: 4C 1E 33 08 8B 25 80 51   E0 63 DB FA DF 60 C5 96  L.3..%.Q.c...`..
#     0040: 4D E2 51 D7 DD C7 84 0E   9C 3D 15 75 A1 84 AD F7  M.Q......=.u....
#     0050: 09 8F 65 B9 12 A2 DB CC   C8 A0 21 1A 1C 2C C4 44  ..e.......!..,.D
#     0060: 7A DC E3 7E 88 DC CA 0C   4F 61 B7 DF FA EA 96 78  z.......Oa.....x
#     0070: 76 8B 4F 61 7E AE 96 9C   6C 02 77 88 AA 67 F3 01  v.Oa....l.w..g..
#     0080: C0 F0 91 A7 B5 4D 9D 52   92 3B 6C EA D3 99 2D 9A  .....M.R.;l...-.
#     0090: 2F 8A D4 01 A7 BD 74 7C   F5 EB 7A 8B 97 DC 45 49  /.....t...z...EI
#     00A0: B8 EC 0E 29 D1 41 2E 2A   75 AB 9A F2 D9 7C 38 1B  ...).A.*u.....8.
#     00B0: 9F 9D 83 29 63 7D B7 16   37 74 65 C8 82 F3 4B 0B  ...)c...7te...K.
#     00C0: DB A5 C5 1A 4E 4B CF 1A   41 94 06 BF 21 61 CF 9D  ....NK..A...!a..
#     00D0: BF A1 9D C2 2C 9A DD 11   56 E8 E7 29 7D 6B 3E BD  ....,...V..).k>.
#     00E0: 28 92 84 00 10 99 72 6D   27 B7 3E 29 6C 23 5F 5E  (.....rm'.>)l#_^
#     00F0: 53 D8 D6 D0 2B E2 49 70   72 B1 61 9B 88 09 F1 24  S...+.Ipr.a....$
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.643 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 75 23 0A 99 F2 91 AE 62   8D A6 F3 D3 72 68 45 60  u#.....b....rhE`
#     0010: 88 EE CD 0D 33 36 47 E6   F8 64 FA FD 0F 04 CC 39  ....36G..d.....9
#     0020: 65 2B 54 2D D5 C4 AC 35   AB 53 30 D3 92 7C 6E 11  e+T-...5.S0...n.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.644 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:19.694 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 58 AC BC 80 6B 97 3B 8B CE 73 E4 3E 4F 8B F9 C3 2B 11 1E A9 E4 74 DF FE 5C 09 9D EE 31 F3 2B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 08:14:19.960 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 08:14:19.961 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 08:14:20.913; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 08:14:20.919; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 08:14:21.288; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 08:14:21.291; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 08:14:21.292; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-C74cQN/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.323 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 45 25 39",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:54.000 UTC",
#     "not  after"         : "2023-12-28 08:13:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 74 D4 D0 B4 B1 00 DE   B8 80 30 32 02 7A ED 4C  .t........02.z.L
#         0010: 7E 3D 00 0D                                        .=..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.327 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "06 54 E6 0F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:46.000 UTC",
#     "not  after"         : "2023-12-28 08:13:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:21.341 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.695 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.697 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:14:21.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.847 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.848 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.849 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:21.849 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.855 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.866 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.867 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.867 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:21.869 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "76 E3 20 6F C1 E6 63 2A C4 56 76 D4 FA 8D 4C 54 78 8B 3B 9F A9 EE 55 A9 59 38 A5 A7 52 20 1D 4D",
#   "session id"          : "56 95 95 CF F3 5D B1 BB E8 A0 6C 95 76 A8 BD C2 E6 9A 5B DA DB 5E CC EA D3 F0 37 C6 7A 1E 74 F6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D7 7B 39 EA 39 C8 93 80   76 51 5F 73 3D E8 0E C3  ..9.9...vQ_s=...
#             0010: C1 9B 02 C4 87 80 B7 12   00 34 B4 85 BA 76 4E 10  .........4...vN.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.975 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F F4 36 9A B9 CB C6 E4 66 01 94 D4 9A A0 D5 95 0E A3 5B 82 A1 49 92 EE 71 44 22 70 C9 A1 94 95",
#   "session id"          : "56 95 95 CF F3 5D B1 BB E8 A0 6C 95 76 A8 BD C2 E6 9A 5B DA DB 5E CC EA D3 F0 37 C6 7A 1E 74 F6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 66 58 CC D1 A7 6B 82 BE   6D 81 93 CF FE 37 34 9D  fX...k..m....74.
#           0010: 51 0D 12 EA DE B2 07 07   E9 A0 D7 6A 9A BE 07 7A  Q..........j...z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.975 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.976 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.977 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.978 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.978 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.980 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.981 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.989 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.991 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.992 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.995 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:21.997 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.998 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:21.999 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.000 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.001 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.003 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 F1 16 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:51.000 UTC",
#       "not  after"         : "2023-12-28 08:13:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE 11 98 B2 45 A3 AC 43   8C 02 14 72 DF D0 FA 99  ....E..C...r....
#           0010: 73 E4 AE FC                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.004 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.112 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 5C BF 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 08:13:48.000 UTC",
#     "not  after"         : "2023-12-28 08:13:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#         0010: 0A 14 81 CA                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#         0010: CA 05 1C 9B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.116 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 25 E3 C7 9E B2 50 B8   96 C0 D3 DF EC 5B D6 3B  _%....P......[.;
#     0010: 0F 93 32 EC 8D 93 FD 13   D3 44 BE F8 F0 82 AA 81  ..2......D......
#     0020: BE 8A 63 A4 2B D2 2E DE   4B 51 EA E9 1E 42 D4 FC  ..c.+...KQ...B..
#     0030: 2C 8D E9 91 12 43 B4 00   73 EF CE 2A F6 D9 C1 3C  ,....C..s..*...<
#     0040: 33 BD D4 63 22 A7 2C 72   A7 13 B0 ED 73 A7 E1 64  3..c".,r....s..d
#     0050: 30 03 C1 67 B4 88 2B 17   38 E7 D5 BB BA E3 BA E1  0..g..+.8.......
#     0060: 4E 41 AF 6C 0F 83 7E B9   33 19 2C 0E 97 F6 33 3D  NA.l....3.,...3=
#     0070: 9B D1 27 C8 63 5B E5 36   3B 6C 8F C7 76 F5 9D 29  ..'.c[.6;l..v..)
#     0080: 84 57 E5 49 40 C2 5E 07   D9 76 A1 52 76 5B 0E 7C  .W.I@.^..v.Rv[..
#     0090: C4 BD 29 B7 1E 76 FE B6   AB C7 29 DE BE 75 14 4E  ..)..v....)..u.N
#     00A0: EF 7D 92 4D 80 0E F2 AB   31 12 9F 1D D7 0B C3 BC  ...M....1.......
#     00B0: 9D 14 5B C7 4F 57 A9 6C   C0 E0 5E FE 0B D5 AD 2F  ..[.OW.l..^..../
#     00C0: A1 A5 4F 8D 78 0E 39 D2   6F 7E F5 CB 7D 07 48 4A  ..O.x.9.o.....HJ
#     00D0: 42 16 EC 61 89 7A 19 C0   6E 9B 8F 77 2D 0A 47 16  B..a.z..n..w-.G.
#     00E0: DB 50 55 91 34 2C AB BB   29 F9 EF 6B 58 D0 F4 87  .PU.4,..)..kX...
#     00F0: 41 E0 12 AC 26 DD BD C6   C7 68 A7 4A DE 4B 73 5D  A...&....h.J.Ks]
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.117 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CB 5C 5B 58 F6 2B 05 9D   9C 16 20 A1 1D 44 69 E2  .\[X.+.... ..Di.
#     0010: 51 5F E2 C6 F7 E9 EB C3   36 2B 35 77 7C 56 1A 4A  Q_......6+5w.V.J
#     0020: CE 8E 4E 3B 94 D7 42 DA   28 1F CA E7 EF 97 75 89  ..N;..B.(.....u.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.120 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.121 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.122 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.125 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 45 25 39",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:54.000 UTC",
#       "not  after"         : "2023-12-28 08:13:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 74 D4 D0 B4 B1 00 DE   B8 80 30 32 02 7A ED 4C  .t........02.z.L
#           0010: 7E 3D 00 0D                                        .=..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 5C BF 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:48.000 UTC",
#       "not  after"         : "2023-12-28 08:13:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#           0010: 0A 14 81 CA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.151 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 B9 BC 9C CC 09 28 4D   3B A8 65 03 4D 2D 03 80  2.....(M;.e.M-..
#     0010: A0 B8 B4 C5 A3 DE EE 4C   04 EE 84 3C F3 91 78 1F  .......L...<..x.
#     0020: 04 33 9B D3 14 DC 9C 16   F6 D8 FA 2B 45 8E 6F 75  .3.........+E.ou
#     0030: B9 05 A8 92 03 B5 A9 B4   E4 ED 52 72 44 51 58 93  ..........RrDQX.
#     0040: 2F 8F D0 6A 3F 44 38 64   F7 A4 07 5E 63 04 7D 40  /..j?D8d...^c..@
#     0050: B6 D2 5F 33 34 D9 06 22   4B 42 0F 36 DE 1B 34 BC  .._34.."KB.6..4.
#     0060: 88 98 25 49 4D 7D D6 B8   96 1B AF DD 59 D7 90 0F  ..%IM.......Y...
#     0070: FA 25 F3 BA AF 27 97 38   11 90 79 15 1B 72 D5 F1  .%...'.8..y..r..
#     0080: C7 F4 9F C5 8B D0 FC 03   E4 6B 50 03 D4 33 A6 3E  .........kP..3.>
#     0090: 17 8B C0 CA BE 6C 6A 62   05 EA 2F 23 A3 4B 7A E8  .....ljb../#.Kz.
#     00A0: BC FB B2 FD A6 69 C8 8A   63 F5 7F 9F 54 BA 55 BC  .....i..c...T.U.
#     00B0: 55 44 A5 0D B7 FC A7 47   98 FD 82 56 3E E7 B6 0C  UD.....G...V>...
#     00C0: C8 1A 18 41 AB 38 15 BB   F6 E6 EC 95 63 6B 72 8C  ...A.8......ckr.
#     00D0: A3 9A 8B 43 7C 0A CB 00   C5 58 2F E7 45 91 21 5A  ...C.....X/.E.!Z
#     00E0: A4 86 E9 7E 7D 03 A9 15   62 90 13 73 2A 90 C4 62  ........b..s*..b
#     00F0: 50 99 A4 5E 06 7F F2 8B   E2 8D F2 A8 44 56 7B B8  P..^........DV..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.153 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9D D8 06 CB FB 0F DF BD   FE 42 A9 B0 96 A6 CC 11  .........B......
#     0010: 84 46 13 37 83 A0 97 FB   8A 4E CC A0 69 AC 3C 43  .F.7.....N..i.<C
#     0020: 8D CB C4 67 68 37 75 21   FD CD A0 86 8B BA 44 26  ...gh7u!......D&
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.153 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:22.202 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "41 0B 03 A6 29 37 BA F9 C2 3D D3 CE 28 35 D0 1D 91 C3 99 2D AF 16 EA EA 42 78 69 8B 4C 50 AB 7D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 08:14:22.517 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 08:14:22.518 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 08:14:33.447; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:33.767 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 54 E6 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:46.000 UTC",
#       "not  after"         : "2023-12-28 08:13:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#           0010: 0A 14 81 CA                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 5C BF 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 08:13:48.000 UTC",
#       "not  after"         : "2023-12-28 08:13:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 92 BF 67 25 AA DC 11   DB B9 F7 2F B5 6A 8C 8B  ...g%....../.j..
#           0010: 0A 14 81 CA                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 BC 2D 8E 50 0D DC 51   02 B4 41 B6 7B CD A6 CC  f.-.P..Q..A.....
#           0010: CA 05 1C 9B                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 08:14:33.781 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.008 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.010 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 08:14:34.010 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.026 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 08:14:34.029 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AA E5 A1 0F 9C B1 AA F6 29 CF 52 E6 BE C0 65 78 08 C5 F2 B4 50 32 62 2D 6B DE 64 4C 54 63 B1 FC",
#     "session id"          : "A6 3B 26 DD 6C B3 26 B8 69 A7 77 BA 6E 2A 5B AF 41 61 EC 23 B6 6F 0C FC F6 98 38 73 4F 7E C9 D7",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CC 8C E0 4A 1B 78 DD C8   81 FF F2 BF 18 22 47 F4  ...J.x......."G.
#               0010: 0D C7 E8 BE 41 A1 D1 4D   E9 FA 22 49 8C B7 2D 36  ....A..M.."I..-6
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.048 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "2B F0 0D FC 87 C9 30 1F A3 0F 7F 78 12 D3 81 6D B9 58 AC 54 13 EF B0 11 AB D8 9A 29 06 08 37 02",
#     "session id"          : "A6 3B 26 DD 6C B3 26 B8 69 A7 77 BA 6E 2A 5B AF 41 61 EC 23 B6 6F 0C FC F6 98 38 73 4F 7E C9 D7",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E9 81 1A 77 E6 D9 F9 ED   43 89 47 94 63 8C 6C 4B  ...w....C.G.c.lK
#             0010: BA CA 43 4B 55 D4 FF F3   D2 E0 CA 2B 34 D5 FD 58  ..CKU......+4..X
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.049 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.049 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.053 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.062 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.064 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.065 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.069 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:14:34.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 08:14:34.071 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certific

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 08:15:53.398 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.445 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.445 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.446 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 08:15:53.446 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45558/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28441ms
ok 65 stop command for single port in 31224ms
ok 66 status detects locally running solr in 14627ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2163ms
ok 69 copying files around in 6624ms
ok 70 upconfig in 2633ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1217ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 55s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m17.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5570 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5570/

All tests passed

Build Log:
[...truncated 1318 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44257/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-29 06:10:47.687; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 06:10:47.692; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-29 06:10:48.937; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-29 06:10:48.982; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23343ms
ok 61 start solr with client truststore and security manager in 24857ms
not ok 62 start solr with mTLS needed in 56759ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-NbCHMZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44257.
#
# Started Solr server on port 44257 (pid=199178). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44258.
#
# Started Solr server on port 44258 (pid=199604). Happy searching!
#
# INFO  - 2023-09-29 06:12:12.319; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 06:12:12.326; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 06:12:12.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 06:12:12.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 06:12:12.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:12.741 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 73 EA F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:48.000 UTC",
#     "not  after"         : "2023-12-28 06:11:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 93 F8 AE 55 FA 64 3A   5A D3 EB 9D 02 F7 26 51  ....U.d:Z.....&Q
#         0010: ED 8C A9 36                                        ...6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:12.745 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A D0 38 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:40.000 UTC",
#     "not  after"         : "2023-12-28 06:11:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:12.760 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:12.991 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:12.992 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:12.993 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:12.994 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:12.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:13.011 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:13.011 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:13.011 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:13.013 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0C C2 9E 41 1B 3A 12 14 2C FF BC 65 17 37 1F 6F B0 EA A4 E8 92 D1 F5 A2 7F A9 64 8C FD 2E FC AC",
#   "session id"          : "4F 8E 14 DE CE 87 AA EC 9C F3 C4 CA 5D AE 11 AF A7 45 64 8B 74 2A 11 4B FD E5 60 96 0A 0A 0A A8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E1 C9 22 9B E2 E9 6E 92   31 74 0F C3 A2 AF AE 75  .."...n.1t.....u
#             0010: FD 3D 8D 86 AC 3F 7E 98   41 99 B2 FA E4 3B 01 20  .=...?..A....;.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.123 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5E 72 B2 31 90 59 DD C3 C8 36 C8 F8 5A E4 84 47 0F C5 81 82 76 05 AD C6 0C 9C 8F 1A 81 E1 F7 6F",
#   "session id"          : "4F 8E 14 DE CE 87 AA EC 9C F3 C4 CA 5D AE 11 AF A7 45 64 8B 74 2A 11 4B FD E5 60 96 0A 0A 0A A8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FC 68 12 60 68 D0 D5 88   43 3F B7 96 56 98 0A 61  .h.`h...C?..V..a
#           0010: B6 56 D9 FB 25 66 12 2C   84 4E BF F4 AC 42 FF 2F  .V..%f.,.N...B./
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.124 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.124 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.125 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.126 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.127 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.128 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.130 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.137 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.139 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.140 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.143 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.144 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.146 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.146 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.147 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.147 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.148 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.148 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.148 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.151 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 24 0E 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:44.000 UTC",
#       "not  after"         : "2023-12-28 06:11:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA B7 93 91 98 1B EB 61   8C D6 3E 8B E1 65 D7 22  .......a..>..e."
#           0010: 08 25 83 C5                                        .%..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.151 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:13.206 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:13.206 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:13.206 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:13.207 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.229 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.233 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 58 F7 42 2D CA 6E AC   95 51 2F E8 C5 6A 3E CB  .X.B-.n..Q/..j>.
#     0010: 93 3C C9 24 EA BC 14 6E   96 31 91 A4 63 E8 4C 2F  .<.$...n.1..c.L/
#     0020: 36 3D 2B 88 11 52 26 DF   4B BA 04 6C A5 B6 E4 37  6=+..R&.K..l...7
#     0030: 06 73 B5 9F 5D E5 5E 3C   81 36 3C 4B 0F 44 69 E5  .s..].^<.6<K.Di.
#     0040: 80 4F FD E1 A3 23 0B EF   80 82 C4 C9 B9 CD A8 14  .O...#..........
#     0050: 1F 32 93 B5 C6 3E D8 7A   3C 55 75 F3 04 0C 64 DA  .2...>.z<Uu...d.
#     0060: 70 A7 82 50 81 E4 18 25   61 CF FA 87 4C E9 8E 16  p..P...%a...L...
#     0070: 6C B2 16 84 47 10 73 AC   21 48 CB C4 58 B2 CA 79  l...G.s.!H..X..y
#     0080: D2 06 54 A9 66 C1 36 BB   E2 BB DD B6 75 BD 2D C6  ..T.f.6.....u.-.
#     0090: 2A DA C4 DB 6D F0 28 E2   98 79 38 44 3C B0 D6 4C  *...m.(..y8D<..L
#     00A0: 95 EA A8 0A D1 88 C4 B1   2E 19 5E 97 3B E2 A6 E3  ..........^.;...
#     00B0: DE E5 E2 DA A7 E2 33 10   F5 DD 05 40 B7 27 EA A7  ......3....@.'..
#     00C0: 5C D9 38 E0 F4 95 68 89   F3 9B 9E 19 36 C6 28 DD  \.8...h.....6.(.
#     00D0: 41 36 D7 09 AE DE 8D F1   06 55 C1 10 6B 9B 46 77  A6.......U..k.Fw
#     00E0: C4 E5 79 51 33 01 E8 31   1E 24 5B 75 5A 82 DB 2A  ..yQ3..1.$[uZ..*
#     00F0: BB C7 EC 33 75 D7 E6 B4   BA C3 FE 3D AE D9 28 38  ...3u......=..(8
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.234 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 25 65 37 95 37 39 65   F4 02 0F C5 D7 17 AD 01  y%e7.79e........
#     0010: F9 37 2E 16 92 65 C4 32   BC 8E 11 35 93 E2 A2 9B  .7...e.2...5....
#     0020: 1C 6F 3A D6 21 F8 4D 10   2C E7 7C 9E 68 E0 16 58  .o:.!.M.,...h..X
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.237 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:13.238 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.238 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:13.239 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.239 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:13.239 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:13.239 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.239 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.242 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 73 EA F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:48.000 UTC",
#       "not  after"         : "2023-12-28 06:11:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 93 F8 AE 55 FA 64 3A   5A D3 EB 9D 02 F7 26 51  ....U.d:Z.....&Q
#           0010: ED 8C A9 36                                        ...6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B BC 01 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:42.000 UTC",
#       "not  after"         : "2023-12-28 06:11:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#           0010: 88 B8 FE 28                                        ...(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.266 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 DC F3 21 50 6A 4F 52   4E E9 FB 82 A8 DF A1 7D  ...!PjORN.......
#     0010: E3 79 D1 D8 3E E5 63 C9   3E FD 95 3A 57 16 AF 06  .y..>.c.>..:W...
#     0020: 11 24 E1 F9 79 7E A3 91   93 97 D1 1B 14 6F ED F0  .$..y........o..
#     0030: 56 AF 44 E2 7C 21 B0 31   0C C7 5F 42 55 85 69 4C  V.D..!.1.._BU.iL
#     0040: 10 6A 5A 8D BF 16 FD 4E   95 F1 36 F4 6F 58 E8 E3  .jZ....N..6.oX..
#     0050: 37 C1 CF 28 6D 21 B8 13   24 07 29 71 3E 14 85 70  7..(m!..$.)q>..p
#     0060: 9C CD 11 27 20 7A 90 E3   26 7A FF 53 AF 76 B1 EC  ...' z..&z.S.v..
#     0070: DA 2D 53 26 55 D3 8A 9C   68 69 BE 4F A9 FD B7 DF  .-S&U...hi.O....
#     0080: EC B0 CA DA DF 22 45 6B   A8 40 52 CB 2B E5 CD 44  ....."Ek.@R.+..D
#     0090: 3A A3 09 3F 85 C0 8B 98   17 84 AB C3 73 FB E2 FF  :..?........s...
#     00A0: 24 E3 D6 89 48 EA 1B BF   A8 67 1F 56 31 B8 3F 1E  $...H....g.V1.?.
#     00B0: 3C 50 B7 8E 16 67 CC 4D   0E A7 48 58 8F 89 EE DA  <P...g.M..HX....
#     00C0: 19 CE C6 E6 BF 75 C6 A3   4C 83 B2 8A FC F2 24 23  .....u..L.....$#
#     00D0: EA 43 61 FD E2 47 A3 AD   02 1F 02 C5 D9 B6 E9 93  .Ca..G..........
#     00E0: 6B D2 39 80 17 C4 84 45   2A A2 11 FC 54 B7 4D 3C  k.9....E*...T.M<
#     00F0: 31 CE 25 08 BA A2 64 7D   89 A2 45 E3 1E 17 D2 9D  1.%...d...E.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.268 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 EA E3 D9 05 1E 52 60   B0 C7 60 06 F4 3F 8D 2E  0.....R`..`..?..
#     0010: D6 4E 23 6B B1 E6 DD 37   C1 CF FD C0 48 DB 6A 5E  .N#k...7....H.j^
#     0020: AE F7 95 43 16 F4 2F A7   DF B2 E7 97 EC BC E1 B9  ...C../.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.268 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:13.315 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "34 A2 92 2A 77 B4 C4 A9 68 84 72 B2 6F 5A 89 E9 20 6B 3E 36 E4 84 50 0B F9 AA D5 51 29 9F 7D 09",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 06:12:13.602 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 06:12:13.604 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-29 06:12:14.555; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-29 06:12:14.561; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-29 06:12:14.926; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 06:12:14.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-29 06:12:14.929; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NbCHMZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:14.963 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 73 EA F1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:48.000 UTC",
#     "not  after"         : "2023-12-28 06:11:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 93 F8 AE 55 FA 64 3A   5A D3 EB 9D 02 F7 26 51  ....U.d:Z.....&Q
#         0010: ED 8C A9 36                                        ...6
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:14.968 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A D0 38 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:40.000 UTC",
#     "not  after"         : "2023-12-28 06:11:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:14.984 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:15.214 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:15.216 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:15.217 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.222 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.233 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.234 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.234 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:15.236 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "08 0E E5 B8 AB 24 FD 71 1C 80 2F 6B 70 C8 58 CF EA AC 5B 42 41 D6 C7 8C 3D 0E 39 CF C6 4F 1E B0",
#   "session id"          : "9C 5A 95 4B 0A 71 18 52 1E 00 21 2A 6B 43 85 80 28 3D CF 75 2D BC 8B D8 C2 74 48 57 52 C4 61 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1A 03 0D 09 70 21 5D 36   E9 F6 88 4B 8D 46 AD 3B  ....p!]6...K.F.;
#             0010: 80 BD 69 6D 8E 97 DE 4B   F0 AD 00 86 4C 59 BA 05  ..im...K....LY..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.352 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "56 05 0B 4B 7B 6B 44 9F 9A 17 41 50 88 3E 2F 77 86 3E E0 E4 47 2E 22 A8 F2 94 8A 95 A8 BE 8D F5",
#   "session id"          : "9C 5A 95 4B 0A 71 18 52 1E 00 21 2A 6B 43 85 80 28 3D CF 75 2D BC 8B D8 C2 74 48 57 52 C4 61 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 18 AC E6 06 C3 A3 42 5F   BE C2 5B F1 88 4D 5D D5  ......B_..[..M].
#           0010: 77 1E 63 B6 77 DB 20 B4   A3 4B C3 DC 70 2E 6E 74  w.c.w. ..K..p.nt
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.352 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.352 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.353 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.355 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.356 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.356 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.357 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.357 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.366 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.367 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.368 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.372 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.372 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.372 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.372 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.372 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.373 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.373 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.374 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.375 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.375 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.375 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.376 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.377 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.380 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 24 0E 16",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:44.000 UTC",
#       "not  after"         : "2023-12-28 06:11:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA B7 93 91 98 1B EB 61   8C D6 3E 8B E1 65 D7 22  .......a..>..e."
#           0010: 08 25 83 C5                                        .%..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.380 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:15.441 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:15.442 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:15.442 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:12:15.442 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.471 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B BC 01 DE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-29 06:11:42.000 UTC",
#     "not  after"         : "2023-12-28 06:11:42.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#         0010: 88 B8 FE 28                                        ...(
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#         0010: 91 68 3B 88                                        .h;.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.474 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 84 9B D1 F4 23 A7 4E 2E   AD 38 CD 9D D5 FF E1 84  ....#.N..8......
#     0010: 60 74 99 6C FC 12 4E 53   28 92 50 67 F6 FD 32 2E  `t.l..NS(.Pg..2.
#     0020: 4F 42 E2 5B A2 5C D6 5A   37 10 F0 41 BE A6 1F 5D  OB.[.\.Z7..A...]
#     0030: 62 72 D7 29 A7 B5 BE B3   77 3C 5A 1C 28 E8 8E 73  br.)....w<Z.(..s
#     0040: 48 87 92 32 DE 7F 9A 01   01 CB A8 31 28 29 68 39  H..2.......1()h9
#     0050: 7B E5 01 30 CB E8 61 78   F8 51 1E 9C 57 BF 1D 0B  ...0..ax.Q..W...
#     0060: 78 7B 72 F8 86 F2 D8 D0   91 18 B8 F8 59 FC B1 94  x.r.........Y...
#     0070: 1A 3E 92 C6 A3 81 38 F1   59 0F AA C0 82 EB 84 D9  .>....8.Y.......
#     0080: FB A4 03 37 2A 80 BA 23   22 92 AF AB 6D 6D 4F 89  ...7*..#"...mmO.
#     0090: 10 2F 73 26 1A 60 87 6C   8C 08 2D A1 77 F0 49 73  ./s&.`.l..-.w.Is
#     00A0: 1D 2E 6F 50 67 DD 25 31   DB B2 FC 77 AA 30 5F B9  ..oPg.%1...w.0_.
#     00B0: 28 B9 6D DE 2F 60 CC 8D   41 8F 09 9C 16 BD 36 BC  (.m./`..A.....6.
#     00C0: 77 01 F4 BF 4E 24 3E F1   3D 28 F0 B5 25 C7 AC 3B  w...N$>.=(..%..;
#     00D0: 94 08 6B 54 FF 2B 17 59   63 90 09 BA C0 34 EF 11  ..kT.+.Yc....4..
#     00E0: DA 75 DF C4 4F FA 88 B3   CE F3 6D 79 3E C9 22 C2  .u..O.....my>.".
#     00F0: C2 9D 6B B0 31 0E 0A 32   C3 4B 29 16 88 E0 ED FF  ..k.1..2.K).....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.476 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 C7 DC 3D CF 5F 53 B9   32 AE E5 60 93 76 7E 49  ...=._S.2..`.v.I
#     0010: EE EC DF CA 56 70 DA 6C   93 8B 52 7A 8F DE 72 90  ....Vp.l..Rz..r.
#     0020: 22 5B F3 5A 33 9C 3A 5A   10 31 68 21 AA 6A D4 08  "[.Z3.:Z.1h!.j..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.478 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:15.479 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.479 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:15.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.480 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-29 06:12:15.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:15.480 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.481 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.483 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 73 EA F1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:48.000 UTC",
#       "not  after"         : "2023-12-28 06:11:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 93 F8 AE 55 FA 64 3A   5A D3 EB 9D 02 F7 26 51  ....U.d:Z.....&Q
#           0010: ED 8C A9 36                                        ...6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B BC 01 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:42.000 UTC",
#       "not  after"         : "2023-12-28 06:11:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#           0010: 88 B8 FE 28                                        ...(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.510 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 79 C3 53 55 74 EE 2D   72 64 1D A6 7A B3 83 9A  .y.SUt.-rd..z...
#     0010: CF 9D 09 3E A8 22 B1 66   C1 D1 D6 5F FC 15 8A BB  ...>.".f..._....
#     0020: 31 DD 14 89 FE 43 4A 48   3D 82 48 1F B7 B8 53 E9  1....CJH=.H...S.
#     0030: 71 55 A8 9E 8D 20 92 87   DF 72 79 16 FF 61 B9 EE  qU... ...ry..a..
#     0040: DB BF 11 FF 76 C7 CD 57   6B 86 77 35 EA 49 81 C8  ....v..Wk.w5.I..
#     0050: 3F 26 A7 99 C5 94 DB EF   38 72 41 5F 48 C1 7A 06  ?&......8rA_H.z.
#     0060: 93 88 67 A5 4E 40 1B 78   C5 3B 0F 7B BE 95 13 DC  ..g.N@.x.;......
#     0070: 02 6F 18 89 4B 42 09 9A   62 DC DE 37 62 68 65 F0  .o..KB..b..7bhe.
#     0080: C9 CD 45 26 0E 77 31 75   68 67 74 76 54 29 35 D9  ..E&.w1uhgtvT)5.
#     0090: C8 04 92 2E 03 75 20 95   81 80 00 43 EC D8 9A 78  .....u ....C...x
#     00A0: 5E C0 BC 62 69 D9 FF 9D   60 44 AB B9 BC A8 FA 24  ^..bi...`D.....$
#     00B0: 03 76 07 AD 8B A1 28 0F   3C EB 9D 12 E6 9D A0 AA  .v....(.<.......
#     00C0: 46 6F 4D 85 A9 89 41 E2   8A EA 58 66 17 95 EC A5  FoM...A...Xf....
#     00D0: EC 31 08 80 06 A3 87 70   0D E1 F0 B1 43 EA B0 E2  .1.....p....C...
#     00E0: EE F4 48 B2 53 C5 F0 B5   52 6A 57 0E 50 A1 FD F9  ..H.S...RjW.P...
#     00F0: 04 13 18 34 FC 58 93 C5   3C 84 C1 AB 3F 58 FC D5  ...4.X..<...?X..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.511 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 99 56 44 94 65 41 21 29   29 7A 43 07 F5 4F 86 7A  .VD.eA!))zC..O.z
#     0010: 28 11 72 14 A8 4E 72 3E   68 2E 5F 1A 05 E1 47 72  (.r..Nr>h._...Gr
#     0020: 33 9F 25 2B FA 56 8E D3   00 6E 0D 95 58 D1 4E 12  3.%+.V...n..X.N.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.512 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:15.559 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E1 91 87 42 64 C5 D6 4F B8 B0 44 23 5B D6 F3 04 76 B0 2C E2 B0 01 A7 5F 68 48 70 F3 ED 8E DC F0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-29 06:12:15.858 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-29 06:12:15.859 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-29 06:12:27.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:27.577 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A D0 38 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:40.000 UTC",
#       "not  after"         : "2023-12-28 06:11:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#           0010: 88 B8 FE 28                                        ...(
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B BC 01 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-29 06:11:42.000 UTC",
#       "not  after"         : "2023-12-28 06:11:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 0E 29 A6 48 54 DC 4B   4C 1C 1F 10 EF 94 14 AA  ..).HT.KL.......
#           0010: 88 B8 FE 28                                        ...(
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 85 24 46 0E DB F4 C3 7C   DC FF 5E 35 1D 90 DA 3C  .$F.......^5...<
#           0010: 91 68 3B 88                                        .h;.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-29 06:12:27.593 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:27.822 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:27.824 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-29 06:12:27.824 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.841 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.841 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.841 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-29 06:12:27.843 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "83 C5 0C AE EB BA 21 AC 00 8D 1A B3 3F 1D FD 22 B4 68 D9 CD 4D EB C0 17 FC D1 D5 63 C9 D9 54 14",
#     "session id"          : "21 A3 17 8A 39 16 1D 84 73 D3 97 68 EF D6 F1 F4 2E 8B 90 6A 27 DA 85 66 89 F6 BF E4 E0 BD B1 8D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3C 5E 15 5A 14 3A 86 8D   1A 21 B8 58 09 52 EC 73  <^.Z.:...!.X.R.s
#               0010: 4B 09 D5 7B F3 89 B0 6C   D0 BB 39 C8 FF FA 51 43  K......l..9...QC
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.862 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E3 CE 19 C5 59 17 B4 DC 39 33 FC 3F 76 13 42 E6 B1 B2 A2 7B 68 7E C4 0C 30 E8 B8 9D BD B0 59 EB",
#     "session id"          : "21 A3 17 8A 39 16 1D 84 73 D3 97 68 EF D6 F1 F4 2E 8B 90 6A 27 DA 85 66 89 F6 BF E4 E0 BD B1 8D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA D7 30 2C 98 70 9E F8   60 51 D8 03 9C B7 AA 23  ..0,.p..`Q.....#
#             0010: D9 35 42 71 E0 C3 4D B8   9C 6B 79 D9 AB 2F 89 44  .5Bq..M..ky../.D
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.862 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.863 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.864 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.867 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.867 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.867 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.867 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.875 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.877 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.878 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.882 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.883 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:27.883 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:12:27.883 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-29 06:12:27.884 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certific

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-29 06:13:45.808 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:13:45.861 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:13:45.861 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:13:45.861 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-29 06:13:45.861 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44258/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28349ms
ok 65 stop command for single port in 30966ms
ok 66 status detects locally running solr in 14339ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2191ms
ok 69 copying files around in 6507ms
ok 70 upconfig in 2611ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1239ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 55s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m18.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5569 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5569/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([AFF96123C78DE5BA:9A0D8A782C51D3E4]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5892 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AFF96123C78DE5BA -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 6m 27s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m49s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5568 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5568/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([FCCC35065F26FB88:C938DE5DB4FACDD6]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6059 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=FCCC35065F26FB88 -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 6m 37s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m0s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5567 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5567/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44087/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 21:35:46.143; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 21:35:46.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 21:35:47.200; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 21:35:47.248; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22446ms
ok 61 start solr with client truststore and security manager in 25410ms
not ok 62 start solr with mTLS needed in 59733ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-sIyTCs/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44087.
#
# Started Solr server on port 44087 (pid=201022). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44088.
#
# Started Solr server on port 44088 (pid=201446). Happy searching!
#
# INFO  - 2023-09-28 21:37:10.370; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 21:37:10.376; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 21:37:10.732; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 21:37:10.734; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 21:37:10.735; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:10.767 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 11 BA 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:46.000 UTC",
#     "not  after"         : "2023-12-27 21:36:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 71 F2 5B E1 D4 DA 90   11 F6 F9 75 E1 7E D2 18  !q.[.......u....
#         0010: E2 E6 BA 31                                        ...1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:10.771 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 4C 91 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:38.000 UTC",
#     "not  after"         : "2023-12-27 21:36:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:10.785 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:10.858 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:10.859 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:10.859 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:10.859 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:11.021 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:11.023 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:11.024 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.029 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.041 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.041 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:11.043 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "51 5B C7 24 A6 A2 22 DD 78 51 56 E9 ED 7C 5B 14 5B D5 EA 7E AF B3 62 3F 47 95 8D 98 35 30 F2 77",
#   "session id"          : "56 E1 7A 68 E2 45 DD 53 27 68 AC BA 92 F9 6A D1 A6 CA DB 95 35 02 74 22 D6 2F 19 02 69 7E ED 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 20 B5 9C 3D 6E DC 7F   92 B7 8D 59 AA E6 39 4C  . ..=n.....Y..9L
#             0010: 10 80 6D 56 69 D0 AE E0   91 69 6D 24 55 36 4F 26  ..mVi....im$U6O&
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.152 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6D 42 F5 3C 12 A0 9A 05 68 85 8B CD 9A 7C 68 AA 41 9D C5 61 7A 73 3F 11 F4 09 32 33 F3 0E CB 7D",
#   "session id"          : "56 E1 7A 68 E2 45 DD 53 27 68 AC BA 92 F9 6A D1 A6 CA DB 95 35 02 74 22 D6 2F 19 02 69 7E ED 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 B0 BE A7 7D 15 86 9F   A1 ED 79 C9 91 D2 B2 24  ..........y....$
#           0010: 38 17 AF AB 48 45 04 54   8D A8 66 C4 6C BB 10 5D  8...HE.T..f.l..]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.152 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.152 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.155 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.157 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.167 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.168 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.173 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.176 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.177 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.178 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.178 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.178 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.182 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 61 C9 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:42.000 UTC",
#       "not  after"         : "2023-12-27 21:36:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 75 F4 10 AF 11 3B 1F   B8 AD B0 25 F5 B1 87 2F  .u....;....%.../
#           0010: 78 7D 34 B8                                        x.4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.182 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.265 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.269 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BA 30 0E 94 14 45 1F 35   CF 0E EB 2D 2E 06 45 47  .0...E.5...-..EG
#     0010: E4 2F C4 C0 B5 BA FB 51   D7 D6 20 78 C6 15 59 85  ./.....Q.. x..Y.
#     0020: FC C9 EF 84 B8 1E 6E 11   3F C8 FD 88 C4 7A DF 42  ......n.?....z.B
#     0030: 1F 54 D0 AB 10 1B 40 D2   DD AE CF 14 BA 31 5B 4B  .T....@......1[K
#     0040: 92 77 BC 13 C2 18 56 87   5C 24 38 2A B8 91 64 E7  .w....V.\$8*..d.
#     0050: F2 8E BC CB 2E F7 56 B4   7E 06 4B 8A 2F C3 80 8E  ......V...K./...
#     0060: 67 58 C2 4C 92 D6 30 EF   FA 76 2F B8 30 4E 8A 10  gX.L..0..v/.0N..
#     0070: 86 4D B1 A0 27 1C 18 15   E0 95 C5 32 FB 43 AB 1A  .M..'......2.C..
#     0080: BC 1C 28 7A EB C5 1A 2F   37 EA 30 57 1E B4 E1 DC  ..(z.../7.0W....
#     0090: 2E 4B 24 8F 2B 79 C2 94   84 AE 2C 28 A3 50 15 50  .K$.+y....,(.P.P
#     00A0: B5 8B F3 C4 8E 1F 06 B0   DF 7C 4F 2C 9A 9F A5 00  ..........O,....
#     00B0: 17 C4 3F 09 F4 19 62 BE   AC 70 CE 83 52 1C 5F 7D  ..?...b..p..R._.
#     00C0: 1B EE 3A 7D BE 3D FD 1C   BE 70 BA 15 69 17 FE 5C  ..:..=...p..i..\
#     00D0: 65 37 58 FA CE 68 BD 11   B4 2D 8C 57 3B 53 53 50  e7X..h...-.W;SSP
#     00E0: 81 C2 45 FB 2C 8B 5F 37   FF 02 55 7F F7 14 1D 95  ..E.,._7..U.....
#     00F0: 3F 93 FE 90 49 C0 AF 2A   C5 71 3D 71 C7 8B 64 10  ?...I..*.q=q..d.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.271 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF 2C 3C 2F 71 45 34 D8   64 63 24 D5 0D 5B EA 3B  .,</qE4.dc$..[.;
#     0010: 83 AD 62 B9 2F 9D D5 0C   28 74 D8 0F 3E 96 D8 91  ..b./...(t..>...
#     0020: EB 5E 19 2E 4E 5B 09 AE   7E DD 91 CB 58 A2 93 B1  .^..N[......X...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.273 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:11.274 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.274 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:11.274 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.275 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:11.275 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:11.275 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.275 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.278 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 11 BA 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:46.000 UTC",
#       "not  after"         : "2023-12-27 21:36:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 21 71 F2 5B E1 D4 DA 90   11 F6 F9 75 E1 7E D2 18  !q.[.......u....
#           0010: E2 E6 BA 31                                        ...1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 8B 9F 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:40.000 UTC",
#       "not  after"         : "2023-12-27 21:36:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#           0010: B8 1D 9D D0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.305 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BB B3 F6 7C 71 2F 2A 01   DF 95 74 33 7B 2B 40 68  ....q/*...t3.+@h
#     0010: 14 24 0D 66 E6 08 44 7F   9F A4 98 D6 22 E7 34 4A  .$.f..D.....".4J
#     0020: 8C 50 CC DA DB DA C3 40   4F 49 CE EA 56 FA A6 54  .P.....@OI..V..T
#     0030: 22 82 B8 67 37 69 66 C5   A9 43 D8 1C BE E2 AD 19  "..g7if..C......
#     0040: 36 B5 09 1B 5E 96 20 3A   20 1F 63 07 B0 F2 99 04  6...^. : .c.....
#     0050: C8 54 5E 10 68 6B EF 87   AE A7 31 F4 9E 94 17 3E  .T^.hk....1....>
#     0060: 72 CA 4F AE 9F DE D4 C8   9B 59 66 70 67 26 E9 8D  r.O......Yfpg&..
#     0070: 5B 2D A8 F5 7C 4A B0 24   F0 DC C7 68 BD D4 B5 18  [-...J.$...h....
#     0080: 81 F5 6F AC 15 7D 26 C6   B2 1F 6A 9B D6 DC B6 F6  ..o...&...j.....
#     0090: 8C 60 03 0A 1F 7E 81 EB   85 9F 55 F7 89 3A D1 05  .`........U..:..
#     00A0: 4E 64 12 AA E4 9A 77 56   2D 72 A0 6A A7 75 8E DF  Nd....wV-r.j.u..
#     00B0: 07 B0 BE 81 5E 46 F5 B5   7B 33 6C 60 67 B6 02 BA  ....^F...3l`g...
#     00C0: FE 4B FA 66 88 99 6C 7E   48 47 C6 E7 40 F1 13 F1  .K.f..l.HG..@...
#     00D0: 8E D8 5A 56 87 DF A2 AB   D9 CD 49 CB A5 6C AD 45  ..ZV......I..l.E
#     00E0: 66 E7 DE 39 88 EE EB C9   F9 1E 26 C1 DC 63 DA E2  f..9......&..c..
#     00F0: 1C D2 22 CB CE 2F 26 03   08 9A E5 E5 9A 6A 97 D2  .."../&......j..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.306 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8A 36 83 0C 38 91 93 79   6E 71 09 5E D2 5A 2E 40  .6..8..ynq.^.Z.@
#     0010: 26 0A 55 9C BB 3E 7A 72   93 A3 C9 BF E3 24 74 B4  &.U..>zr.....$t.
#     0020: 65 08 F8 15 2B D1 2B CB   08 9E 3E 96 5D E1 D0 D1  e...+.+...>.]...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.307 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:11.354 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F A9 17 E2 EA 25 13 70 7F 8C F7 16 54 04 9A 45 70 7D E3 76 F7 3E C2 0C EE 7E F5 FC 9E 44 2A F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 21:37:11.634 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 21:37:11.635 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 21:37:12.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 21:37:12.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 21:37:12.972; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 21:37:12.975; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 21:37:12.976; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIyTCs/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:13.009 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 11 BA 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:46.000 UTC",
#     "not  after"         : "2023-12-27 21:36:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 21 71 F2 5B E1 D4 DA 90   11 F6 F9 75 E1 7E D2 18  !q.[.......u....
#         0010: E2 E6 BA 31                                        ...1
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:13.013 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 4C 91 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:38.000 UTC",
#     "not  after"         : "2023-12-27 21:36:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:13.029 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:13.420 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:13.420 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:13.421 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:13.421 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:13.574 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.574 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:13.576 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:13.576 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.583 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.595 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.595 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.595 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:13.598 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 35 18 F2 5B 97 DA AD CD 37 1F 85 38 5F 74 A7 6F 7F 99 EC 4E 13 07 B7 0E FF 2E FC C4 E0 6D 20",
#   "session id"          : "75 85 37 C4 BB D1 8A 46 F0 97 39 7F 4B 9F A2 68 FF 23 6A CE CB D1 55 7B 3C 37 EC 10 74 0B FC D2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DE 29 05 91 C2 95 2B F7   A1 98 FF 7F 45 1E D4 4D  .)....+.....E..M
#             0010: 0B 4F ED FE 56 7F 88 6F   AA 17 16 D9 20 BC C3 1D  .O..V..o.... ...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.714 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "29 E3 C1 32 6B C1 AF 78 62 40 06 3A 27 9F 3C 2D FD 26 08 66 27 7C 53 D9 29 8C 12 5D 63 A0 35 E7",
#   "session id"          : "75 85 37 C4 BB D1 8A 46 F0 97 39 7F 4B 9F A2 68 FF 23 6A CE CB D1 55 7B 3C 37 EC 10 74 0B FC D2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A1 1E 1A 02 35 DE 56 A6   6F 57 1F 10 12 BE CA 73  ....5.V.oW.....s
#           0010: E9 F1 56 7C 32 FA 5F 8A   3A 86 5E 4A E6 92 4E 6E  ..V.2._.:.^J..Nn
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.714 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.715 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.716 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.717 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.717 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.719 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.719 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.719 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.720 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.728 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.729 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.731 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.734 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.735 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.736 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.737 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.738 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.738 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.739 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.740 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.743 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "75 61 C9 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:42.000 UTC",
#       "not  after"         : "2023-12-27 21:36:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 75 F4 10 AF 11 3B 1F   B8 AD B0 25 F5 B1 87 2F  .u....;....%.../
#           0010: 78 7D 34 B8                                        x.4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.861 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 8B 9F 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 21:36:40.000 UTC",
#     "not  after"         : "2023-12-27 21:36:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#         0010: B8 1D 9D D0                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#         0010: 1B 93 EE 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.865 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 25 0F CE D1 7A 7A BD D5   7D 89 AA 66 63 C5 6F B9  %...zz.....fc.o.
#     0010: 49 1D EB E6 FF 88 33 39   D6 D4 77 9B A8 B3 E4 27  I.....39..w....'
#     0020: 1B 0F 5A B5 29 10 59 8A   BA 3C 51 CC F2 EE D8 DA  ..Z.).Y..<Q.....
#     0030: 22 5F 6A 2B B1 7D D2 68   47 48 61 8E BE 03 5A 8D  "_j+...hGHa...Z.
#     0040: 85 6A F3 64 A1 2F E6 22   47 1F EB 27 9F 11 DD F8  .j.d./."G..'....
#     0050: 21 7C FB EF 29 3E 03 C7   98 DA 63 5D 2A EB 98 C2  !...)>....c]*...
#     0060: 48 5C F1 47 9D FB 4C 3A   AC 6E 14 63 2F 0A 43 CE  H\.G..L:.n.c/.C.
#     0070: D9 69 53 67 D9 0C E0 FE   85 11 28 C6 66 C7 16 E8  .iSg......(.f...
#     0080: 3A AD D8 84 56 24 47 7E   BE AE FC C4 CB 15 DC DB  :...V$G.........
#     0090: 95 78 5F D2 0B 18 A2 EF   F2 99 CF 80 A2 DE 73 E9  .x_...........s.
#     00A0: 2D 80 B4 86 C4 4F F1 15   99 EC 8C 3D 99 3E 27 40  -....O.....=.>'@
#     00B0: 27 C0 67 BC 0D 22 F7 95   34 4F 63 1E 27 EE B4 77  '.g.."..4Oc.'..w
#     00C0: F5 11 5C 83 39 8A C1 C5   24 AC 02 0C A6 8E 7D 2C  ..\.9...$......,
#     00D0: FF 3B 08 0D AE 36 FB 0B   67 3F 76 8F B2 0A 6B 67  .;...6..g?v...kg
#     00E0: 34 3B B5 38 09 9C 4E C5   47 6F 9B 2A 8C 70 F2 21  4;.8..N.Go.*.p.!
#     00F0: 6E 20 B6 36 DB C9 C4 78   EB 53 16 21 9C 1E C4 55  n .6...x.S.!...U
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.867 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E8 6A 32 FD 79 12 DD 04   B8 B6 B4 1E 4C BB E8 7F  .j2.y.......L...
#     0010: AE FF 26 F1 42 00 7B F1   93 DD 4D EC D9 60 AE 6E  ..&.B.....M..`.n
#     0020: 9C EF B1 C1 C7 1A E6 35   6D 96 D0 BA 7B 6F BC 91  .......5m....o..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.869 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:13.870 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:13.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.871 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 21:37:13.871 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:13.872 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.872 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.875 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 11 BA 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:46.000 UTC",
#       "not  after"         : "2023-12-27 21:36:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 21 71 F2 5B E1 D4 DA 90   11 F6 F9 75 E1 7E D2 18  !q.[.......u....
#           0010: E2 E6 BA 31                                        ...1
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 8B 9F 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:40.000 UTC",
#       "not  after"         : "2023-12-27 21:36:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#           0010: B8 1D 9D D0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.902 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 3B C2 FB 26 FA AF 2C   3F 6F EB B3 09 6C C3 E4  $;..&..,?o...l..
#     0010: CD 38 BB 59 CA 25 AD FA   13 89 87 30 F7 64 3A C0  .8.Y.%.....0.d:.
#     0020: EB 69 37 22 91 CB 9F 8F   DA 09 33 0F 99 0A 5E C6  .i7"......3...^.
#     0030: 4D E8 A2 D8 F7 A7 EC E3   FD 53 80 3D F3 49 86 03  M........S.=.I..
#     0040: 4B B0 E5 E4 0D 77 BB DF   EF C8 5C DD 25 A0 D2 C1  K....w....\.%...
#     0050: 34 A9 64 18 30 40 51 16   AE 2C 53 34 68 1F 35 F8  4.d.0@Q..,S4h.5.
#     0060: 44 6E 64 42 40 46 9A 7E   98 A9 56 5D 11 0B 7C CA  DndB@F....V]....
#     0070: E9 EB 66 17 87 60 51 05   CC EB 5C BE 53 2D 05 8F  ..f..`Q...\.S-..
#     0080: 4E 7C 75 E3 1D 1D 3E 37   4D B5 F3 CF 13 C1 82 89  N.u...>7M.......
#     0090: 01 4B 6F D6 7A C8 63 1E   8C 9D 2D B3 E7 9F FD FF  .Ko.z.c...-.....
#     00A0: 91 46 FE E7 86 4B A9 76   9A 9D F1 F7 BB 99 40 45  .F...K.v......@E
#     00B0: 4D 4D 21 91 A0 25 90 EB   6C 31 05 CB 3C CF 27 43  MM!..%..l1..<.'C
#     00C0: 92 58 66 62 DF CA B7 E7   C6 EA FF 1E 8D 8A E1 DD  .Xfb............
#     00D0: 17 DB 32 6C C2 F5 72 DB   83 22 6E 09 BE 8F BA 68  ..2l..r.."n....h
#     00E0: 38 92 6E 93 6C 88 34 16   27 82 93 39 2F CB DE 41  8.n.l.4.'..9/..A
#     00F0: 09 2A A6 71 E3 A5 41 EC   33 F4 CA 21 8A 59 6A 7C  .*.q..A.3..!.Yj.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.903 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 9B 3D C3 AF 18 DC FC   C0 C7 C7 EE 9E 5C 24 FE  ..=..........\$.
#     0010: F2 36 35 13 DF 85 BC 31   F4 42 20 1A F3 DE 38 5E  .65....1.B ...8^
#     0020: FC DF AD B7 43 00 D3 D7   A3 E8 1E 32 E2 8D F3 B8  ....C......2....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.904 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:13.958 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "69 A2 43 5A 26 6E F3 99 4C AC 68 91 33 CA 11 8D 6F 20 B9 2A 8F 84 F2 18 8C 53 9A 17 FA 54 85 C3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 21:37:14.232 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 21:37:14.233 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 21:37:25.707; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:26.044 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 8B 9F 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:40.000 UTC",
#       "not  after"         : "2023-12-27 21:36:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#           0010: B8 1D 9D D0                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 97 90 36 5E 6B D2 69   D4 20 78 71 E3 32 7B 35  6..6^k.i. xq.2.5
#           0010: 1B 93 EE 71                                        ...q
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 4C 91 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 21:36:38.000 UTC",
#       "not  after"         : "2023-12-27 21:36:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E4 BB EA 13 3E DB C9   45 55 53 0A 60 3B F9 BF  q....>..EUS.`;..
#           0010: B8 1D 9D D0                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 21:37:26.061 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:26.511 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:26.511 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:26.512 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:37:26.512 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:26.588 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.588 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:26.590 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 21:37:26.591 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.597 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.611 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.611 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 21:37:26.614 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "67 43 02 4A 05 75 85 86 27 B8 62 D0 1C 35 B9 BF F1 86 84 ED E1 08 32 1E 40 F1 4B C7 68 40 2E 1F",
#     "session id"          : "B0 7B 9D E7 2F DE 84 7D 5E 7F 03 0C 42 75 55 BF 38 6A BA 52 FD 78 87 D5 96 D1 5E 3B FE 1F E1 B4",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 85 19 C8 4C 6B 35 22 98   D3 2B CA 29 2B FC 70 D3  ...Lk5"..+.)+.p.
#               0010: A7 AE 0D DB 05 B1 0C A1   17 71 A8 41 D2 A5 D9 3C  .........q.A...<
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.633 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EA 6C 2E DB 8D FD 95 B0 BD E0 0B 3E 63 26 0D 02 C5 53 33 4C 69 DB D6 29 AC 37 F3 2D A9 FC FD E1",
#     "session id"          : "B0 7B 9D E7 2F DE 84 7D 5E 7F 03 0C 42 75 55 BF 38 6A BA 52 FD 78 87 D5 96 D1 5E 3B FE 1F E1 B4",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 86 05 44 7B 0F E4 6D   38 C0 E9 8B 3A BE 58 EF  ...D...m8...:.X.
#             0010: 81 C9 B2 26 2D F2 A2 BC   AB 37 FB 9D 5F 2D B2 5A  ...&-....7.._-.Z
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.633 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.634 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.635 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.636 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.636 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.639 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.639 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.639 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.640 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.640 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.640 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.640 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.640 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.649 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.651 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.652 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.656 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.656 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.656 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.656 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.656 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.657 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.657 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:26.657 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:37:26.657 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 21:37:26.659 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 21:38:48.252 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:38:48.292 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:38:48.293 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:38:48.293 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 21:38:48.293 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44088/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28543ms
ok 65 stop command for single port in 31244ms
ok 66 status detects locally running solr in 14401ms
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2221ms
ok 69 copying files around in 6681ms
ok 70 upconfig in 2655ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m40.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5566 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5566/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39575/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 18:38:30.778; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 18:38:30.784; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 18:38:31.710; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 18:38:31.753; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22931ms
ok 61 start solr with client truststore and security manager in 25437ms
not ok 62 start solr with mTLS needed in 57492ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-IPLuam/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39575.
#
# Started Solr server on port 39575 (pid=201823). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39576.
#
# Started Solr server on port 39576 (pid=202249). Happy searching!
#
# INFO  - 2023-09-28 18:39:55.238; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 18:39:55.244; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 18:39:55.641; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 18:39:55.644; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 18:39:55.644; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:55.676 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E 15 FD 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:31.000 UTC",
#     "not  after"         : "2023-12-27 18:39:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 7E AF 3F 0E 38 8F D4   AE 20 1D 1B 61 D1 BF 18  N..?.8... ..a...
#         0010: 66 EB 09 EC                                        f...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:55.680 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 C1 B8 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:23.000 UTC",
#     "not  after"         : "2023-12-27 18:39:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:55.695 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:55.786 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:55.787 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:55.787 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:55.787 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:55.928 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:55.930 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:55.930 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.935 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.947 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.947 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:55.950 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D9 56 AA C6 DF 7B 12 76 D4 60 BA A5 04 54 4F 92 67 06 7C ED 74 2C BD E5 4D 03 77 9C D2 C4 21 5C",
#   "session id"          : "65 67 2A 36 0A C2 94 3C C2 A2 17 A6 B3 D4 14 0F 9A 41 06 D1 FC 47 ED 22 03 69 7C 34 E4 00 53 5E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 41 37 AD F0 E8 D5 E6   C3 27 46 1B D2 11 85 04  DA7......'F.....
#             0010: C3 62 37 70 8D D5 36 97   51 DC AC B6 D3 63 6D 0D  .b7p..6.Q....cm.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.077 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 97 B8 E6 4D 61 1E 03 1E 8F 2D 8B 50 19 9D D3 79 D1 71 B2 48 5D 36 7A A6 A5 70 2D 5B 28 46 8E",
#   "session id"          : "65 67 2A 36 0A C2 94 3C C2 A2 17 A6 B3 D4 14 0F 9A 41 06 D1 FC 47 ED 22 03 69 7C 34 E4 00 53 5E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 48 D5 DA BC 0E 23 AD D4   AB 9E A7 3B 91 4D D6 48  H....#.....;.M.H
#           0010: BF 9D 4E C4 AF 09 2F DE   2D FB 09 AE 7C 0B B4 43  ..N.../.-......C
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.078 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.078 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.080 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.082 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.082 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.082 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.083 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.092 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.093 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.094 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.098 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.098 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.098 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.101 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.101 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.101 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.102 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.102 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.103 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.103 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.106 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 35 EE 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:27.000 UTC",
#       "not  after"         : "2023-12-27 18:39:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 ED DD 4F 2A D1 1F 34   44 4A 3A A5 93 44 17 E4  ...O*..4DJ:..D..
#           0010: 68 B9 2B 76                                        h.+v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.107 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.187 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.191 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 41 FD AC 48 1C 6A 98 D9   AB 5E 88 CE 60 84 7A 95  A..H.j...^..`.z.
#     0010: BA 29 47 E3 88 FC 31 8D   7B FE 7A 7F 76 95 FD AD  .)G...1...z.v...
#     0020: 22 3B 1C F3 3B 6C 1A 44   90 37 D1 3E 88 CA 5F E0  ";..;l.D.7.>.._.
#     0030: F1 ED E6 DD 2E 1E 36 5D   C6 A0 1D 91 75 C5 7B 0C  ......6]....u...
#     0040: 25 ED 0B A5 A5 95 B6 A8   45 79 88 32 51 73 F3 95  %.......Ey.2Qs..
#     0050: 56 E5 E8 C8 08 3A 57 B4   FE B4 02 FE A4 4E ED CB  V....:W......N..
#     0060: 6F 75 06 3B E3 20 0F 6F   B6 4E B4 AA DF 5C A1 C1  ou.;. .o.N...\..
#     0070: B8 2F 53 85 D6 3B D4 1A   9C 59 CE E5 72 D1 92 61  ./S..;...Y..r..a
#     0080: 54 96 A9 DB 12 F8 94 47   5D 94 C6 B5 F2 87 35 F8  T......G].....5.
#     0090: A1 C3 FA 80 F3 34 0E 86   71 6E 90 3D 32 CF CE C5  .....4..qn.=2...
#     00A0: E3 10 19 EF FC C6 A0 4F   B4 4E E4 83 68 0E FD 6F  .......O.N..h..o
#     00B0: 37 C2 8C 73 AB 62 52 3F   85 EB 08 EA E3 57 1B F1  7..s.bR?.....W..
#     00C0: CB 06 FC 79 BB 7F 13 3F   22 D1 D7 E0 8A 3D B5 0E  ...y...?"....=..
#     00D0: 44 95 56 CE AC C2 13 C8   4E 83 CC 7F 9C F6 7C F4  D.V.....N.......
#     00E0: 94 DE DB 67 73 1E 74 D2   8D 25 9E 87 5D D3 98 54  ...gs.t..%..]..T
#     00F0: 7B 74 97 BA E9 F0 54 81   1F 28 DE 10 37 36 50 5E  .t....T..(..76P^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.193 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7C C4 B7 3D 39 3C 28 4A   F3 8E C7 AD 93 C0 78 98  ...=9<(J......x.
#     0010: 6A 28 34 FC 0B 63 5C 25   1E E0 EB 30 E7 1E 42 CA  j(4..c\%...0..B.
#     0020: 17 24 B2 0C DF 7B 0E 5B   0B 2B 1F 3C 0F 7E 84 D3  .$.....[.+.<....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.195 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:56.196 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.197 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:56.197 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.197 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:56.197 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:56.197 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.198 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.201 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E 15 FD 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:31.000 UTC",
#       "not  after"         : "2023-12-27 18:39:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 7E AF 3F 0E 38 8F D4   AE 20 1D 1B 61 D1 BF 18  N..?.8... ..a...
#           0010: 66 EB 09 EC                                        f...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 BA 30 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:25.000 UTC",
#       "not  after"         : "2023-12-27 18:39:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#           0010: 99 D3 B5 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.227 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 84 30 13 62 3B CC 55   BD A9 1A 72 2D 5E F1 59  _.0.b;.U...r-^.Y
#     0010: A5 07 D0 54 48 07 B3 50   76 DC CE F2 C9 D0 98 53  ...TH..Pv......S
#     0020: 36 7F 95 2B 42 DB DC B6   9C 62 11 95 B7 60 C8 22  6..+B....b...`."
#     0030: C0 00 5E E4 63 B4 E9 50   CC 16 C1 3D 59 7E 2A 71  ..^.c..P...=Y.*q
#     0040: E6 C8 B5 5A C7 A8 D1 26   0C E3 DB 42 28 BC 6B FD  ...Z...&...B(.k.
#     0050: 5A 3E 1A 8A 59 FF 7C D3   F1 3A D7 89 CF 3D B1 B5  Z>..Y....:...=..
#     0060: 8E 38 62 01 15 19 26 C4   D5 3A 30 F0 35 31 7E BE  .8b...&..:0.51..
#     0070: 02 D0 EE ED 87 8F 69 E7   E2 43 25 77 E1 DC 6F 00  ......i..C%w..o.
#     0080: EE F8 F0 B5 42 57 3D F4   65 33 DF 50 84 FD 8B 02  ....BW=.e3.P....
#     0090: 2E 66 6F 98 0F FF 72 EA   69 CE 72 E3 8C 70 5C D2  .fo...r.i.r..p\.
#     00A0: E0 C5 E3 B5 FA 53 FB CD   1D 4F F4 97 2E E1 BE FF  .....S...O......
#     00B0: F7 E9 66 3C EB C1 33 D8   09 33 D7 5B 62 FA CC 59  ..f<..3..3.[b..Y
#     00C0: 51 0F 0F 08 56 AA 5B 01   7A 48 63 EB A1 4E A3 D2  Q...V.[.zHc..N..
#     00D0: B4 7B 27 12 51 48 F9 A0   3B 38 38 CE AC 3F 8C 4D  ..'.QH..;88..?.M
#     00E0: DE 10 F6 59 B1 47 2A F6   7A 82 AB 0E 3C 97 9D 47  ...Y.G*.z...<..G
#     00F0: A5 6A D9 24 4F F2 83 09   59 28 24 53 16 8D D9 55  .j.$O...Y($S...U
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.228 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 98 41 79 3B 75 A1 E4   1C D0 EC 8C 21 2A 61 FB  Y.Ay;u......!*a.
#     0010: 0D B2 A4 3B 10 EC 46 0E   DD 05 1C 24 61 6E A5 7D  ...;..F....$an..
#     0020: EF 57 6D 68 0B 81 86 6C   99 DE 12 5D 4B 25 D8 44  .Wmh...l...]K%.D
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.229 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:56.278 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9A 76 41 80 94 0F 30 41 8D EF B1 5B 50 0A 9A 67 94 FB 7C 72 67 20 A5 C0 97 D1 00 A6 A9 F2 47 19",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 18:39:56.561 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 18:39:56.562 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 18:39:57.543; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 18:39:57.550; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 18:39:57.942; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 18:39:57.946; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 18:39:57.946; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-IPLuam/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:57.981 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6E 15 FD 92",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:31.000 UTC",
#     "not  after"         : "2023-12-27 18:39:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 7E AF 3F 0E 38 8F D4   AE 20 1D 1B 61 D1 BF 18  N..?.8... ..a...
#         0010: 66 EB 09 EC                                        f...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:57.987 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 C1 B8 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:23.000 UTC",
#     "not  after"         : "2023-12-27 18:39:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 18:39:58.002 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:58.408 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:58.409 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:58.409 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:39:58.409 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:58.576 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:58.578 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:39:58.579 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.586 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.598 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.598 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.598 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:39:58.601 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F9 AD 9A 63 6E 8C E3 14 7B 7B 9B 36 EE 45 9E 32 15 17 D9 4C BF BC 83 36 89 11 08 E1 C1 64 F4 D5",
#   "session id"          : "4D 3D 11 0E D3 79 22 D3 AF 14 46 B1 57 DF AB 1A BD 0B 26 5E F6 1C 0F 95 86 14 91 14 39 88 0F 50",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 CC 80 BC 65 ED A5 F8   C0 27 58 8C 2E 45 76 30  h...e....'X..Ev0
#             0010: 06 2D 03 E0 EF 6A A3 DD   A1 A1 03 3A DD 2F 6A 49  .-...j.....:./jI
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.719 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9B 41 49 3F 47 72 E8 06 88 FB 10 3C 19 D6 5C 7A 99 68 22 E9 13 A5 56 D2 41 3C B1 C7 7A EA A0 9F",
#   "session id"          : "4D 3D 11 0E D3 79 22 D3 AF 14 46 B1 57 DF AB 1A BD 0B 26 5E F6 1C 0F 95 86 14 91 14 39 88 0F 50",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 26 81 B5 96 64 83 17 CD   DA E1 A7 BA B2 DA 5A 21  &...d.........Z!
#           0010: 00 AC AB 6F 25 E0 F7 B4   28 1F E8 81 61 D5 EC 1F  ...o%...(...a...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.720 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.722 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.724 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.724 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.726 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.726 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.726 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.734 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.736 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.737 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.741 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.741 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.741 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.741 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.742 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.744 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.744 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.744 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.745 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.747 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.747 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.751 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "06 35 EE 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:27.000 UTC",
#       "not  after"         : "2023-12-27 18:39:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 ED DD 4F 2A D1 1F 34   44 4A 3A A5 93 44 17 E4  ...O*..4DJ:..D..
#           0010: 68 B9 2B 76                                        h.+v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.752 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.846 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 BA 30 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 18:39:25.000 UTC",
#     "not  after"         : "2023-12-27 18:39:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#         0010: 99 D3 B5 22                                        ..."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#         0010: 6B FE CD 7A                                        k..z
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.850 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D AA 71 3F 84 8D 86 97   B7 39 B3 85 DA AE A2 22  ..q?.....9....."
#     0010: CD 8C CD 82 C4 AE 55 53   BB B3 68 55 F4 2B 9D 07  ......US..hU.+..
#     0020: C3 42 2B 72 63 E6 44 7B   D2 5F 41 A8 67 49 E0 CA  .B+rc.D.._A.gI..
#     0030: 18 AD DA F7 45 AB 5B 5F   4D 5E B0 93 88 A3 D3 45  ....E.[_M^.....E
#     0040: C6 82 8F 08 0C BB 80 6F   69 93 DD 21 E4 27 69 56  .......oi..!.'iV
#     0050: 38 29 50 66 CC CF B5 06   41 20 40 BB 56 48 BB C2  8)Pf....A @.VH..
#     0060: 61 DE 34 A9 36 6C 9D B9   36 B4 4F 1C 9C 88 4D 98  a.4.6l..6.O...M.
#     0070: 0D 97 71 20 7E D9 9B C7   CD 04 41 68 94 FB 70 41  ..q ......Ah..pA
#     0080: 7D 66 6D BD 2E 3B 58 0F   C6 28 01 3A FD AD 2D 25  .fm..;X..(.:..-%
#     0090: EA 77 E2 8F 11 70 42 54   68 81 98 C3 21 A3 E0 73  .w...pBTh...!..s
#     00A0: 92 5B B7 D2 FD CF 33 77   D2 2B 92 37 05 20 01 F6  .[....3w.+.7. ..
#     00B0: 34 8E F6 60 4E A6 4F D1   70 D7 AA C8 85 40 93 47  4..`N.O.p....@.G
#     00C0: FB 59 4C 17 4E 49 43 F5   4A 98 C7 71 4D 44 22 10  .YL.NIC.J..qMD".
#     00D0: 61 20 43 A8 0A 45 C4 63   84 9B 55 3E E3 4F 6F F4  a C..E.c..U>.Oo.
#     00E0: 0B 49 68 AB 66 5A 49 CB   9F 7C 7F DA FE A6 92 78  .Ih.fZI........x
#     00F0: 36 43 48 4F AB E8 4A 16   41 A0 D7 3A 56 42 F2 F9  6CHO..J.A..:VB..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.852 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 EF 6E 16 4E 23 80 A7   15 77 06 70 F9 D5 D4 F5  p.n.N#...w.p....
#     0010: 4B E0 3C 39 96 F5 55 DC   7A A9 9B C1 0C FB 0A 06  K.<9..U.z.......
#     0020: 46 86 CF 9B 9A D4 2A 03   9B 39 38 6D DB 57 F3 A3  F.....*..98m.W..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.854 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:58.855 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.855 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:58.856 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.856 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 18:39:58.856 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:39:58.856 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.857 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.859 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6E 15 FD 92",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:31.000 UTC",
#       "not  after"         : "2023-12-27 18:39:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 7E AF 3F 0E 38 8F D4   AE 20 1D 1B 61 D1 BF 18  N..?.8... ..a...
#           0010: 66 EB 09 EC                                        f...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 BA 30 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:25.000 UTC",
#       "not  after"         : "2023-12-27 18:39:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#           0010: 99 D3 B5 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.884 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 22 10 AB DA EB 9E 89   12 23 B4 5E B6 5E 8A 33  R".......#.^.^.3
#     0010: CC 8B 55 DE D0 26 87 0E   46 4D 92 C9 68 F3 3B 42  ..U..&..FM..h.;B
#     0020: D5 6C A8 99 5C F6 53 75   C9 55 C8 AB CD 24 D9 30  .l..\.Su.U...$.0
#     0030: 53 3F B0 44 FC E2 73 49   61 28 7B 3B 78 46 1E C4  S?.D..sIa(.;xF..
#     0040: 95 7A 59 72 8C 63 B2 6F   5C 16 D6 6D 72 C8 6F 4F  .zYr.c.o\..mr.oO
#     0050: A2 A9 3B 9B A6 28 07 A7   2F 50 79 33 36 B4 CA 39  ..;..(../Py36..9
#     0060: 2F 42 BC 40 73 E3 C4 66   E1 FC 8C B3 82 B6 61 AB  /B.@s..f......a.
#     0070: 2A 84 0B B4 B4 B0 39 6B   5F F3 4D 15 75 01 1F F1  *.....9k_.M.u...
#     0080: ED 19 6D 47 C4 48 D3 47   F6 67 3F 68 50 5A 8A 31  ..mG.H.G.g?hPZ.1
#     0090: 71 C6 69 07 32 1D 00 E0   CD A7 21 18 9B AF BA E0  q.i.2.....!.....
#     00A0: 75 1E 41 DE 6A 09 D7 D6   7B 70 19 80 9A E9 7B E1  u.A.j....p......
#     00B0: C4 73 D3 EC EA 54 32 9D   88 E5 9E 48 AB 5B 4A 86  .s...T2....H.[J.
#     00C0: 66 6B AA DE C6 2A F6 CD   AC 86 A2 2D 34 AB D3 9B  fk...*.....-4...
#     00D0: 5C 89 2C 94 E9 D0 7E 56   6C 73 B3 D4 46 FC 01 7B  \.,....Vls..F...
#     00E0: 8A 79 B9 8F C7 40 B7 76   3F BA 10 4D 16 12 A5 F1  .y...@.v?..M....
#     00F0: 3D 28 03 E4 C2 1B CF 16   52 3A F7 BD 0A 24 6A 08  =(......R:...$j.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.886 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 89 91 A4 74 35 08 E6 0A   DC 52 D6 01 53 81 B3 BB  ...t5....R..S...
#     0010: 6A C0 3B 35 38 EB D7 65   1F 56 28 B5 F9 B5 B4 5F  j.;58..e.V(...._
#     0020: 19 AC E7 7A 3B 6D 29 7E   83 49 74 DC 02 73 4E 34  ...z;m)..It..sN4
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.887 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:39:58.941 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "67 A5 A8 59 C3 9A A0 F5 8E 89 4D AE 9F 41 16 2F 8C E1 B9 AB 4D 65 B5 E7 9C E4 AC CF EE 53 10 16",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 18:39:59.222 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 18:39:59.224 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 18:40:10.771; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 18:40:11.102 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 C1 B8 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:23.000 UTC",
#       "not  after"         : "2023-12-27 18:39:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#           0010: 99 D3 B5 22                                        ..."
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 BA 30 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 18:39:25.000 UTC",
#       "not  after"         : "2023-12-27 18:39:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 83 26 F9 E8 54 EA 01 71   79 77 14 BA 3A 4D EE EB  .&..T..qyw..:M..
#           0010: 99 D3 B5 22                                        ..."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F 3C 1B 44 90 FF 0A 0F   7B 2D 46 8A F5 85 0E 66  .<.D.....-F....f
#           0010: 6B FE CD 7A                                        k..z
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 18:40:11.118 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:40:11.264 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:40:11.265 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:40:11.265 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:40:11.265 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:40:11.366 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.367 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:40:11.369 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 18:40:11.369 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.388 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.389 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 18:40:11.392 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "15 3D 08 CB 28 4D 21 D7 51 E6 8B 0C 6D 04 E4 3B 17 81 BA 92 58 C9 1A 44 04 9F D7 A0 32 A4 EA C7",
#     "session id"          : "AE 66 B0 F4 00 08 1D 40 5F 90 7D 49 E9 3F 89 16 0E 6E BE 4C 68 9C 2E 34 C0 9B DA 36 52 E1 E5 06",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 85 95 6D 06 2C 7D F2 41   F3 57 4F 50 E1 C0 7A 93  ..m.,..A.WOP..z.
#               0010: 41 6D FA 09 D5 44 52 30   37 CA C6 FD 7B C0 05 38  Am...DR07......8
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.416 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B5 BE 5C 7B EA 1D 96 E8 69 F5 01 65 D8 D6 80 C8 93 97 54 71 AE AA 7A DC 51 45 49 F4 19 3F 21 E0",
#     "session id"          : "AE 66 B0 F4 00 08 1D 40 5F 90 7D 49 E9 3F 89 16 0E 6E BE 4C 68 9C 2E 34 C0 9B DA 36 52 E1 E5 06",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3A C8 49 48 7F 8D 34 DF   C9 73 02 B3 1E 02 6C 72  :.IH..4..s....lr
#             0010: DD 10 3B 55 56 4C AF 47   42 4A E8 E3 D8 24 9A 3F  ..;UVL.GBJ...$.?
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.416 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.416 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.417 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.418 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.419 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.419 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.419 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.421 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.421 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.421 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.422 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:40:11.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:40:11.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.430 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.432 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.433 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.437 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.437 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.437 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:40:11.438 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 18:40:11.440 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 18:41:31.024 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:41:31.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:41:31.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:41:31.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 18:41:31.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39576/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28245ms
ok 65 stop command for single port in 31312ms
ok 66 status detects locally running solr in 14425ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2176ms
ok 69 copying files around in 6678ms
ok 70 upconfig in 2702ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 28s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m50.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5565 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5565/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32925/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 15:18:05.963; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 15:18:05.969; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 15:18:06.943; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 15:18:06.987; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23306ms
ok 61 start solr with client truststore and security manager in 26749ms
not ok 62 start solr with mTLS needed in 59862ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-4FY7IZ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32925.
#
# Started Solr server on port 32925 (pid=201586). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32926.
#
# Started Solr server on port 32926 (pid=201989). Happy searching!
#
# INFO  - 2023-09-28 15:19:33.754; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 15:19:33.760; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 15:19:34.166; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 15:19:34.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 15:19:34.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:34.205 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 25 98 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:09.000 UTC",
#     "not  after"         : "2023-12-27 15:19:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 33 9A 63 B5 3C DB 0C   86 A0 71 12 FF 64 9F A6  .3.c.<....q..d..
#         0010: DB 2E 41 A2                                        ..A.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:34.210 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B 2A 22 BD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:00.000 UTC",
#     "not  after"         : "2023-12-27 15:19:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:34.226 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:34.323 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:34.324 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:34.324 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:34.324 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:34.475 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.476 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:34.478 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:34.478 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.486 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:34.504 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DF 9D FF 9E 63 91 56 BE 1C EA 36 28 90 E8 69 47 66 20 C4 F9 DC 04 C6 CC EC 47 28 6C 8F CF 2C D8",
#   "session id"          : "3F 06 17 8E 73 72 64 B7 90 62 7C A2 6C 77 61 F5 9E B8 A0 49 AA 6F A1 56 99 1B 07 D1 7B FF 77 6E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 95 A6 3A 08 7D FA E5 A6   EE 06 F0 43 C3 CE 3D AB  ..:........C..=.
#             0010: 17 8F 26 68 7C D9 3F 88   06 5F 39 27 F5 73 52 01  ..&h..?.._9'.sR.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.655 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BE 8C 46 7D CF 0B 46 ED 24 A6 F5 E9 12 91 55 52 54 FF F6 D0 F1 9B B9 69 42 6C 07 62 B0 29 09 70",
#   "session id"          : "3F 06 17 8E 73 72 64 B7 90 62 7C A2 6C 77 61 F5 9E B8 A0 49 AA 6F A1 56 99 1B 07 D1 7B FF 77 6E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E8 43 2D 01 BF DE F5 9C   0C 5E 08 91 77 84 DB C6  .C-......^..w...
#           0010: 1D 8C 2F 35 57 56 EE 3A   46 60 FC 0F 6A 80 0D 39  ../5WV.:F`..j..9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.655 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.656 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.657 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.658 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.658 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.658 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.660 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.660 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.660 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.661 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.662 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.671 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.673 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.675 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.684 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.684 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.685 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.687 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.689 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.690 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.690 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.694 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 B1 95 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:05.000 UTC",
#       "not  after"         : "2023-12-27 15:19:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 3F E8 6C 2C 85 B8 B1   A6 61 D0 42 BD 5A 78 6E  .?.l,....a.B.Zxn
#           0010: D4 14 B4 DB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.694 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.783 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.790 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 11 EA 4C F6 96 2F 48   80 B6 98 3E 17 FE E3 9F  H..L../H...>....
#     0010: A6 B1 40 B1 79 70 E5 41   F5 0C 5A 7C 17 15 A0 B8  ..@.yp.A..Z.....
#     0020: EC CB 25 9F 38 15 1F A6   E8 82 1C AC 15 9B D0 86  ..%.8...........
#     0030: B5 C5 21 20 CB EE 92 9F   06 13 B6 E6 88 81 FF 11  ..! ............
#     0040: 6C 6B 06 1A 2D CE 2B C9   CF F4 03 BD 6C A0 E3 34  lk..-.+.....l..4
#     0050: 61 74 0D 38 D8 FE 11 CC   C9 79 78 17 4A 0A 56 44  at.8.....yx.J.VD
#     0060: 74 09 B3 F7 1B 18 D2 43   C2 35 7D 69 2A 0D 50 1D  t......C.5.i*.P.
#     0070: 76 06 23 43 F7 6C 83 17   9A 1A C4 3F F5 B8 58 81  v.#C.l.....?..X.
#     0080: 96 87 DD 28 D6 A2 5F 26   65 81 B9 36 23 33 E6 4A  ...(.._&e..6#3.J
#     0090: B6 45 57 6B 9C 94 00 72   25 12 20 E2 55 2B 47 FE  .EWk...r%. .U+G.
#     00A0: 54 90 DA 50 55 A3 F0 65   BB 43 7F 59 48 58 72 DF  T..PU..e.C.YHXr.
#     00B0: 12 ED CF AA D0 52 54 21   F7 C0 36 BB B6 E2 51 68  .....RT!..6...Qh
#     00C0: 50 B3 BD 09 20 8E F9 8E   9F 0C D2 F6 B1 0D AC 99  P... ...........
#     00D0: EC 75 0E 60 FD 93 7E 27   83 DB 91 EC 03 C7 A2 D2  .u.`...'........
#     00E0: D5 1D F3 83 67 4E E7 B6   BC 5A 07 9D 22 CA 66 9D  ....gN...Z..".f.
#     00F0: F1 BF AE 8B 2F 8A A6 20   5E E8 28 03 B6 28 FF 72  ..../.. ^.(..(.r
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.792 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A5 6D CC 83 22 34 09 94   BA B0 73 62 E6 E4 AF B2  .m.."4....sb....
#     0010: 9E 1C C4 39 C4 3E E2 0F   47 26 59 EF E0 91 13 67  ...9.>..G&Y....g
#     0020: 58 85 E8 4A C4 7B BB 5C   DF FF E2 CD 8F C9 6A 1F  X..J...\......j.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.796 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:34.797 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.798 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:34.798 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.798 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:34.798 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:34.798 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.799 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.802 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 25 98 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:09.000 UTC",
#       "not  after"         : "2023-12-27 15:19:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 33 9A 63 B5 3C DB 0C   86 A0 71 12 FF 64 9F A6  .3.c.<....q..d..
#           0010: DB 2E 41 A2                                        ..A.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 E8 08 1A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:02.000 UTC",
#       "not  after"         : "2023-12-27 15:19:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#           0010: 34 94 5A BC                                        4.Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.846 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5C F0 A7 5E 0F 6F DA 50   1A 78 C7 F7 6C 30 67 19  \..^.o.P.x..l0g.
#     0010: 98 01 ED 8D 3B CB E7 5C   B5 0D BD CE CB E7 EF 93  ....;..\........
#     0020: 60 ED 94 67 B6 94 BC 58   6E CA 7A E7 B2 A9 0E 5C  `..g...Xn.z....\
#     0030: FF A1 C9 15 15 05 2A 71   C2 C2 86 7F E9 9D 26 D3  ......*q......&.
#     0040: 2E B8 80 56 D8 8F 42 D0   77 59 4B 74 45 AD 30 3F  ...V..B.wYKtE.0?
#     0050: B4 1B 39 26 08 E0 E4 D1   32 43 0D DF D5 CA 62 93  ..9&....2C....b.
#     0060: E0 EF EF 50 ED 1B F6 F7   30 58 1C 7F 4E 4A AE 8D  ...P....0X..NJ..
#     0070: 25 FE A7 0B 2A 61 43 FE   23 AE 2E 8A EB B1 57 11  %...*aC.#.....W.
#     0080: 6D E7 6F A0 24 7C F1 AB   3D 2C B6 98 B0 46 74 C8  m.o.$...=,...Ft.
#     0090: CC D4 60 D0 20 FA DA 12   5A 67 9C 7D 01 15 85 EC  ..`. ...Zg......
#     00A0: B0 00 BD 1D 36 52 51 EB   18 C1 68 FA FB 8B B4 D2  ....6RQ...h.....
#     00B0: 31 F4 4F 96 2E D1 E8 D5   92 47 BB 12 67 09 27 67  1.O......G..g.'g
#     00C0: B9 45 18 64 96 EC 8B 3C   95 40 C8 6E AA FD 85 63  .E.d...<.@.n...c
#     00D0: F9 32 FD 5A 50 71 D0 F9   A0 1E 55 23 A0 B9 2C B7  .2.ZPq....U#..,.
#     00E0: 22 51 67 AA 9B AA 04 9A   B8 5C D2 AC B7 1E A9 B5  "Qg......\......
#     00F0: 64 AE 13 99 43 4D 06 E4   A0 3B A4 CE 7D AA D9 30  d...CM...;.....0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.848 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 73 C4 E2 8F DE 4C 2A 92   14 D6 3C CD F8 8D C8 3D  s....L*...<....=
#     0010: F1 30 6A F4 80 3B 62 23   3C 2C 9E 43 4F CC 3D C6  .0j..;b#<,.CO.=.
#     0020: 5A 5E 83 2C EE DB F6 D4   7C 4A BC 12 F6 47 67 68  Z^.,.....J...Ggh
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.849 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:34.902 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C2 D6 D1 96 4C 8A A0 68 31 17 D3 26 CE 3A 20 A3 31 EB 94 78 47 4A 6D D5 15 43 88 D7 0F 07 8E E2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 15:19:35.187 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 15:19:35.188 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 15:19:36.230; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 15:19:36.236; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 15:19:36.618; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 15:19:36.621; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 15:19:36.622; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4FY7IZ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:36.656 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 25 98 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:09.000 UTC",
#     "not  after"         : "2023-12-27 15:19:09.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 33 9A 63 B5 3C DB 0C   86 A0 71 12 FF 64 9F A6  .3.c.<....q..d..
#         0010: DB 2E 41 A2                                        ..A.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:36.662 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6B 2A 22 BD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:00.000 UTC",
#     "not  after"         : "2023-12-27 15:19:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:36.678 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:36.794 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:36.795 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:36.795 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:19:36.796 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:36.933 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.933 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:36.935 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:36.935 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.941 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.955 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.956 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:36.959 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "00 E3 7A 9C 9C DA FB 62 D1 A2 FB 07 B5 A2 7F 0E D4 DC FF C4 AF EB EC 99 2C 48 2D 81 C3 9B 05 38",
#   "session id"          : "8A 40 36 C2 6C 48 A9 9F A0 75 97 A7 E2 91 61 08 0E 35 2F 79 BA 19 2F 6A 3C 38 D4 C8 FB 4D 46 9D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 93 B0 CF 95 AB D2 ED 65   A7 2E A9 DA 7F 5F EA BC  .......e....._..
#             0010: 7B 09 A7 5E 04 D0 9A 83   99 1D 06 99 62 17 BC 4A  ...^........b..J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.102 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1C 4B 39 18 AC B6 30 C1 DC 02 D2 BF E9 E2 1B 1D F1 49 EA B3 19 B3 06 20 0E CE 42 BF 7F 81 25 79",
#   "session id"          : "8A 40 36 C2 6C 48 A9 9F A0 75 97 A7 E2 91 61 08 0E 35 2F 79 BA 19 2F 6A 3C 38 D4 C8 FB 4D 46 9D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1A 26 B6 B2 6B D4 FA 16   1B 95 9A 44 C7 02 83 A9  .&..k......D....
#           0010: B0 C7 C7 7C D3 8D 99 DB   55 C4 1C 40 52 A2 D0 7A  ........U..@R..z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.102 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.103 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.107 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.108 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.110 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.119 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.121 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.122 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.131 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.135 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.135 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.135 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.136 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.137 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.137 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.138 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.141 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 B1 95 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:05.000 UTC",
#       "not  after"         : "2023-12-27 15:19:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 3F E8 6C 2C 85 B8 B1   A6 61 D0 42 BD 5A 78 6E  .?.l,....a.B.Zxn
#           0010: D4 14 B4 DB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.142 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.233 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 E8 08 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 15:19:02.000 UTC",
#     "not  after"         : "2023-12-27 15:19:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#         0010: 34 94 5A BC                                        4.Z.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#         0010: 2D 09 8E D5                                        -...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.240 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D 51 44 05 55 02 B7 C7   8D B0 71 FA ED 21 96 3B  .QD.U.....q..!.;
#     0010: 06 D7 FE CB 4C E7 34 D6   97 41 36 8E 1E DB 4D 2A  ....L.4..A6...M*
#     0020: B1 61 5A 2D A1 69 D9 9E   C9 89 D3 4D 4A 6F 41 88  .aZ-.i.....MJoA.
#     0030: 38 EE 2F B2 63 8B B0 AC   A9 3A E7 55 17 7C 0E DB  8./.c....:.U....
#     0040: AC 01 4D 78 8A 84 D9 D0   8B 24 C1 39 A1 FD 84 A1  ..Mx.....$.9....
#     0050: 9B 11 80 4E F9 F9 01 90   A1 7D 48 54 3F 43 FF 04  ...N......HT?C..
#     0060: 60 CA 1E 82 06 9F 60 4F   74 DE 03 A4 C6 FF 81 5C  `.....`Ot......\
#     0070: B7 6D D1 D6 80 92 34 17   EC 6C B4 C9 C0 3C 00 BA  .m....4..l...<..
#     0080: C0 3E FF 53 14 6C C7 C9   EF 0F 14 20 B5 85 34 93  .>.S.l..... ..4.
#     0090: B3 C3 7E 64 A7 9D BF 83   55 C5 14 2F C6 37 5E D1  ...d....U../.7^.
#     00A0: 86 5C 50 EF BE 1E 32 52   8E 98 E0 2D 82 AC 21 00  .\P...2R...-..!.
#     00B0: D8 04 14 64 50 33 8D E4   1E 42 BC 10 81 F1 BA B7  ...dP3...B......
#     00C0: 56 87 79 33 0E 52 25 AE   3B 02 6E CC 83 CB DE ED  V.y3.R%.;.n.....
#     00D0: B4 91 3F FF D5 A2 EF FA   C2 CD 7E 2C 40 1E 25 A6  ..?........,@.%.
#     00E0: D8 9C 89 CB 21 91 82 57   17 72 07 7D B5 0B D3 E7  ....!..W.r......
#     00F0: 27 99 DD 09 84 CB 66 4B   E5 0A 9A E0 A2 59 A9 16  '.....fK.....Y..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.242 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5B 0F 88 13 61 B1 2A 47   87 23 9F 3F 40 A8 B0 1D  [...a.*G.#.?@...
#     0010: 94 59 31 B6 8B E6 64 10   A4 2E AB 18 67 F7 E3 FC  .Y1...d.....g...
#     0020: 44 5E E4 57 D2 B0 39 BC   0B AA F9 CC 04 54 18 A9  D^.W..9......T..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:37.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.247 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:37.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.248 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 15:19:37.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:37.248 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.248 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.252 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 25 98 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:09.000 UTC",
#       "not  after"         : "2023-12-27 15:19:09.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 33 9A 63 B5 3C DB 0C   86 A0 71 12 FF 64 9F A6  .3.c.<....q..d..
#           0010: DB 2E 41 A2                                        ..A.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 E8 08 1A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:02.000 UTC",
#       "not  after"         : "2023-12-27 15:19:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#           0010: 34 94 5A BC                                        4.Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.294 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 81 8C 50 8C 02 F0 09 81   BC 83 CC 0D F8 55 70 E1  ..P..........Up.
#     0010: FE 58 96 93 2F B3 6C EA   6C 84 92 63 4E 07 A3 CB  .X../.l.l..cN...
#     0020: 80 07 F3 95 20 D6 2B 0A   56 73 E5 CE 5B 8D AB 06  .... .+.Vs..[...
#     0030: A4 D3 0D 31 87 6C CF 9E   0B 28 AA 6C 01 34 FF 8D  ...1.l...(.l.4..
#     0040: 61 6E 51 10 48 23 4F EC   DB 14 5E 8B BB 38 70 95  anQ.H#O...^..8p.
#     0050: B0 E2 15 A7 27 E1 CE 65   3B 45 46 60 4E 92 5F EA  ....'..e;EF`N._.
#     0060: 30 FF EB 2D 28 F5 F3 F9   C9 8F EF 47 E1 DA EB 08  0..-(......G....
#     0070: D1 79 2C 8C 6A 6E 66 AB   D4 63 BF 35 E1 6D 90 6E  .y,.jnf..c.5.m.n
#     0080: E3 A9 64 09 52 49 5D 9F   FC 74 B2 D8 61 67 07 76  ..d.RI]..t..ag.v
#     0090: C6 BB 1F 23 E0 F5 DD 11   8D 58 0B A7 B8 97 C3 BE  ...#.....X......
#     00A0: D1 B3 57 E4 14 35 AC 0E   0D D3 CF A5 E5 4D C7 54  ..W..5.......M.T
#     00B0: 8F B2 32 66 02 BE 25 41   0F 58 22 72 BE A2 7F FC  ..2f..%A.X"r....
#     00C0: B8 99 D2 75 31 F2 E4 77   56 7B C9 6C 60 B4 3D 28  ...u1..wV..l`.=(
#     00D0: 0E 20 E7 6B C5 5B 0D FF   00 57 3D AC 5A 6E C1 9C  . .k.[...W=.Zn..
#     00E0: D0 A5 96 1B 5F 15 06 7E   ED 6E 3A BE 25 BB 99 EE  ...._....n:.%...
#     00F0: 45 EB 87 89 B1 79 52 47   BC 9A 84 C4 1F 2F 12 B7  E....yRG...../..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.296 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 2E 0A 01 A1 C0 78 CF   FE F6 CF FA E8 68 08 06  c.....x......h..
#     0010: 30 9C 67 4A B1 03 02 62   7D D3 09 D2 A3 5D EE 1B  0.gJ...b.....]..
#     0020: 34 72 23 C7 A6 06 41 C0   DD EB 5B 40 B0 67 A4 2C  4r#...A...[@.g.,
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.296 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:37.348 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A4 06 C1 8B 96 94 6D 0D 8D BB 2E 37 89 A2 65 DC 69 54 00 3F 2A 8C 63 BA 85 69 57 EA 0C CC 0C 75",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 15:19:37.630 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 15:19:37.631 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 15:19:49.450; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:49.814 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B 2A 22 BD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:00.000 UTC",
#       "not  after"         : "2023-12-27 15:19:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#           0010: 34 94 5A BC                                        4.Z.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 E8 08 1A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 15:19:02.000 UTC",
#       "not  after"         : "2023-12-27 15:19:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FF 9D DB 4E 03 84 93 29   9E 76 95 D3 F9 8A 20 30  ...N...).v.... 0
#           0010: 34 94 5A BC                                        4.Z.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 81 BB CC F9 9F 78 51   3A 16 50 1F FC D5 8B B2  ......xQ:.P.....
#           0010: 2D 09 8E D5                                        -...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 15:19:49.834 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:50.091 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.092 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:50.094 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 15:19:50.094 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.101 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.115 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.116 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.116 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 15:19:50.120 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "57 85 3B A3 90 89 7C F9 45 AC CB 40 71 3B 58 FF 0E DF F7 EF 4A 12 E2 47 4B 4F 9C 24 45 E2 39 DE",
#     "session id"          : "D5 73 34 FA 68 CC A3 E0 12 7A 6E 11 23 90 34 65 19 B2 53 94 66 7E 63 62 DA 45 6A 81 14 0A 5D 69",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4C 36 56 61 7D BE 5F 3A   B3 B2 A4 F1 D8 D8 BE D2  L6Va.._:........
#               0010: 17 2F 32 51 70 90 9D 96   5F D7 BD 3A 5E 7E F1 10  ./2Qp..._..:^...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.140 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 DE 04 80 8B 03 7C E5 5B C3 73 9F 5E D4 E1 D0 B5 90 F1 CA 55 20 81 44 2D 3C 9D 19 37 86 50 A5",
#     "session id"          : "D5 73 34 FA 68 CC A3 E0 12 7A 6E 11 23 90 34 65 19 B2 53 94 66 7E 63 62 DA 45 6A 81 14 0A 5D 69",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4A 7F E6 97 C9 8A F4 BB   27 9D 44 43 45 15 CF 8F  J.......'.DCE...
#             0010: 26 24 03 3F 95 9A FF 39   B1 D6 D7 FE 94 9E 4A 51  &$.?...9......JQ
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.141 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.141 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.144 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.146 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.159 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.160 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.169 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:19:50.170 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 15:19:50.172 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 15:21:14.787 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:21:14.834 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:21:14.835 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:21:14.835 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 15:21:14.835 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32926/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28446ms
ok 65 stop command for single port in 31514ms
ok 66 status detects locally running solr in 14554ms
ok 67 status does not expose cli parameters to end user in 252ms
ok 68 listing out files in 2280ms
ok 69 copying files around in 6911ms
ok 70 upconfig in 2896ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1266ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1274ms
ok 73 Cleanup in 1244ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 29s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m57.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5564 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5564/

All tests passed

Build Log:
[...truncated 1327 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43217/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 13:17:47.832; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 13:17:47.838; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 13:17:48.853; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 13:17:48.893; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22583ms
ok 61 start solr with client truststore and security manager in 24674ms
not ok 62 start solr with mTLS needed in 56555ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2BRaAE/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43217.
#
# Started Solr server on port 43217 (pid=200583). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43218.
#
# Started Solr server on port 43218 (pid=201005). Happy searching!
#
# INFO  - 2023-09-28 13:19:11.077; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 13:19:11.082; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 13:19:11.444; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 13:19:11.447; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 13:19:11.447; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:11.480 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 59 91 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:47.000 UTC",
#     "not  after"         : "2023-12-27 13:18:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 79 59 48 45 67 1D 79   7F 76 31 30 86 D6 7E 24  6yYHEg.y.v10...$
#         0010: 87 82 D7 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:11.485 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 89 97 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:39.000 UTC",
#     "not  after"         : "2023-12-27 13:18:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:11.501 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:11.730 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.730 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:11.732 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:11.732 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.738 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.749 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:11.752 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E4 59 C8 68 E7 A8 D1 6E FB 2F 16 03 AA 7F BF 08 61 40 15 52 1F 96 AF 92 C9 D9 6C E4 76 D0 F3 AD",
#   "session id"          : "93 78 89 2E 74 B4 B3 AC E7 F7 1D FD 1C 94 97 34 1E 19 C6 BD 69 CD 7E 86 F8 DD EE 7F 93 00 B0 DD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 20 8A D7 25 70 38 62   0D 74 71 1D 72 AE 80 93  . ..%p8b.tq.r...
#             0010: FE E5 64 AD 4A 8A AA 62   9B B8 DE 99 D2 95 11 52  ..d.J..b.......R
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.874 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "43 CA EB 41 E5 62 A1 F8 21 AA 9D 79 1B F8 E6 2D BA 94 D3 15 52 3C 83 B1 ED 44 7C 16 7D A7 91 CB",
#   "session id"          : "93 78 89 2E 74 B4 B3 AC E7 F7 1D FD 1C 94 97 34 1E 19 C6 BD 69 CD 7E 86 F8 DD EE 7F 93 00 B0 DD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6C 0D 99 5E 17 09 B8 B2   09 38 8E FA 18 E4 7D B1  l..^.....8......
#           0010: 45 6A 0F 08 D0 D5 6C 28   A2 72 DE D4 30 F9 F0 64  Ej....l(.r..0..d
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.874 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.875 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.875 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.876 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.877 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.877 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.878 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.879 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.879 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.879 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.880 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.881 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.888 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.889 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.890 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.894 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.894 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.894 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.894 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.895 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.895 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.895 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.896 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.897 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.897 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.897 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.898 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.899 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.899 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.902 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 F0 8B 63",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:43.000 UTC",
#       "not  after"         : "2023-12-27 13:18:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 7D 50 04 F6 62 A3 7F   22 AA 00 7B A4 CE 73 E3  ..P..b..".....s.
#           0010: BF 62 FB FC                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.902 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:11.957 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:11.958 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:11.958 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:11.958 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.981 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.985 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A AF C4 E0 D4 82 8E F4   C6 F0 C6 55 DF 15 16 48  J..........U...H
#     0010: 78 6D CD 53 C0 C9 5C DA   25 D0 1C 52 3B DC D1 02  xm.S..\.%..R;...
#     0020: 78 86 E2 C7 BB E8 B7 56   45 32 83 8A 57 49 2D F5  x......VE2..WI-.
#     0030: 29 27 D7 26 75 1A 68 C3   EF 71 B6 36 99 C9 F4 A2  )'.&u.h..q.6....
#     0040: AE 70 2A 49 B0 0D 10 B8   B4 59 86 5B 1F 4A DD 1E  .p*I.....Y.[.J..
#     0050: A4 DA ED D0 D0 4C 4C 46   CE C6 55 D1 BF 7A 13 CF  .....LLF..U..z..
#     0060: 02 D1 18 FC B7 E3 24 1B   1E B2 FD 7E 73 96 29 65  ......$.....s.)e
#     0070: 91 92 52 8A 39 36 37 3E   8F 0A 40 65 86 2A B9 A4  ..R.967>..@e.*..
#     0080: D4 A0 47 69 5F F7 53 24   4D 6B 1D 35 EE DC 37 B9  ..Gi_.S$Mk.5..7.
#     0090: 7F DE CC 27 22 92 87 2B   D6 48 B0 89 07 6B 27 4B  ...'"..+.H...k'K
#     00A0: 30 59 93 99 24 61 06 71   E2 3A 96 BF 0B 29 A4 FF  0Y..$a.q.:...)..
#     00B0: C7 A3 39 D7 2B 6A 5A 80   24 C2 10 C0 1A 8E 97 E6  ..9.+jZ.$.......
#     00C0: E4 7F BE 4A 97 97 C6 B8   00 9E 88 41 3C CD 64 42  ...J.......A<.dB
#     00D0: 0D 54 E5 98 F7 14 AC 0A   CF F0 2B ED 13 33 16 C0  .T........+..3..
#     00E0: F2 34 C6 79 90 50 07 5F   EF 75 38 67 2A C5 FD 7F  .4.y.P._.u8g*...
#     00F0: 93 D0 4F 41 29 A9 F7 49   3A D1 42 FB D0 D1 7B 4A  ..OA)..I:.B....J
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.987 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 8A C6 7C 2C 30 F8 9B   E5 E2 56 AB 52 1C DF FA  ....,0....V.R...
#     0010: 5C ED 55 11 CE 46 A2 B2   11 C6 C8 CF 6C F2 F8 EF  \.U..F......l...
#     0020: DB 04 44 40 C2 52 FD DC   1A 76 02 80 64 D1 DD 00  ..D@.R...v..d...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.989 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:11.990 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.990 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:11.991 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.991 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:11.991 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:11.991 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.992 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:11.995 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 59 91 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:47.000 UTC",
#       "not  after"         : "2023-12-27 13:18:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 79 59 48 45 67 1D 79   7F 76 31 30 86 D6 7E 24  6yYHEg.y.v10...$
#           0010: 87 82 D7 06                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1F E3 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:41.000 UTC",
#       "not  after"         : "2023-12-27 13:18:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#           0010: E0 E0 EF 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:12.020 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 90 E5 70 C3 1B 44 5D 78   06 6F CE 22 44 FB 5F D7  ..p..D]x.o."D._.
#     0010: 8D 5A 35 A4 16 06 B0 79   73 3B F3 53 AC 8D 4C B7  .Z5....ys;.S..L.
#     0020: 28 45 12 0E 84 95 58 D4   5A D7 B0 F5 4F 2E D0 64  (E....X.Z...O..d
#     0030: 5D 91 DA 4A 0C 84 AA 75   BD AE A2 F5 9F 30 56 66  ]..J...u.....0Vf
#     0040: 18 69 72 FD 73 98 9E 20   0F D7 E4 75 7E 03 E3 C1  .ir.s.. ...u....
#     0050: EE AE 5C 67 4B 7D A2 E3   F3 39 6E 77 20 76 FA D1  ..\gK....9nw v..
#     0060: D2 0C 6E 49 6F 61 A2 4D   93 D8 0E 0C 8C 85 88 7D  ..nIoa.M........
#     0070: 5E 12 A8 70 58 07 1A 4E   ED B4 BB 57 B2 B4 92 ED  ^..pX..N...W....
#     0080: 35 55 43 8C B7 B7 07 78   3C 53 5E 79 BA 48 C8 76  5UC....x<S^y.H.v
#     0090: 8D 5B 8C 59 D6 15 40 41   32 84 79 A6 74 0D F7 B7  .[.Y..@A2.y.t...
#     00A0: CB 33 8E 69 AD D6 43 F6   E9 12 37 1A E4 07 74 92  .3.i..C...7...t.
#     00B0: 5F 7A C0 7B A3 08 05 EE   FE 54 E4 A6 98 BF 1C 3F  _z.......T.....?
#     00C0: 10 25 E9 C0 F2 DC 67 37   66 22 83 63 90 2B 88 88  .%....g7f".c.+..
#     00D0: 7D 34 F5 39 31 02 35 45   6F B2 AD 8D 32 AA AB 64  .4.91.5Eo...2..d
#     00E0: DC FC 3D 8E B1 A8 C4 6B   5A 5B 46 3A 77 E5 57 74  ..=....kZ[F:w.Wt
#     00F0: 82 18 72 17 59 78 CA 21   CC D4 F8 3B 33 D9 00 C4  ..r.Yx.!...;3...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:12.022 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D4 FA 46 D4 5B F4 0E EC   32 00 EB 44 34 9C 91 87  ..F.[...2..D4...
#     0010: B6 B5 13 8D 70 07 02 A4   5F CC 12 DC F0 5C A1 8C  ....p..._....\..
#     0020: E3 D3 41 99 98 8D CA 56   C2 00 65 B2 EF 88 7E DB  ..A....V..e.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:12.023 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:12.072 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 4C DD F6 C0 E2 9E 5E 06 2E 0C F8 ED F2 4A 3A 14 7A E0 B0 26 6A 36 E8 0D 71 50 E8 1F C6 C3 A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 13:19:12.341 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 13:19:12.342 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 13:19:13.272; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 13:19:13.278; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 13:19:13.683; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604c5de8(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 13:19:13.686; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 13:19:13.686; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(ca,h=[localhost],a=[],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2BRaAE/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:13.718 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 59 91 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:47.000 UTC",
#     "not  after"         : "2023-12-27 13:18:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 79 59 48 45 67 1D 79   7F 76 31 30 86 D6 7E 24  6yYHEg.y.v10...$
#         0010: 87 82 D7 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:13.723 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 89 97 FA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:39.000 UTC",
#     "not  after"         : "2023-12-27 13:18:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:13.737 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:14.061 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:14.062 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:14.063 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:19:14.063 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:14.209 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.209 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:14.211 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:14.211 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.217 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.228 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.229 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.229 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:14.231 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6C 47 C9 C5 67 2F 6E 26 86 63 DF D3 37 F4 42 CE 37 70 E2 4A 34 93 30 4D FA 45 F5 E4 89 C8 5C C8",
#   "session id"          : "AE 50 AF 99 6E B2 FA F5 50 6A E9 AB E0 D0 20 83 D5 D7 69 9C BB EC DC 8B 9E FA EC 62 BF 66 6D CA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 22 0E 39 AE BD A6 89 AB   7E 4B 21 C3 82 15 C2 E4  ".9......K!.....
#             0010: 34 B0 49 C0 EF 8A D2 81   C2 69 48 BD 7A 3D 91 4B  4.I......iH.z=.K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.332 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DF 14 46 DB 2F E8 3E 51 AE 31 AF AA 9D C2 2C B0 35 8C 2F 40 B7 EC 43 D2 40 78 AC 66 BA 1E 35 19",
#   "session id"          : "AE 50 AF 99 6E B2 FA F5 50 6A E9 AB E0 D0 20 83 D5 D7 69 9C BB EC DC 8B 9E FA EC 62 BF 66 6D CA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 04 8A FF EA 74 C9 09 9E   59 E9 E3 BF 1E 5E 26 70  ....t...Y....^&p
#           0010: F5 99 B7 22 2D C2 09 DB   08 93 4E 4B B8 FB EC 01  ..."-.....NK....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.333 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.333 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.335 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.337 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.337 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.337 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.337 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.338 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.346 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.347 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.348 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.352 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.352 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.352 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.352 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.353 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.353 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.353 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.355 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.355 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.355 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.356 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.356 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.357 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.360 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 F0 8B 63",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:43.000 UTC",
#       "not  after"         : "2023-12-27 13:18:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 7D 50 04 F6 62 A3 7F   22 AA 00 7B A4 CE 73 E3  ..P..b..".....s.
#           0010: BF 62 FB FC                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.360 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.465 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1F E3 3E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 13:18:41.000 UTC",
#     "not  after"         : "2023-12-27 13:18:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#         0010: E0 E0 EF 9B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#         0010: 4E A5 31 55                                        N.1U
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.469 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 81 C1 40 D5 51 2A CE 99   DE 56 EB 29 8E 98 9B 22  ..@.Q*...V.)..."
#     0010: 2F C9 69 D7 1D 60 2A DD   A8 A7 9E 2E 73 98 CF 72  /.i..`*.....s..r
#     0020: 5A FE 13 C3 59 6E 38 24   87 A5 09 58 0C 61 45 E4  Z...Yn8$...X.aE.
#     0030: 9E 8A C9 47 03 8A E0 24   65 51 A4 A5 62 96 C8 65  ...G...$eQ..b..e
#     0040: 26 E8 4B 45 F3 84 07 55   CC AF F6 31 29 11 50 F4  &.KE...U...1).P.
#     0050: 22 18 F0 AD C2 6C 6E A2   13 F0 4F CC C0 54 AA CD  "....ln...O..T..
#     0060: C4 F8 EF 3D 0E F0 D4 68   5B C4 49 4C B6 E8 1F 91  ...=...h[.IL....
#     0070: 74 B8 B7 86 E0 23 27 47   2E 52 0D 22 12 4C 2E 97  t....#'G.R.".L..
#     0080: C0 68 93 24 A8 29 CD FE   02 02 5B 3D DA 8B 10 E2  .h.$.)....[=....
#     0090: BD 41 CC E6 44 B2 D8 F2   54 0A 3C 33 68 35 5C 11  .A..D...T.<3h5\.
#     00A0: FF 3E 9A 06 6F 59 D7 CA   16 41 4A 92 B3 C6 B7 13  .>..oY...AJ.....
#     00B0: C7 3A C1 86 96 89 A6 03   0F 48 F1 00 33 B7 71 25  .:.......H..3.q%
#     00C0: A8 49 0B 05 E1 DD A1 9C   71 B4 AC 92 14 0A EB 8E  .I......q.......
#     00D0: C3 59 1B C1 4D BE 17 69   02 A8 63 38 25 47 57 C6  .Y..M..i..c8%GW.
#     00E0: D5 2E 7B B4 A6 FC E5 44   B3 30 57 E1 54 8B CB 2C  .......D.0W.T..,
#     00F0: B0 2A F9 C1 C4 30 F4 5A   28 02 C7 7E 0B C4 E8 DE  .*...0.Z(.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.471 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 58 73 D0 61 BF 39 88   22 96 CE 37 C7 F7 EF F7  xXs.a.9."..7....
#     0010: 15 C2 79 1A 00 F5 92 9B   E1 B0 B4 46 65 CA B9 DA  ..y........Fe...
#     0020: 37 1B 80 F0 DE C6 0C 0E   8C D4 89 15 E1 C8 CF DB  7...............
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.473 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:14.474 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.475 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:14.475 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.475 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 13:19:14.476 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:14.476 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.476 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.480 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 59 91 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:47.000 UTC",
#       "not  after"         : "2023-12-27 13:18:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 79 59 48 45 67 1D 79   7F 76 31 30 86 D6 7E 24  6yYHEg.y.v10...$
#           0010: 87 82 D7 06                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1F E3 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:41.000 UTC",
#       "not  after"         : "2023-12-27 13:18:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#           0010: E0 E0 EF 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.506 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 12 EE A0 15 0A 4D 50   E3 E3 1B F4 3D BB A7 BD  7.....MP....=...
#     0010: 1B 17 C3 0E 45 7F 40 F6   B0 84 99 86 70 86 32 7C  ....E.@.....p.2.
#     0020: F9 FA 77 91 0D 9A 0E AB   3E DC 26 6E 1C F0 50 FC  ..w.....>.&n..P.
#     0030: DD 8C 89 B6 BF 38 27 DB   65 49 FD 89 AD 7B 9E EA  .....8'.eI......
#     0040: 2C 55 4A 18 EA 0B C7 28   45 4A 3C 2B 98 9F DB 60  ,UJ....(EJ<+...`
#     0050: ED 43 5A 9D 9C 33 73 A2   76 63 CE 91 12 EB B3 26  .CZ..3s.vc.....&
#     0060: 86 EF 47 6F 0B 20 82 61   4A 40 DD 8A 1E D0 76 00  ..Go. .aJ@....v.
#     0070: F6 F0 EB FD A5 C7 0A CD   AA 9D C5 B3 61 F2 E3 1B  ............a...
#     0080: 2F 54 D4 E3 06 81 9B FB   9B 5A 37 B3 CC FD 14 D1  /T.......Z7.....
#     0090: 93 5B 7B 95 0F A3 43 F8   24 76 39 E9 CB C8 EE 0B  .[....C.$v9.....
#     00A0: 03 62 D4 59 CD 31 BC 10   23 F7 C3 D0 B6 8B EB C1  .b.Y.1..#.......
#     00B0: 36 99 C2 4F 4A 53 44 B5   35 84 A8 55 71 08 F5 EC  6..OJSD.5..Uq...
#     00C0: F0 A2 9B 4E 81 40 D8 4E   F6 E7 A0 14 AE 6F 56 8E  ...N.@.N.....oV.
#     00D0: 4F C7 07 BB 7E F8 24 83   B5 E4 EB 4F 9F 6C ED A0  O.....$....O.l..
#     00E0: 5E DD E0 A2 D9 15 32 D6   FE 7F 4B DD 48 F1 00 23  ^.....2...K.H..#
#     00F0: C9 7F 27 7F 5F C0 13 C9   3C B8 09 D7 F8 2B F0 EB  ..'._...<....+..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.507 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4D DF 42 C6 F7 EB FB E0   3F 0B 6F F5 BC 2A 55 2E  M.B.....?.o..*U.
#     0010: 77 5C BC A5 19 D1 2A 05   27 F1 D7 47 98 2F 86 4D  w\....*.'..G./.M
#     0020: 6F 3F 60 CC 7A D6 F6 F5   57 4D DA B7 E4 AF 59 4A  o?`.z...WM....YJ
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.508 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:14.556 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "57 FD 01 AF BC 84 31 E3 F7 0B E0 0C BB 21 AC 60 85 78 E1 E0 24 C9 C2 D3 A5 CC 77 32 6E CE 02 A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 13:19:14.823 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 13:19:14.824 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 13:19:25.598; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:25.931 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 89 97 FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:39.000 UTC",
#       "not  after"         : "2023-12-27 13:18:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#           0010: E0 E0 EF 9B                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1F E3 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 13:18:41.000 UTC",
#       "not  after"         : "2023-12-27 13:18:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 82 6D E5 AA 5C C8 D8   69 68 7F 0B 7D 18 2E 71  7.m..\..ih.....q
#           0010: E0 E0 EF 9B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 45 69 A2 82 B7 1D 2F   94 39 48 C7 B9 5D E9 71  .Ei..../.9H..].q
#           0010: 4E A5 31 55                                        N.1U
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 13:19:25.948 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:26.203 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.203 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:26.205 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 13:19:26.206 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.212 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.224 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 13:19:26.227 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "DC 93 51 47 61 3C 22 03 2B 5F 0F B9 76 C9 4B 5D 47 5A 6E CA 30 F6 FE BC 35 33 60 4D 1F 49 4A 51",
#     "session id"          : "41 F8 65 2D BF 0D E0 6D 78 ED 12 3A FC 80 0D 9B 12 BA F9 45 96 DE B4 7E 2C 97 72 BF 4D DC DC 95",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7E E3 45 A4 F8 34 92 A0   D4 9B 78 F5 84 2A 4E 2B  ..E..4....x..*N+
#               0010: 8F 40 47 E0 CF D8 FC 00   B2 50 D3 1B D0 7D 5E 2F  .@G......P....^/
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.248 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "06 1B 6C C9 A8 44 CB 0E 4F E3 AA 17 51 5C 7C 51 2F 41 98 11 C1 79 35 2B 66 72 18 C6 D7 E9 E4 F6",
#     "session id"          : "41 F8 65 2D BF 0D E0 6D 78 ED 12 3A FC 80 0D 9B 12 BA F9 45 96 DE B4 7E 2C 97 72 BF 4D DC DC 95",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 1C 15 CD 84 92 A0 3F   54 B6 24 07 E5 B1 BD 03  .......?T.$.....
#             0010: 84 59 E0 43 E8 59 8E EE   5F 34 95 26 42 60 62 24  .Y.C.Y.._4.&B`b$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.249 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.249 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.250 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.251 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.253 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.254 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.254 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.263 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.265 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.266 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.270 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:19:26.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 13:19:26.273 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 13:20:45.075 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:20:45.115 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:20:45.115 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:20:45.116 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 13:20:45.116 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43218/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28650ms
ok 65 stop command for single port in 31058ms
ok 66 status detects locally running solr in 14344ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2166ms
ok 69 copying files around in 6535ms
ok 70 upconfig in 2606ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1234ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1234ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 51s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m16.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5563 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5563/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32935/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 11:27:35.034; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 11:27:35.041; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 11:27:36.295; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 11:27:36.341; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22694ms
ok 61 start solr with client truststore and security manager in 25222ms
not ok 62 start solr with mTLS needed in 57849ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lUFYZ9/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32935.
#
# Started Solr server on port 32935 (pid=201811). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32936.
#
# Started Solr server on port 32936 (pid=202240). Happy searching!
#
# INFO  - 2023-09-28 11:28:59.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 11:28:59.358; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 11:28:59.735; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 11:28:59.737; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 11:28:59.738; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:28:59.769 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 85 1B 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:35.000 UTC",
#     "not  after"         : "2023-12-27 11:28:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 1B 44 2A 75 DD 64 A2   E3 D3 4A 9E 3E 95 C2 2E  ..D*u.d...J.>...
#         0010: 6C 63 E8 F1                                        lc..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:28:59.773 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 52 7A 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:27.000 UTC",
#     "not  after"         : "2023-12-27 11:28:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:28:59.788 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:00.014 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:00.016 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:00.016 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.021 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.033 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.033 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.033 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:00.035 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C2 AA 79 BD EE DB 0D 4B 3F 3A 2E 45 E3 09 4E C5 46 75 C3 18 CE C9 F0 5C F5 B7 35 0C 69 17 C1 C2",
#   "session id"          : "F8 5F 4C 90 23 E5 A0 C2 64 17 E1 92 D4 AA 9C 78 AC 59 90 5C 33 2C 21 F8 C9 39 57 F2 B0 A7 5D 4F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 06 78 C5 BE 92 40 DC 00   DC 6E EF 40 21 4F 65 9C  .x...@...n.@!Oe.
#             0010: CC A5 27 14 FB 09 10 0F   00 75 9A 92 88 7A A1 2D  ..'......u...z.-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.152 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 07 84 A1 9A 46 63 25 89 CE DF A3 1B CD 2F 1B FE 7B 19 06 D7 7F CE 7B F2 CA BE C7 A9 EB FF F8",
#   "session id"          : "F8 5F 4C 90 23 E5 A0 C2 64 17 E1 92 D4 AA 9C 78 AC 59 90 5C 33 2C 21 F8 C9 39 57 F2 B0 A7 5D 4F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 88 C0 8D FB 22 2C D7 B6   4E 7F 36 2C 9B 02 DF 46  ....",..N.6,...F
#           0010: 44 9C D2 10 D1 6D C2 C8   38 31 CD 92 04 F7 B7 6F  D....m..81.....o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.153 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.153 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.155 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.157 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.157 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.157 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.157 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.166 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.168 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.172 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.173 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.175 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.176 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.177 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.178 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.178 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.181 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 1E 8F BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:31.000 UTC",
#       "not  after"         : "2023-12-27 11:28:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 12 AF C9 93 42 CF 39   DD 03 25 AA 03 A0 EE 83  Y....B.9..%.....
#           0010: 72 C7 CC E8                                        r...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.181 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:00.240 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:00.241 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:00.241 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:00.241 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.259 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.263 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7F 63 5A 89 8F C3 57 CF   42 20 2E 26 59 28 CE 08  .cZ...W.B .&Y(..
#     0010: 35 84 70 80 5E 25 2A 70   BC DB AA 34 AE 20 7A FF  5.p.^%*p...4. z.
#     0020: 28 14 19 F4 E8 B4 68 45   AC DA 59 55 26 73 CA 18  (.....hE..YU&s..
#     0030: 0B 6E C1 D1 37 46 D9 58   08 E3 2E 56 78 47 B1 3B  .n..7F.X...VxG.;
#     0040: E8 41 6E BB CD 87 91 F6   48 70 06 0E 9F AD B0 C1  .An.....Hp......
#     0050: 43 B6 89 FF EA 6E 60 B9   C4 C4 6C 7F 5A FA 1D 40  C....n`...l.Z..@
#     0060: 44 00 83 DA 07 65 A8 07   7C 52 28 4C A9 9B 13 85  D....e...R(L....
#     0070: 85 9C 6B 4C 51 CA FA 16   A4 71 84 90 3A 93 F8 E4  ..kLQ....q..:...
#     0080: 08 8E 0C 94 43 29 E5 65   2E C4 F7 0A 3D 56 73 E8  ....C).e....=Vs.
#     0090: 63 84 B6 2A 6B B6 47 02   E7 65 E2 F9 03 A3 4E 47  c..*k.G..e....NG
#     00A0: FE 6C 5B CA 12 2D AB B7   AE 6D 72 19 5E 6F 29 5B  .l[..-...mr.^o)[
#     00B0: FC 6E FD 0A D3 95 4B E9   73 C1 BA 09 59 5A A7 43  .n....K.s...YZ.C
#     00C0: F5 C3 86 45 64 2B F2 5C   FA B7 E1 DE 8D A0 F2 6C  ...Ed+.\.......l
#     00D0: EA 82 9B BA 55 C9 52 A9   B7 92 90 09 C7 68 48 FE  ....U.R......hH.
#     00E0: 97 9F 21 EF 5D 39 B8 39   D4 D1 66 4F FC B8 79 92  ..!.]9.9..fO..y.
#     00F0: 60 51 A6 D6 EC 8E 49 57   EE BA E8 51 7E BE 3E F9  `Q....IW...Q..>.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.265 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 57 71 87 7F 3A 6F EF 58   78 A8 D6 F8 87 84 F8 FB  Wq..:o.Xx.......
#     0010: 4E E4 9B 03 BD 1D 66 5F   A3 32 EC 13 99 B5 1A CB  N.....f_.2......
#     0020: DC 41 51 23 01 3A CC A9   F4 79 89 D9 EB 05 36 C6  .AQ#.:...y....6.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.267 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:00.268 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.268 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:00.268 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.269 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:00.269 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:00.269 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.270 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.272 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 85 1B 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:35.000 UTC",
#       "not  after"         : "2023-12-27 11:28:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 1B 44 2A 75 DD 64 A2   E3 D3 4A 9E 3E 95 C2 2E  ..D*u.d...J.>...
#           0010: 6C 63 E8 F1                                        lc..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 91 69 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:29.000 UTC",
#       "not  after"         : "2023-12-27 11:28:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#           0010: B9 12 01 94                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.298 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D A5 57 6A F3 0A 36 AE   C0 FE B0 56 FE 6E 24 C4  ..Wj..6....V.n$.
#     0010: 4D 20 92 1A 6D 2C 32 0D   5E BD 83 BC FE 20 3C B6  M ..m,2.^.... <.
#     0020: 1C 5B 0F A9 B8 19 69 71   10 7E 84 97 90 7E A5 5D  .[....iq.......]
#     0030: AD D9 73 17 53 22 68 35   38 23 10 FB B2 B0 E0 CF  ..s.S"h58#......
#     0040: DB 36 32 C8 5B 32 4A 26   57 5F F7 F3 D2 1B A0 19  .62.[2J&W_......
#     0050: E9 88 FF F6 53 A5 FE 98   3F 41 43 49 37 04 BF 36  ....S...?ACI7..6
#     0060: 53 C2 3D 50 DF DC A0 39   D6 EB 39 07 A3 15 44 93  S.=P...9..9...D.
#     0070: E5 32 54 89 7B D6 D8 C0   4A 53 7F CB DC F9 EB B9  .2T.....JS......
#     0080: 65 4D 53 08 94 16 F6 B4   96 2A DC C7 12 A0 D3 4B  eMS......*.....K
#     0090: 91 83 7E 70 2B 05 18 CF   84 F0 2C 81 A9 A4 C7 E8  ...p+.....,.....
#     00A0: 71 01 48 AE EC 45 A6 BF   7C 0F 40 AA 63 1F 5F 89  q.H..E....@.c._.
#     00B0: 8D 1E CE DA 3E 34 D1 1E   A8 39 0F A3 E9 61 FC E6  ....>4...9...a..
#     00C0: E9 6F 39 58 14 1E FB BC   2D 4D DC A6 E9 1D 02 E3  .o9X....-M......
#     00D0: 7B EB 14 CC 78 F7 56 04   2D 5A 1D 95 18 15 6D A2  ....x.V.-Z....m.
#     00E0: C1 61 14 AA 1C EE 80 A0   91 FF 33 50 6B C5 21 84  .a........3Pk.!.
#     00F0: 07 F4 D8 49 F1 00 97 EB   D7 05 6B 2E 90 70 AB 01  ...I......k..p..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.300 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 95 2B 60 1F AB D7 61 CB   18 11 EA 3E 6A 97 F1 03  .+`...a....>j...
#     0010: F0 A7 61 BB A3 85 22 82   A5 C0 D6 79 95 8E 0D AE  ..a..."....y....
#     0020: B2 6F A8 C7 70 5A 2E 93   B4 53 A1 5D BB 2B 79 3A  .o..pZ...S.].+y:
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.300 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:00.347 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D1 D4 CF B3 A7 F6 D4 39 F8 F0 8A 17 1B 1D 50 54 CA 21 E8 0B CE 4F 7F C2 58 B8 2E 07 70 BE 35 1C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 11:29:00.623 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 11:29:00.624 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 11:29:01.573; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 11:29:01.579; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 11:29:01.988; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 11:29:01.992; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 11:29:01.993; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lUFYZ9/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:29:02.029 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A 85 1B 17",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:35.000 UTC",
#     "not  after"         : "2023-12-27 11:28:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DE 1B 44 2A 75 DD 64 A2   E3 D3 4A 9E 3E 95 C2 2E  ..D*u.d...J.>...
#         0010: 6C 63 E8 F1                                        lc..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:29:02.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 52 7A 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:27.000 UTC",
#     "not  after"         : "2023-12-27 11:28:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 11:29:02.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:02.309 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.309 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:02.311 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:02.312 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.331 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.332 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.332 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:02.335 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2B DA 9E 58 22 FA EE C0 A1 9D AE 45 78 D7 2A 7D 78 9C E6 20 F5 5B 93 A8 35 DC 87 90 64 32 D5 79",
#   "session id"          : "9F 40 F1 3C 90 B6 21 21 F2 05 C0 56 A6 07 51 79 4D 8A 81 44 7A 4E EF 07 9C AF EA 6C 14 38 B8 71",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EF 01 AE AF BE 5A 56 3D   F5 8C BF 31 44 19 71 D5  .....ZV=...1D.q.
#             0010: 71 61 95 AD 52 97 5D AF   EC 03 F7 D0 AE 8F 5D 54  qa..R.].......]T
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.449 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "12 A1 45 60 81 6B 9E DE 34 01 20 85 4D 1F 56 07 54 98 2B 19 B5 83 07 9F D9 7B 2B BC 77 98 3C 17",
#   "session id"          : "9F 40 F1 3C 90 B6 21 21 F2 05 C0 56 A6 07 51 79 4D 8A 81 44 7A 4E EF 07 9C AF EA 6C 14 38 B8 71",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 16 27 73 39 CB EB E8 CC   65 7A 5D 52 3A 79 FA 04  .'s9....ez]R:y..
#           0010: D1 05 A6 D0 F9 EA 2E D0   6B B5 EF 89 A1 93 95 2F  ........k....../
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.449 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.454 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.455 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.465 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.466 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.467 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.471 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.471 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.472 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.473 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.474 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.475 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.475 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.475 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.476 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.477 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.477 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.481 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 1E 8F BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:31.000 UTC",
#       "not  after"         : "2023-12-27 11:28:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 12 AF C9 93 42 CF 39   DD 03 25 AA 03 A0 EE 83  Y....B.9..%.....
#           0010: 72 C7 CC E8                                        r...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.482 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:02.547 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:02.547 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:02.548 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:02.548 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.575 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 91 69 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 11:28:29.000 UTC",
#     "not  after"         : "2023-12-27 11:28:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#         0010: B9 12 01 94                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#         0010: 0E 2F 96 82                                        ./..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.580 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 0D 5A 57 5B 32 80 FB   97 79 97 A8 E9 DD 8E 1A  2.ZW[2...y......
#     0010: 50 EC 88 99 E0 A0 86 CE   FB 8C 61 16 C2 14 2F 13  P.........a.../.
#     0020: 42 F9 DD 9B 5E C6 C9 AD   66 A6 AF 56 DC B9 E9 5D  B...^...f..V...]
#     0030: BE DE 58 0C 11 1E 0C 6F   41 2F F2 9D 67 19 A5 F6  ..X....oA/..g...
#     0040: 1E 46 B7 82 F8 48 8B EF   9C C5 4D 49 25 99 93 1A  .F...H....MI%...
#     0050: DC 29 75 6E 04 04 38 62   16 ED 56 BE 36 77 28 4B  .)un..8b..V.6w(K
#     0060: 91 7D 0F ED 3B A8 CE 7E   EB 14 6E 88 D5 98 95 FF  ....;.....n.....
#     0070: 25 D1 62 14 00 7F A9 2F   D8 41 36 55 33 07 48 61  %.b..../.A6U3.Ha
#     0080: 1D 98 25 81 02 3E 03 DE   F9 F6 AA 4F 0F 7D 7D 7D  ..%..>.....O....
#     0090: 5B A2 98 2D 1B 03 FC 11   A3 3A 3E D2 79 23 06 68  [..-.....:>.y#.h
#     00A0: 16 E2 EE 09 BB 4A 6E 37   0B 17 D8 8E 33 8D 6A EF  .....Jn7....3.j.
#     00B0: E5 24 2B D0 6A A4 18 52   FD F1 11 26 FE 54 3A F6  .$+.j..R...&.T:.
#     00C0: 9E F5 2B B6 C8 BE 7F 74   9A 47 AD A5 61 47 E6 F3  ..+....t.G..aG..
#     00D0: 5A 0D A8 FF 4B 3E 46 00   C9 A8 F8 0E 2A 30 DE 6B  Z...K>F.....*0.k
#     00E0: 70 E0 C4 8E 7B 2D 86 0F   C3 C0 12 03 2C 09 ED 00  p....-......,...
#     00F0: E4 2C 2F 35 32 21 1C B0   7D 9F CA 94 A8 1D FE B3  .,/52!..........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.582 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 5A D0 7B 65 92 1D B9   E7 B8 6E 70 10 06 B7 EA  .Z..e.....np....
#     0010: 26 9D 1E B1 B8 CB 37 32   88 36 67 8A 3F A0 80 95  &.....72.6g.?...
#     0020: BC B3 99 8C AF 35 B0 EA   9B 8F 2D 6E B1 DA B7 5C  .....5....-n...\
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.584 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:02.585 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:02.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 11:29:02.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:02.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.587 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.589 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 85 1B 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:35.000 UTC",
#       "not  after"         : "2023-12-27 11:28:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 1B 44 2A 75 DD 64 A2   E3 D3 4A 9E 3E 95 C2 2E  ..D*u.d...J.>...
#           0010: 6C 63 E8 F1                                        lc..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 91 69 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:29.000 UTC",
#       "not  after"         : "2023-12-27 11:28:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#           0010: B9 12 01 94                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.615 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 78 24 DE F1 17 95 FB   D7 BB F0 F2 BB 71 2A 79  -x$..........q*y
#     0010: 03 7F 96 B4 A5 E8 3F 15   D6 2D DB BD F8 D6 7C B0  ......?..-......
#     0020: 67 94 AF A7 49 AB 61 61   85 0D A1 F5 0C E5 F7 F2  g...I.aa........
#     0030: 57 C2 63 92 70 7E A1 62   A9 79 82 F3 08 93 55 48  W.c.p..b.y....UH
#     0040: BD 94 5B 13 B7 E0 A4 47   D1 36 19 41 E5 09 04 03  ..[....G.6.A....
#     0050: FE 8B AD 4E 1E 4B BC 1D   F4 62 08 C3 24 F7 E0 D8  ...N.K...b..$...
#     0060: B5 BC 85 27 3A 06 32 69   69 D0 AD 79 5C BE 72 BC  ...':.2ii..y\.r.
#     0070: C4 EB E8 C3 E6 EF 0F BB   3E 10 BE AF C2 81 88 FE  ........>.......
#     0080: B8 C8 E1 16 5D E2 AF 53   CE 5B F3 D8 62 6C 9F F7  ....]..S.[..bl..
#     0090: 58 20 98 6A 62 F5 43 1E   29 33 C2 48 F9 C2 23 D7  X .jb.C.)3.H..#.
#     00A0: B0 D9 54 BF 59 2C C2 B3   F7 3E B7 B6 D8 B8 C4 B2  ..T.Y,...>......
#     00B0: 7F F4 D2 7A 39 16 3B 4F   B9 06 40 50 A8 FE 18 36  ...z9.;O..@P...6
#     00C0: B1 7D 49 3B CF 93 01 66   C5 F0 95 93 B1 40 C5 47  ..I;...f.....@.G
#     00D0: BD 14 BE E9 63 0A 4F F9   7E 72 50 E6 CC 66 B2 70  ....c.O..rP..f.p
#     00E0: E9 45 4E 07 1D 1F F0 04   61 4F E9 50 BC 7E D1 A5  .EN.....aO.P....
#     00F0: 7A B6 56 29 CC 40 4B 67   FA 0D 5A C9 F1 6B B5 5E  z.V).@Kg..Z..k.^
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.616 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 81 7E A5 F1 6C 9F C5   33 05 E4 AD 8E 0F 44 34  .....l..3.....D4
#     0010: 06 D5 83 3A DD 5B D6 26   AA B1 BD F2 AB B6 5F 9C  ...:.[.&......_.
#     0020: 4D EB 6F 21 63 74 33 08   3F 94 3B FC 81 42 C5 69  M.o!ct3.?.;..B.i
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.617 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:02.675 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "44 79 45 D3 7B DE E9 2A E5 E0 45 3A 01 07 9D 58 77 C2 91 4A D5 38 1C 44 85 BD 11 B3 5E F9 1E 0B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 11:29:02.956 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 11:29:02.958 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 11:29:15.087; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 11:29:15.419 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 52 7A 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:27.000 UTC",
#       "not  after"         : "2023-12-27 11:28:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#           0010: B9 12 01 94                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 91 69 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 11:28:29.000 UTC",
#       "not  after"         : "2023-12-27 11:28:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D 14 C6 0A 81 8F 56 C8   1A 93 3A 89 86 D7 2E 2B  ......V...:....+
#           0010: B9 12 01 94                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3B 1A AA 9E 5C 4C A9 C2   58 E9 C2 41 B2 89 DD BE  ;...\L..X..A....
#           0010: 0E 2F 96 82                                        ./..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 11:29:15.437 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:15.856 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:15.856 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:15.856 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:29:15.857 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:15.940 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.940 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:15.942 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 11:29:15.943 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.949 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.961 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.961 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 11:29:15.964 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "BD F6 D3 2C C0 8F 9B C9 E5 CF 38 D7 6A 57 47 2A D7 CC 06 21 E6 80 08 C0 4B 54 7F 81 08 EB 2F FB",
#     "session id"          : "D8 0C 29 31 36 F6 7C 0A 61 75 A9 A0 87 57 FE 84 BA F5 A5 E5 46 D2 06 16 F2 9D 23 5B 70 22 A9 F3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: BB BA 1E B5 F8 08 AD 77   25 39 6C 83 23 33 CA 63  .......w%9l.#3.c
#               0010: D6 71 F3 19 C4 24 E1 3E   75 73 64 4B 1D 64 80 35  .q...$.>usdK.d.5
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.989 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EA 76 40 52 74 87 9C 4E 37 99 8D 63 F4 C6 DE B7 9D 74 7A 6D 40 E5 94 EF 9F 8C 84 B8 21 92 A1 9E",
#     "session id"          : "D8 0C 29 31 36 F6 7C 0A 61 75 A9 A0 87 57 FE 84 BA F5 A5 E5 46 D2 06 16 F2 9D 23 5B 70 22 A9 F3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: EE 94 B6 D4 D2 17 D6 FB   78 43 D2 45 C2 CA 52 2F  ........xC.E..R/
#             0010: DA 84 D1 89 3E B3 98 66   0E 0A 42 E0 06 E4 11 54  ....>..f..B....T
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.989 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.989 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.990 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.991 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.994 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.994 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.994 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:15.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:15.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:15.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.003 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.005 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.006 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.010 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.010 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.010 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.010 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.011 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.011 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:16.011 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:29:16.011 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 11:29:16.013 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 11:30:34.486 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:30:34.530 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:30:34.530 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:30:34.531 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 11:30:34.531 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32936/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28757ms
ok 65 stop command for single port in 31221ms
ok 66 status detects locally running solr in 14625ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6609ms
ok 70 upconfig in 2611ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1226ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 57s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m24s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5562 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5562/

2 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:42063_solr' has the wrong number of replicas after the migration expected:<2> but was:<1>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:42063_solr' has the wrong number of replicas after the migration expected:<2> but was:<1>
	at __randomizedtesting.SeedInfo.seed([77525B53B6E9CB24:59398F69838A1A50]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.client.solrj.impl.ConcurrentUpdateSolrClientMultiCollectionTest.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([77525B53B6E9CB24]:0)




Build Log:
[...truncated 3892 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42247/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 08:11:28.368; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 08:11:28.374; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 08:11:29.623; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 08:11:29.663; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22191ms
ok 61 start solr with client truststore and security manager in 24438ms
not ok 62 start solr with mTLS needed in 56441ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-KmHZV6/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42247.
#
# Started Solr server on port 42247 (pid=200933). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42248.
#
# Started Solr server on port 42248 (pid=201354). Happy searching!
#
# INFO  - 2023-09-28 08:12:51.315; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 08:12:51.320; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 08:12:51.699; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 08:12:51.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 08:12:51.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:51.736 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 3E 2F F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:27.000 UTC",
#     "not  after"         : "2023-12-27 08:12:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 F7 6D 9A 01 D0 92 63   0D 33 83 26 0C 82 A2 95  h.m....c.3.&....
#         0010: C7 DE 6E 05                                        ..n.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:51.741 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 77 6B 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:19.000 UTC",
#     "not  after"         : "2023-12-27 08:12:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:51.756 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:52.078 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:52.079 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:52.079 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:52.079 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:52.223 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.223 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:52.225 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:52.225 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.231 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.243 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.243 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.243 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:52.246 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 89 55 FD 5D CF CA 30 AD 8E A0 78 6D C4 AA 0C 2C 6F F1 A1 BE 75 E1 3C C5 02 97 16 31 5A D2 BC",
#   "session id"          : "AB 68 C5 B9 C1 7F 4A 9E 7E 29 9E 5B BE 64 C2 75 B4 09 2F 70 06 A0 BE 97 5C 1A 65 68 90 41 AA 9E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FB 7B CB 58 36 1D F7 AC   DA AA C6 0C C7 2C 56 7E  ...X6........,V.
#             0010: 4E C7 04 3F 3E 34 76 98   CE DE D9 59 F7 CC 1C 38  N..?>4v....Y...8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.352 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8C FB 1B 54 E5 64 7B F0 0B 06 B4 7F 61 24 60 84 70 78 26 DA 0F 26 B7 F9 CD 31 EA 36 EE D5 C0 EF",
#   "session id"          : "AB 68 C5 B9 C1 7F 4A 9E 7E 29 9E 5B BE 64 C2 75 B4 09 2F 70 06 A0 BE 97 5C 1A 65 68 90 41 AA 9E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1D AA 96 D2 F7 B0 10 0A   10 C2 B6 13 D6 37 19 30  .............7.0
#           0010: A7 36 BD 35 9F 5C 79 29   59 D7 70 2C FE 54 17 3A  .6.5.\y)Y.p,.T.:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.352 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.353 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.354 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.355 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.355 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.357 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.357 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.357 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.358 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.367 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.368 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.369 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.373 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.374 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.376 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.377 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.377 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.377 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.378 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.379 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.383 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 86 A0 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:23.000 UTC",
#       "not  after"         : "2023-12-27 08:12:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 C2 42 79 B5 92 BF 79   80 5C 03 63 28 58 05 64  ..By...y.\.c(X.d
#           0010: 32 7E 00 DA                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.384 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.478 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 80 06 FD D3 23 68 8F 10   21 02 09 FB 73 0D 59 0C  ....#h..!...s.Y.
#     0010: 00 6A A9 45 7D A1 BC 12   FB 6E 74 0A 54 A7 BD 41  .j.E.....nt.T..A
#     0020: 29 F7 BB B3 1D 0F E4 08   26 08 98 0B 1D BF 96 B4  ).......&.......
#     0030: 57 06 E0 80 4F 15 97 99   5A BA 22 69 6C C9 3D 97  W...O...Z."il.=.
#     0040: 4C 35 83 7C AC 37 0E 4E   E7 60 69 FD B7 D3 5F 4F  L5...7.N.`i..._O
#     0050: 5F F0 09 45 ED 1A 24 09   96 09 4F B5 8B A9 23 ED  _..E..$...O...#.
#     0060: 63 64 DE DF 6A F4 BB F3   18 A1 37 A0 76 78 30 46  cd..j.....7.vx0F
#     0070: 23 EB 4B 35 AA 04 08 55   6C CC AB 58 51 2E 25 D1  #.K5...Ul..XQ.%.
#     0080: 8A 94 5D 8B 58 3F C2 2D   0F 9E CB A4 47 1A 81 85  ..].X?.-....G...
#     0090: DC B3 9D D9 64 BA 0B A6   C0 A9 C7 FF 6B B6 73 D1  ....d.......k.s.
#     00A0: A1 EB 83 16 B6 44 A4 54   34 62 98 7F F4 B1 32 46  .....D.T4b....2F
#     00B0: 77 09 9F 2D 44 F0 5F EA   BC 43 5A A3 78 88 A3 04  w..-D._..CZ.x...
#     00C0: 7C EB 39 9D F5 18 94 B9   7F DB D0 44 8E A5 A5 AD  ..9........D....
#     00D0: D1 18 AE 10 72 A1 8A 2D   06 8A CC E0 68 86 1D BC  ....r..-....h...
#     00E0: 0E C0 86 47 B2 86 E3 3D   55 7A F4 6C EE 44 2E E1  ...G...=Uz.l.D..
#     00F0: 5C 26 58 60 37 B4 0B B1   35 83 B7 6C 43 29 11 D9  \&X`7...5..lC)..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.480 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CD F8 75 B6 D4 2C FD 53   3F F3 76 EB 84 AD 4D 07  ..u..,.S?.v...M.
#     0010: 39 C1 CC 0E DD 8B 4B 94   FF 0D 8F 44 8B 48 37 25  9.....K....D.H7%
#     0020: 5C E5 18 AD A1 0B 52 D6   2B E3 03 8C A0 B8 86 D6  \.....R.+.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.483 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:52.484 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.484 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:52.485 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.485 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:52.485 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:52.486 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.486 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.489 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 3E 2F F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:27.000 UTC",
#       "not  after"         : "2023-12-27 08:12:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 F7 6D 9A 01 D0 92 63   0D 33 83 26 0C 82 A2 95  h.m....c.3.&....
#           0010: C7 DE 6E 05                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 1A 57 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:21.000 UTC",
#       "not  after"         : "2023-12-27 08:12:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#           0010: 62 0B E0 83                                        b...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.516 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 40 CC CD 67 39 3A 3F   91 24 3E 70 94 5A A1 C4  <@..g9:?.$>p.Z..
#     0010: 15 38 2D 5D A9 7A 28 47   48 63 86 27 40 CC 79 0D  .8-].z(GHc.'@.y.
#     0020: 1A C8 57 FC A3 73 2B 68   7A 4F 13 92 5D AE 10 ED  ..W..s+hzO..]...
#     0030: 6D E5 A8 20 93 37 2D 58   08 DD 45 73 C0 B4 F8 8A  m.. .7-X..Es....
#     0040: E1 3C BD 98 4C 11 E6 55   B5 C6 F3 AB B2 69 30 EE  .<..L..U.....i0.
#     0050: 23 30 61 0B C2 7D C2 97   D9 CD 1B 5C B9 DA 08 8C  #0a........\....
#     0060: 46 89 21 A9 52 DD B3 1C   10 A3 DB A0 0F F5 26 FE  F.!.R.........&.
#     0070: 29 E4 B3 28 2E 7B 0D D0   FF 39 C3 2D B0 85 B5 AA  )..(.....9.-....
#     0080: CD 87 4E 0C 77 A0 E0 2F   91 BD E8 CD 49 6A B4 F4  ..N.w../....Ij..
#     0090: B1 AC 0B EA 52 A0 05 AB   E7 0F DA C8 F3 97 EC B5  ....R...........
#     00A0: A0 66 DC C7 AB 02 40 38   5A BD A3 B7 F4 D1 92 11  .f....@8Z.......
#     00B0: F1 2C E9 70 BA 40 0C 35   10 A8 9F A2 21 4C BF E6  .,.p.@.5....!L..
#     00C0: 44 57 88 7E A9 84 F1 8B   9C E0 1A 85 FE DF AE 02  DW..............
#     00D0: DB 0C 17 16 96 88 91 F3   6B D1 C6 62 17 D0 D8 FE  ........k..b....
#     00E0: 3A F4 E1 0B D2 5D 13 C6   8B 39 8E 81 B6 A2 3C 86  :....]...9....<.
#     00F0: D2 7C EB F5 57 A9 25 1E   7F 7F 8A B6 26 97 7F 0F  ....W.%.....&...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.517 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8C 14 C4 EA C8 76 44 3D   42 02 82 11 D5 0E 20 7E  .....vD=B..... .
#     0010: 7D 83 EB 41 FD 31 57 54   44 FF 57 30 59 FF D0 2E  ...A.1WTD.W0Y...
#     0020: 31 4E 98 23 F9 EA 93 D9   74 66 CF 8B EE B9 0B 7D  1N.#....tf......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.518 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:52.571 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "97 85 44 B7 43 81 1D 2C 10 30 DD 9A EB 7C 23 82 EB DD 91 F4 79 8E 99 FA 50 A4 9C 89 42 7C C7 52",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 08:12:52.843 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 08:12:52.844 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 08:12:53.786; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 08:12:53.792; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 08:12:54.189; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 08:12:54.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 08:12:54.193; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KmHZV6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:54.224 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 3E 2F F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:27.000 UTC",
#     "not  after"         : "2023-12-27 08:12:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 68 F7 6D 9A 01 D0 92 63   0D 33 83 26 0C 82 A2 95  h.m....c.3.&....
#         0010: C7 DE 6E 05                                        ..n.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:54.229 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 77 6B 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:19.000 UTC",
#     "not  after"         : "2023-12-27 08:12:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 08:12:54.245 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:54.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:54.590 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:54.591 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 08:12:54.591 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:54.750 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:54.752 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:12:54.753 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.759 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.771 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.771 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.771 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:12:54.773 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B3 01 98 9C 9F 7B 13 FF D2 2A 11 2E C0 CE 68 02 10 DD 18 AF B6 9B 6A E0 BC 4F 93 3B 9F E2 32 19",
#   "session id"          : "4A 71 BF 5C F6 EE 35 D2 8C E9 F3 B4 3E 95 B5 19 B2 62 02 41 CF 96 48 2D B1 92 29 EB B3 4E 08 DC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 29 5D B7 7E 7B 26 98 89   EA E3 1E A8 0D 63 08 6B  )]...&.......c.k
#             0010: 80 04 6F D8 75 D7 97 5C   57 13 8C E9 54 95 23 6D  ..o.u..\W...T.#m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.879 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3B 2A B3 35 C7 24 3C 81 9B 4C 21 D0 71 91 BE FD 7A 8F AC CF 86 AD 49 CE CC 54 39 85 74 2C A3 AF",
#   "session id"          : "4A 71 BF 5C F6 EE 35 D2 8C E9 F3 B4 3E 95 B5 19 B2 62 02 41 CF 96 48 2D B1 92 29 EB B3 4E 08 DC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 09 78 EF AC 69 D9 84   A2 35 3D 9F E4 8F 14 9A  ..x..i...5=.....
#           0010: 67 C8 2C AC 9F BE 5F 7D   A8 21 4C 32 E7 C0 45 05  g.,..._..!L2..E.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.879 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.880 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.881 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.882 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.882 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.884 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.884 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.884 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.884 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.885 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.892 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.894 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.895 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.898 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.899 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:54.900 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:54.900 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.901 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.902 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.902 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.902 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.903 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.904 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:54.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.906 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 86 A0 C6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:23.000 UTC",
#       "not  after"         : "2023-12-27 08:12:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A7 C2 42 79 B5 92 BF 79   80 5C 03 63 28 58 05 64  ..By...y.\.c(X.d
#           0010: 32 7E 00 DA                                        2...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:54.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.026 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 1A 57 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 08:12:21.000 UTC",
#     "not  after"         : "2023-12-27 08:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#         0010: 62 0B E0 83                                        b...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#         0010: 61 78 B0 E4                                        ax..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.030 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 C5 74 CB 5A 03 96 69   5F C4 90 12 1A 7D 22 D0  g.t.Z..i_.....".
#     0010: CA 79 35 26 9A 0B B4 D4   18 4C 1F 60 A5 E6 64 71  .y5&.....L.`..dq
#     0020: 34 37 1B 41 34 3C 54 68   AD 17 6F F8 6F CB 5A 0C  47.A4<Th..o.o.Z.
#     0030: 52 CB DA C3 EB 69 87 42   33 6D 84 B7 CE 83 B5 FD  R....i.B3m......
#     0040: 10 A1 32 DE 6D 36 B6 90   06 F8 31 65 97 D1 71 2C  ..2.m6....1e..q,
#     0050: C4 E3 C3 E8 B6 67 D7 00   F5 9F E8 BD 67 20 E6 2C  .....g......g .,
#     0060: 72 2B FF 4E 55 E1 6D D4   F4 76 30 A8 F1 4D BC 81  r+.NU.m..v0..M..
#     0070: 06 CF 13 33 2B 86 E1 44   67 D9 20 F0 9F 46 19 23  ...3+..Dg. ..F.#
#     0080: AA 4C 04 5A A7 0D 44 77   FC F2 9A 49 03 38 5B 8B  .L.Z..Dw...I.8[.
#     0090: F8 86 71 38 FC 31 2E 3E   4C 15 D5 44 1F F0 DB A9  ..q8.1.>L..D....
#     00A0: 4B FD 20 F1 5E 0D B9 99   B3 F4 E6 26 83 90 A0 BB  K. .^......&....
#     00B0: D6 76 A5 40 93 BC CD 57   B9 50 26 6F 14 A3 81 33  .v.@...W.P&o...3
#     00C0: 0C 1F F7 77 80 AD 98 07   47 C0 8F 27 85 B6 A3 1F  ...w....G..'....
#     00D0: C2 64 D2 B0 DA FB 59 75   81 CE 48 EA E9 70 6C EC  .d....Yu..H..pl.
#     00E0: D0 58 4F CA 66 19 F2 E8   A0 7B BE C8 B4 D1 3A 77  .XO.f.........:w
#     00F0: FE 10 4A 56 AC 7B 27 B6   8C C7 28 DC 70 C3 C8 31  ..JV..'...(.p..1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.032 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 FF E3 0C 51 A1 CC D8   4B 35 BA 6F FF F2 C4 29  ....Q...K5.o...)
#     0010: 4D 9C 2E 1D 2F C6 76 43   B6 67 66 73 94 5E 9D 93  M.../.vC.gfs.^..
#     0020: E1 94 AC AF D0 5B A0 B8   AB E2 AE 4E 96 E3 60 1B  .....[.....N..`.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.034 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:55.035 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:55.035 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:55.035 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:55.035 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 08:12:55.036 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 08:12:55.036 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.036 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.039 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 3E 2F F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:27.000 UTC",
#       "not  after"         : "2023-12-27 08:12:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 68 F7 6D 9A 01 D0 92 63   0D 33 83 26 0C 82 A2 95  h.m....c.3.&....
#           0010: C7 DE 6E 05                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 1A 57 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:21.000 UTC",
#       "not  after"         : "2023-12-27 08:12:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#           0010: 62 0B E0 83                                        b...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.063 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C 96 77 F9 97 DE 69 7E   0F C8 92 3B A7 3B CC 05  L.w...i....;.;..
#     0010: 32 32 AE 73 95 EC 53 9C   96 D9 9C 29 FB CE C9 20  22.s..S....)...
#     0020: 6D AB AA FC E7 0B F9 44   5F 97 54 85 6D C1 3E 5E  m......D_.T.m.>^
#     0030: 0F F9 A5 B9 5A BD 23 39   65 FC 50 B4 61 8F EF 9C  ....Z.#9e.P.a...
#     0040: 54 1C 1A 47 7B 9B 13 2E   A9 F6 8B 8B D9 77 A0 2A  T..G.........w.*
#     0050: 7C 98 C7 B7 E7 18 EA 0A   14 3D DB 5C 28 4E 37 45  .........=.\(N7E
#     0060: 3D 8D EE D1 18 6D C1 A8   F0 63 7D C4 DC B4 97 4B  =....m...c.....K
#     0070: D1 FC DB B4 32 33 ED 48   C7 14 D7 5F C9 F0 60 E9  ....23.H..._..`.
#     0080: 02 29 5C 18 9E 1A 90 13   B7 30 8A 6B 14 83 3D 4A  .)\......0.k..=J
#     0090: 1A 3F 1D B7 02 3D DE C9   0B EC 68 9F 55 F2 EA 63  .?...=....h.U..c
#     00A0: A4 70 1C 58 E4 D6 1D AE   CD E9 35 46 BB 49 2B 93  .p.X......5F.I+.
#     00B0: 3A 93 BA 2A EE 67 6C 7E   75 DF A6 13 96 33 63 12  :..*.gl.u....3c.
#     00C0: A1 12 40 89 BE 79 64 2C   CC 7D C8 71 2F C3 D0 1F  ..@..yd,...q/...
#     00D0: B8 7E C7 D2 82 9B D9 F2   C4 36 A0 C6 3F CF 4B DF  .........6..?.K.
#     00E0: 0A 18 3C 13 B5 79 85 04   31 0B 75 8C 46 76 F0 D8  ..<..y..1.u.Fv..
#     00F0: A7 5B 55 64 03 41 67 FF   22 22 EF AA 86 41 5E 7A  .[Ud.Ag.""...A^z
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.065 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EA 86 89 94 E1 8C 21 E4   0E 88 77 16 C8 06 C6 B5  ......!...w.....
#     0010: CA A0 F8 E3 06 95 E8 AC   73 8B 97 64 49 57 5D 7F  ........s..dIW].
#     0020: 6E C5 A0 0B 34 D1 BC E6   8A DC 97 91 45 F2 6C 41  n...4.......E.lA
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.065 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:12:55.113 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A BA 8D 40 47 62 0C 85 13 E9 A4 37 BC 8A 33 E0 7D C8 5F 72 AE 61 57 41 E9 34 47 06 CC 6D 2B 29",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 08:12:55.374 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 08:12:55.375 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 08:13:06.052; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 08:13:06.390 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 77 6B 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:19.000 UTC",
#       "not  after"         : "2023-12-27 08:12:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#           0010: 62 0B E0 83                                        b...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 1A 57 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 08:12:21.000 UTC",
#       "not  after"         : "2023-12-27 08:12:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 99 FA 10 CF D2 0F 6B   9B C3 9A C5 F6 F2 96 5F  .......k......._
#           0010: 62 0B E0 83                                        b...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1A 1E 77 01 31 17 04 26   FC 9F 0B D0 BA DD F8 4B  ..w.1..&.......K
#           0010: 61 78 B0 E4                                        ax..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 08:13:06.405 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:13:06.633 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:13:06.635 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 08:13:06.636 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.653 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.654 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.654 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 08:13:06.656 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "44 11 1E 2D CF 7C BE F6 88 B9 87 E3 58 9A E8 52 FB B3 1A FC 17 BB 25 D3 4A 8A 01 6F A0 A6 FF A7",
#     "session id"          : "95 2D 63 08 BE E1 22 1A D7 33 6A FF B6 91 D5 76 C6 0B 7A E1 F1 C8 76 35 D3 D8 A4 47 64 0C 13 34",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3E B8 E1 B1 39 83 C5 5A   E4 4B 52 44 C6 5C 04 75  >...9..Z.KRD.\.u
#               0010: C0 F8 C4 4B 01 FC 06 E0   1A C9 84 BD C3 FE A7 48  ...K...........H
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.677 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "87 3C 96 2B D3 07 B4 6B 16 39 B1 1D 1C E7 FF A9 14 47 83 56 35 7F 4B A8 53 55 E4 FE 9A FA 87 4A",
#     "session id"          : "95 2D 63 08 BE E1 22 1A D7 33 6A FF B6 91 D5 76 C6 0B 7A E1 F1 C8 76 35 D3 D8 A4 47 64 0C 13 34",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2E 48 FE 72 A5 FB 32 4A   DD 7A 1D 50 14 59 8C 78  .H.r..2J.z.P.Y.x
#             0010: 87 67 01 F7 85 A4 A8 E7   4A 25 15 CC 3D 50 52 50  .g......J%..=PRP
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.678 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.678 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 08:13:06.679 UTC|SSLExtensions.java:163|Ign

[...truncated too long message...]

CollectionTest]
  2>         at java.base@11.0.16/java.lang.Thread.holdsLock(Native Method)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.processDeregisterQueue(SelectorImpl.java:246)
  2>         at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:114)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.select(NIOServerCnxnFactory.java:403)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.run(NIOServerCnxnFactory.java:368)
  2>   15) Thread[id=29, name=NIOWorkerThread-3, state=WAITING, group=TGRP-ConcurrentUpdateSolrClientMultiCollectionTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
  2>         at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   16) Thread[id=43, name=qtp374001628-43, state=TIMED_WAITING, group=TGRP-ConcurrentUpdateSolrClientMultiCollectionTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   17) Thread[id=19, name=NIOServerCxnFactory.SelectorThread-1, state=RUNNABLE, group=TGRP-ConcurrentUpdateSolrClientMultiCollectionTest]
  2>         at java.base@11.0.16/java.nio.channels.spi.AbstractSelector$1.interrupt(AbstractSelector.java:213)
  2>         at java.base@11.0.16/java.nio.channels.spi.AbstractSelector.begin(AbstractSelector.java:219)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.begin(SelectorImpl.java:94)
  2>         at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:116)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.select(NIOServerCnxnFactory.java:403)
  2>         at app//org.apache.zookeeper.server.NIOServerCnxnFactory$SelectorThread.run(NIOServerCnxnFactory.java:368)
  2>   18) Thread[id=42, name=qtp374001628-42, state=TIMED_WAITING, group=TGRP-ConcurrentUpdateSolrClientMultiCollectionTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   19) Thread[id=45, name=qtp374001628-45, state=TIMED_WAITING, group=TGRP-ConcurrentUpdateSolrClientMultiCollectionTest]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
   >     java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
   >         at __randomizedtesting.SeedInfo.seed([77525B53B6E9CB24]:0)
  2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{}, maxPointsInLeafNode=693, maxMBSortInHeap=7.246613296173335, sim=Asserting(RandomSimilarity(queryNorm=true): {}), locale=gsw-FR, timezone=Europe/Tallinn
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=22,free=180665928,total=344457216
  2> NOTE: All tests run in this JVM: [ConcurrentUpdateSolrClientMultiCollectionTest]
  2> NOTE: reproduce with: gradlew test --tests ConcurrentUpdateSolrClientMultiCollectionTest -Dtests.seed=77525B53B6E9CB24 -Dtests.locale=gsw-FR -Dtests.timezone=Europe/Tallinn -Dtests.asserts=true -Dtests.file.encoding=UTF-8

:solr:solrj:test (FAILURE): 1143 test(s), 1 failure(s), 44 skipped

1143 tests completed, 1 failed, 44 skipped

> Task :solr:solrj:test FAILED
> Task :solr:solrj:wipeTaskTemp

ERROR: The following test(s) have failed:
  - org.apache.solr.client.solrj.impl.ConcurrentUpdateSolrClientMultiCollectionTest.classMethod (:solr:solrj)
    Test output: /tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.impl.ConcurrentUpdateSolrClientMultiCollectionTest.txt
    Reproduce with: gradlew :solr:solrj:test --tests "org.apache.solr.client.solrj.impl.ConcurrentUpdateSolrClientMultiCollectionTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=77525B53B6E9CB24 -Ptests.file.encoding=UTF-8

  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=77525B53B6E9CB24 -Ptests.file.encoding=UTF-8


FAILURE: Build completed with 3 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

3: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 2h 2m 33s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 2h2m57.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5561 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5561/

1 tests failed.
FAILED:  org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample

Error Message:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36461/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Oops! Looks like port 36461 is already being used by another process. Please choose a different port.
Please enter a port for node 1 [8983]: 


Stack Trace:
java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36461/solr; tool output: 
Welcome to the SolrCloud example!

This interactive session will help you launch a SolrCloud cluster on your local workstation.
To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
Please enter the port for node1 [8983]: 
Oops! Looks like port 36461 is already being used by another process. Please choose a different port.
Please enter a port for node 1 [8983]: 

	at __randomizedtesting.SeedInfo.seed([676474BC06788E37:BC159476310D4B51]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1273 lines...]
  2> ERROR: access denied ("java.io.FilePermission" "/tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_676474BC06788E37-001/tempDir-001/failExecuteScript" "execute")
  2> 
  2> 3704 INFO  (TEST-TestSolrCLIRunExample.testFailExecuteScript-seed#[676474BC06788E37]) [] o.a.s.SolrTestCaseJ4 ###Ending testFailExecuteScript
  2> 3717 INFO  (TEST-TestSolrCLIRunExample.testInteractiveSolrCloudExample-seed#[676474BC06788E37]) [] o.a.s.SolrTestCaseJ4 ###Starting testInteractiveSolrCloudExample
  2> 
  2> ERROR: access denied ("java.net.SocketPermission" "127.0.0.1:2" "connect,resolve")
  2> 
  2> 4782 INFO  (TEST-TestSolrCLIRunExample.testInteractiveSolrCloudExample-seed#[676474BC06788E37]) [] o.a.s.SolrTestCaseJ4 ###Ending testInteractiveSolrCloudExample
   >     java.lang.AssertionError: After running Solr cloud example, test collection 'testCloudExamplePrompt' not found in Solr at: http://localhost:36461/solr; tool output: 
   >     Welcome to the SolrCloud example!
   > 
   >     This interactive session will help you launch a SolrCloud cluster on your local workstation.
   >     To begin, how many Solr nodes would you like to run in your local cluster? (specify 1-4 nodes) [2]: 
   >     Ok, let's start up 1 Solr nodes for your example SolrCloud cluster.
   >     Please enter the port for node1 [8983]: 
   >     Oops! Looks like port 36461 is already being used by another process. Please choose a different port.
   >     Please enter a port for node 1 [8983]: 
   >         at __randomizedtesting.SeedInfo.seed([676474BC06788E37:BC159476310D4B51]:0)
   >         at org.junit.Assert.fail(Assert.java:89)
   >         at org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample(TestSolrCLIRunExample.java:507)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   >         at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
   >         at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   >         at java.base/java.lang.reflect.Method.invoke(Method.java:566)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
   >         at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
   >         at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
   >         at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
   >         at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
   >         at org.junit.rules.RunRules.evaluate(RunRules.java:20)
   >         at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
   >         at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
   >         at java.base/java.lang.Thread.run(Thread.java:829)
  2> NOTE: reproduce with: gradlew test --tests TestSolrCLIRunExample.testInteractiveSolrCloudExample -Dtests.seed=676474BC06788E37 -Dtests.locale=pt-MO -Dtests.timezone=Africa/Tunis -Dtests.asserts=true -Dtests.file.encoding=UTF-8
  2> 4805 INFO  (SUITE-TestSolrCLIRunExample-seed#[676474BC06788E37]-worker) [] o.a.s.u.ErrorLogMuter Closing ErrorLogMuter-regex-1 after mutting 0 log messages
  2> 4806 INFO  (SUITE-TestSolrCLIRunExample-seed#[676474BC06788E37]-worker) [] o.a.s.u.ErrorLogMuter Creating ErrorLogMuter-regex-2 for ERROR logs matching regex: ignore_exception
  2> NOTE: leaving temporary files on disk at: /tmp/src/solr/solr/core/build/tmp/tests-tmp/solr.cli.TestSolrCLIRunExample_676474BC06788E37-001
  2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{}, maxPointsInLeafNode=1115, maxMBSortInHeap=5.425278193455354, sim=Asserting(RandomSimilarity(queryNorm=false): {}), locale=pt-MO, timezone=Africa/Tunis
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=1,free=271029296,total=324534272
  2> NOTE: All tests run in this JVM: [TestSolrCLIRunExample]


> Task :solr:modules:hdfs:test
:solr:modules:hdfs:test (SUCCESS): 102 test(s), 41 skipped

> Task :solr:modules:hdfs:wipeTaskTemp
> Task :solr:modules:hdfs:check
> Task :solr:modules:hdfs:assemblePackaging
> Task :solr:packaging:installFullDist

> Task :solr:packaging:integrationTests
Running BATS tests with Solr base port 44449
1..73
ok 1 auth rejects blockUnknown option with invalid boolean in 3734ms

> Task :solr:core:test
WARNING: Test org.apache.solr.TestRandomFaceting wrote 12,872,378 bytes of output.
WARNING: Test org.apache.solr.search.facet.TestCloudJSONFacetSKGEquiv wrote 14,150,150 bytes of output.

> Task :solr:packaging:integrationTests
ok 2 auth rejects updateIncludeFileOnly option with invalid boolean in 3829ms
ok 3 nothing in 14ms
ok 4 create for non cloud mode in 16474ms
ok 5 create for cloud mode in 17535ms

> Task :solr:core:test
WARNING: Test org.apache.solr.schema.TestCloudSchemaless wrote 13,834,656 bytes of output.
WARNING: Test org.apache.solr.search.facet.TestCloudJSONFacetSKG wrote 29,268,227 bytes of output.

> Task :solr:packaging:integrationTests
ok 6 create collection in 8140ms
ok 7 reject d option with invalid config dir in 1253ms
ok 8 accept d option with builtin config in 6166ms
ok 9 accept d option with explicit path to config in 5721ms
ok 10 accept n option as config name in 5769ms
ok 11 allow config reuse when n option specifies same config in 10228ms
ok 12 create multisharded collections when s provided in 5951ms
ok 13 create replicated collections when rf provided in 6776ms

> Task :solr:core:test
:solr:core:test (FAILURE): 4892 test(s), 1 failure(s), 204 skipped

4892 tests completed, 1 failed, 204 skipped

> Task :solr:core:test FAILED
> Task :solr:core:wipeTaskTemp

> Task :solr:packaging:integrationTests
ok 14 can delete collections in 9473ms
ok 15 collection delete also deletes zk config in 7786ms
ok 16 deletes accompanying zk config with nondefault name in 7905ms
ok 17 deleteConfig option can opt to leave config in zk in 7686ms
ok 18 SOLR-16755 test works with noprompt in 33267ms
ok 19 Check export command in 28500ms
ok 20 export fails on non cloud mode in 16948ms
ok 21 using curl to extract a single pdf file in 23428ms
ok 22 using the bin/solr post tool to extract content from pdf in 23928ms
ok 23 using the bin/solr post tool to crawl web site in 26143ms
ok 24 healthcheck on cloud solr in 36525ms
ok 25 start help flag prints help in 148ms
ok 26 stop help flag prints help in 141ms
ok 27 restart help flag prints help in 147ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 139ms
ok 30 create help flag prints help in 139ms
ok 31 createcore help flag prints help in 142ms
ok 32 createcollection help flag prints help in 142ms
ok 33 delete help flag prints help in 140ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 145ms
ok 36 auth help flag prints help in 143ms
ok 37 assert help flag prints help in 959ms
ok 38 post help flag prints help in 988ms
ok 39 SQL Module in 23726ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26042ms
ok 41 icu collation in analysis-extras module in 19032ms
ok 42 package detects no running solr in 224ms
ok 43 lifecycle of package in 16516ms
ok 44 deploying and undeploying a collection level package in 20281ms
ok 45 Affinity placement plugin using sysprop in 22597ms
ok 46 Random placement plugin using ENV in 22347ms
ok 47 Check help command in 2862ms
ok 48 basic post with a type specified in 5816ms
ok 49 basic post WITHOUT a type specified in 12269ms
ok 50 crawling a directory in 4615ms
ok 51 crawling a web site in 5271ms
ok 52 commit and optimize and delete in 3905ms
ok 53 args mode in 6512ms
ok 54 stdin mode in 3397ms
ok 55 post solr log into solr via script in 8821ms
ok 56 post solr log into solr via cli in 7860ms
ok 57 allowPaths - backup in 23542ms
ok 58 start solr with ssl in 24630ms
not ok 59 use different hostname when not checking peer-name in 27109ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44449.
#
# Started Solr server on port 44449 (pid=196121). Happy searching!
#
# INFO  - 2023-09-28 05:46:43.450; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 05:46:43.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 05:46:43.843; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-28 05:46:43.920; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-28 05:46:43.920; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-09-28 05:46:53.074; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-09-28 05:46:53.079; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-09-28 05:46:53.446; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:44449/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 05:46:55.214; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 05:46:55.219; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 05:46:56.213; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 05:46:56.259; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22128ms
ok 61 start solr with client truststore and security manager in 24663ms
not ok 62 start solr with mTLS needed in 55821ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-K49k8I/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44449.
#
# Started Solr server on port 44449 (pid=200988). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44450.
#
# Started Solr server on port 44450 (pid=201408). Happy searching!
#
# INFO  - 2023-09-28 05:48:18.307; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 05:48:18.313; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 05:48:18.664; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 05:48:18.667; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 05:48:18.667; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:18.699 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 EA 9F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:54.000 UTC",
#     "not  after"         : "2023-12-27 05:47:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 EE 6F 68 9C B0 E9 09   AA 54 38 92 5C CE 75 99  V.oh.....T8.\.u.
#         0010: C6 8E 6C DB                                        ..l.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:18.703 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D EB 84 BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:46.000 UTC",
#     "not  after"         : "2023-12-27 05:47:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:18.717 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:18.937 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:18.939 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:18.939 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.944 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.955 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.955 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.956 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:18.958 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6E 95 71 98 DB 63 C3 E8 1F 6B C4 D5 72 39 A1 A8 16 BE 69 D8 A5 9E 1E F7 12 BE FF E6 D1 57 E5 5D",
#   "session id"          : "2A F3 BD 7B 57 A5 51 56 FE 81 83 19 07 B3 72 2E E5 1F 9F EB AE 1F AC 72 41 88 D0 98 16 12 39 DC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 BD 6E 3B 5E 7C 13 3E   E0 B6 73 6B 47 81 07 AB  ..n;^..>..skG...
#             0010: 74 CC 3D 83 47 33 EC 1A   61 06 1B EB 96 A7 30 45  t.=.G3..a.....0E
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.068 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CD 4D 04 CC 9B 28 0A FD FC 13 90 34 AD 04 CB D3 83 64 28 A1 A8 4D 3E C5 ED 8E E5 69 DB DE 9D A0",
#   "session id"          : "2A F3 BD 7B 57 A5 51 56 FE 81 83 19 07 B3 72 2E E5 1F 9F EB AE 1F AC 72 41 88 D0 98 16 12 39 DC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 90 6E E5 46 92 2F 95 80   66 31 CA 6D B8 4B D2 B2  .n.F./..f1.m.K..
#           0010: 5E 19 70 1B 00 88 ED 08   40 A2 A8 6D 5E 6F 78 24  ^.p.....@..m^ox$
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.069 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.069 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.070 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.071 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.071 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.073 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.073 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.073 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.074 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.082 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.083 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.084 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.088 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.088 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.088 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.089 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.091 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.091 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.091 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.092 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.092 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.093 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.093 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.096 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 8A BF 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 05:47:50.000 UTC",
#       "not  after"         : "2023-12-27 05:47:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#           0010: A6 3E 49 5D                                        .>I]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 51 F5 A9 0B DE 53 D2   04 37 58 44 A7 48 79 C3  .Q....S..7XD.Hy.
#           0010: 5F 19 C3 C0                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.096 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:19.142 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:19.143 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:19.143 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:19.143 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.170 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.174 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 02 A4 FF E6 49 B4 06   EF 69 E3 AE F3 AB 27 58  -....I...i....'X
#     0010: CD 77 6B 85 D7 CF 47 42   82 CA 4F A4 FB 48 45 C0  .wk...GB..O..HE.
#     0020: C3 07 34 EE 3F 5F FE 3F   01 3A 7E A5 9B 50 1F 78  ..4.?_.?.:...P.x
#     0030: E9 53 77 1D 77 8C 78 78   6A 97 0B E2 0A 26 10 F9  .Sw.w.xxj....&..
#     0040: EF 07 5D DB C0 32 D1 68   2A 7D 47 52 A8 3B A6 1D  ..]..2.h*.GR.;..
#     0050: A0 93 AB 05 6D 96 92 3E   55 CB AB E4 C4 6F CE 5C  ....m..>U....o.\
#     0060: E9 38 51 95 32 D3 CF 16   B3 95 8E 5A 21 B5 19 47  .8Q.2......Z!..G
#     0070: 05 B2 4E EC 3B 75 FF AB   8D D3 63 37 4A FD BE 54  ..N.;u....c7J..T
#     0080: F6 35 5F 80 1C 42 BF 8C   AF 9E DA AD B3 B5 C9 09  .5_..B..........
#     0090: 6C 55 0C 27 6B AA E7 0D   DD EB CB 68 32 47 BB DD  lU.'k......h2G..
#     00A0: 24 E7 04 8E 7A 01 26 55   C4 81 25 24 EF 59 5F 34  $...z.&U..%$.Y_4
#     00B0: 33 B5 3F 14 A5 F4 AD 76   37 13 93 C0 24 6C B5 53  3.?....v7...$l.S
#     00C0: 9D 65 ED 9C FC F4 7A 6C   EE 25 11 5D 23 9F 1B DA  .e....zl.%.]#...
#     00D0: C9 78 DC FA AF A7 97 66   73 61 10 EB 0C 97 EA 8C  .x.....fsa......
#     00E0: E6 DB B0 F4 0B A7 30 70   5A ED 88 5C 06 0D 44 9A  ......0pZ..\..D.
#     00F0: ED AA A9 FB 67 C7 AD AA   78 EE 54 C0 FA FA 0F 48  ....g...x.T....H
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.175 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7B 19 8F B8 4B 57 5D C4   0E 4F ED 1C 60 DD 5F CE  ....KW]..O..`._.
#     0010: 06 03 24 FF 09 D5 AD 1B   14 48 6D 6C 64 47 E2 27  ..$......HmldG.'
#     0020: 82 F2 32 94 9C D5 20 67   9F 48 FC E4 87 EB 67 12  ..2... g.H....g.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.177 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:19.178 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.179 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:19.179 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.179 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:19.179 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:19.179 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.180 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.182 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 EA 9F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 05:47:54.000 UTC",
#       "not  after"         : "2023-12-27 05:47:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#           0010: A6 3E 49 5D                                        .>I]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 EE 6F 68 9C B0 E9 09   AA 54 38 92 5C CE 75 99  V.oh.....T8.\.u.
#           0010: C6 8E 6C DB                                        ..l.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 62 46 9E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 05:47:48.000 UTC",
#       "not  after"         : "2023-12-27 05:47:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#           0010: 4B 6D A6 40                                        Km.@
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#           0010: A6 3E 49 5D                                        .>I]
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.208 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 1C 4D F8 38 30 97 91   A9 BB 10 FA 54 9E D1 00  ..M.80......T...
#     0010: 5B 88 F0 A6 8F C7 72 6B   EA CB 6D 94 06 29 75 94  [.....rk..m..)u.
#     0020: 56 4D 6A C6 5A 1B B0 10   00 18 56 4F 2B 70 04 28  VMj.Z.....VO+p.(
#     0030: 78 74 C6 AC E9 1E C1 63   AA 09 6F 24 D5 2E FC C1  xt.....c..o$....
#     0040: A7 8E 97 4E 25 D1 19 21   E0 7B E8 0E 20 22 17 CE  ...N%..!.... "..
#     0050: 3A 29 B8 9E E9 F1 92 FC   FC 14 80 1E 28 A2 AB 77  :)..........(..w
#     0060: 93 74 9C C7 B2 A5 31 B0   46 91 54 5D 05 BB 2A 39  .t....1.F.T]..*9
#     0070: F8 3C E7 0C 84 1E 99 A2   9F 0B 4D F6 17 26 35 4A  .<........M..&5J
#     0080: 57 F3 DE FB 78 93 B1 FA   8B 80 09 EA C6 2F A8 4D  W...x......../.M
#     0090: 6E 72 00 E4 D2 F5 43 71   F7 F4 F9 DB 30 F9 74 42  nr....Cq....0.tB
#     00A0: 20 C9 6C 8A F6 3B BB 62   F3 20 0A C8 4C E7 BC 9A   .l..;.b. ..L...
#     00B0: FC FE BB E1 94 F3 A6 68   11 BF 32 B2 7E D2 78 97  .......h..2...x.
#     00C0: 70 DF 38 C7 C4 91 AB F8   1C 63 84 30 C7 AA C9 BE  p.8......c.0....
#     00D0: C3 B1 BE BE F2 6A D4 10   7B 68 4B 43 35 C9 88 23  .....j...hKC5..#
#     00E0: E5 A9 AE EE E6 2C 80 F5   7B 42 42 B0 C6 7D F5 61  .....,...BB....a
#     00F0: 08 AF C6 96 E3 70 AD 53   ED D3 30 59 FC 34 86 C7  .....p.S..0Y.4..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.209 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E 7A 54 12 BE 93 B8 C6   5E 81 EF 6A 78 EF 1C DC  .zT.....^..jx...
#     0010: D5 E6 CF FF 5F 7D D8 8A   56 FE AA 89 33 A8 75 E8  ...._...V...3.u.
#     0020: 26 48 66 EE A1 55 95 B3   20 74 80 A3 8B 25 C4 AD  &Hf..U.. t...%..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.210 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:19.257 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "60 50 67 DE 68 9D B4 91 A7 8C CF 44 BB D3 05 27 C2 16 04 D1 61 BD 8D D8 A2 9E EF 61 98 25 A4 46",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 05:48:19.516 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 05:48:19.517 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 05:48:20.435; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 05:48:20.441; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 05:48:20.790; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 05:48:20.793; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 05:48:20.793; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-K49k8I/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:20.824 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 EA 9F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:54.000 UTC",
#     "not  after"         : "2023-12-27 05:47:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 56 EE 6F 68 9C B0 E9 09   AA 54 38 92 5C CE 75 99  V.oh.....T8.\.u.
#         0010: C6 8E 6C DB                                        ..l.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:20.829 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D EB 84 BB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:46.000 UTC",
#     "not  after"         : "2023-12-27 05:47:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 05:48:20.843 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:20.947 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:20.947 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:20.948 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:48:20.948 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:21.071 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:21.073 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 05:48:21.073 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.079 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.090 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 05:48:21.092 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "92 A6 2E 15 6F 6C 46 A7 A6 28 91 4B D8 40 40 42 0B 78 9B BE 79 DA DC C9 B8 08 16 AE 76 0F 6F DB",
#   "session id"          : "93 63 BC A4 30 22 F6 38 48 ED 34 EF C3 3E 9A 69 5E D7 FC 40 D1 1B F8 28 3E 37 D4 17 38 86 04 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 B5 9C 11 0E D2 51 44   A8 10 E2 A1 90 28 C5 62  ......QD.....(.b
#             0010: 4E D6 EF 3F DB 95 6D A5   63 44 36 5A 27 EE CD 57  N..?..m.cD6Z'..W
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.191 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2E 15 92 27 63 77 9D 9C 3D 28 73 34 3B 8D 16 AC CA E9 70 5A 8C 69 55 35 84 EA A7 2D A3 D2 AE F1",
#   "session id"          : "93 63 BC A4 30 22 F6 38 48 ED 34 EF C3 3E 9A 69 5E D7 FC 40 D1 1B F8 28 3E 37 D4 17 38 86 04 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 9C B2 77 3F 3E 7F 89 EB   BC 59 92 EA 4C 6A BE 00  ..w?>....Y..Lj..
#           0010: FB 79 3D 50 85 A7 B4 44   60 B3 E4 8B 1E DE CE 07  .y=P...D`.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.191 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.192 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.194 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.194 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.195 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.195 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.204 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.207 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.213 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.214 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.214 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.215 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.215 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.215 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.218 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 8A BF 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 05:47:50.000 UTC",
#       "not  after"         : "2023-12-27 05:47:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#           0010: A6 3E 49 5D                                        .>I]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 51 F5 A9 0B DE 53 D2   04 37 58 44 A7 48 79 C3  .Q....S..7XD.Hy.
#           0010: 5F 19 C3 C0                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.218 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.294 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 62 46 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 05:47:48.000 UTC",
#     "not  after"         : "2023-12-27 05:47:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6A D7 D3 92 9F 79 48 01   E5 74 53 00 84 61 60 D7  j....yH..tS..a`.
#         0010: 4B 6D A6 40                                        Km.@
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#         0010: A6 3E 49 5D                                        .>I]
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.297 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 5B 75 1F 10 93 BB A1   9D 7A E5 06 80 3E D4 B9  S[u......z...>..
#     0010: 1C AA AF 0E 79 9D 97 C6   39 DD 85 36 54 74 A5 7E  ....y...9..6Tt..
#     0020: 5D 03 AA D7 7D 95 27 17   77 E5 43 36 A6 EE 7B 67  ].....'.w.C6...g
#     0030: 68 29 42 AC FA C7 CB 9C   0B 23 C3 49 AF 26 95 AA  h)B......#.I.&..
#     0040: 9E 03 60 AC BC D9 17 9B   0B 7E F2 3F 47 44 6F 71  ..`........?GDoq
#     0050: F9 7E 2A DB C8 5E 4E A6   27 2E 04 BB C5 D3 FD 73  ..*..^N.'......s
#     0060: 76 F3 BF 5C 9D 0D A4 A1   CA 08 1F F9 77 F1 62 D4  v..\........w.b.
#     0070: DC D4 44 24 B4 F0 34 78   19 96 E9 49 D4 7E 80 B4  ..D$..4x...I....
#     0080: 8F DD B0 B0 C8 01 49 A9   51 F1 BF 0F 51 49 90 17  ......I.Q...QI..
#     0090: 15 B8 CA 9A A6 51 03 9E   91 B8 B6 A8 E4 F8 E7 EA  .....Q..........
#     00A0: 5E DA 57 5F F4 1A 3F EC   E7 25 24 DF C4 51 F3 4C  ^.W_..?..%$..Q.L
#     00B0: A1 6E B7 5E B2 79 40 36   CE D7 19 78 0B F1 83 1A  .n.^.y@6...x....
#     00C0: E4 96 4B 25 42 5C ED 2D   1B 63 57 90 D9 D8 01 72  ..K%B\.-.cW....r
#     00D0: 08 E8 0E 66 15 8F CE 68   92 1D 49 B5 36 DC 98 83  ...f...h..I.6...
#     00E0: F9 3D 4F 07 E3 1E EE E6   BC 88 F6 BC 96 43 9F 77  .=O..........C.w
#     00F0: 1E 77 B6 8A 55 C8 07 34   BF 58 A7 82 08 01 C6 E6  .w..U..4.X......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.299 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9E FE 3E 57 5A 59 5B B2   23 F4 8A D2 81 18 BC 1B  ..>WZY[.#.......
#     0010: BC 18 CC B2 A5 29 0A 32   72 87 5A 05 C5 18 09 E4  .....).2r.Z.....
#     0020: 0E 9A D1 69 2C E8 D8 C3   D0 21 EB 9D A8 F4 79 08  ...i,....!....y.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.301 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:21.302 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:21.302 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 05:48:21.303 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:48:21.303 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.303 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 05:48:21.306 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 EA 9F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 05:47:54.000 UTC",
#       "not  after"         : "2023-12-27 05:47:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F E5 BB 48 33 F6 BE 7D   D5 95 A1 5E 70 1F D7 D3  ...H3......^p...
#           0010: A6 3E 49 5D                                        .>I]
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 56 EE 6F 68 9C B0 E9 09   AA 54 38 92 5C CE 75 99  V.oh.....T8.\.u.
#           0010: C6 8E 6C DB                                        ..l.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 62 46 9E",
#       "signature algorithm": "SHA256withR

[...truncated too long message...]

297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 05:49:51.079 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:49:51.127 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:49:51.127 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:49:51.127 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 05:49:51.127 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44450/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28617ms
ok 65 stop command for single port in 31400ms
ok 66 status detects locally running solr in 14315ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2143ms
ok 69 copying files around in 6437ms
ok 70 upconfig in 2587ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1217ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cli.TestSolrCLIRunExample.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cli.TestSolrCLIRunExample.testInteractiveSolrCloudExample" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=676474BC06788E37 -Ptests.file.encoding=UTF-8


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 37s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m3.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5560 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5560/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40391/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-28 01:53:19.573; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 01:53:19.578; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-28 01:53:20.513; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-28 01:53:20.554; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22845ms
ok 61 start solr with client truststore and security manager in 25210ms
not ok 62 start solr with mTLS needed in 56612ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-AxUvsA/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40391.
#
# Started Solr server on port 40391 (pid=201896). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40392.
#
# Started Solr server on port 40392 (pid=202320). Happy searching!
#
# INFO  - 2023-09-28 01:54:43.862; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 01:54:43.867; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 01:54:44.248; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 01:54:44.251; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 01:54:44.251; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:44.283 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 ED C7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:20.000 UTC",
#     "not  after"         : "2023-12-27 01:54:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 44 F9 39 C9 0F 2D C1 63   BA DB F8 AA 1D 26 F6 B2  D.9..-.c.....&..
#         0010: 63 E7 7C CE                                        c...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:44.287 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 9D AC 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:11.000 UTC",
#     "not  after"         : "2023-12-27 01:54:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:44.301 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:44.388 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:44.388 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:44.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:44.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:44.530 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.531 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:44.532 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:44.533 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.538 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.549 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.549 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.550 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:44.552 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "73 5A AC 42 1C 30 46 59 9E 90 2F 24 A6 58 B8 8D 18 6D A7 3B 9E 53 5E CE 3D E6 27 63 DC 60 3D 62",
#   "session id"          : "07 C5 8A 91 89 E0 0D C5 7A 5A C6 59 B6 59 DC 3D B8 4F FB 46 62 4C C7 05 16 59 F2 18 4B 19 81 0C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 DA 4B CB BD 9B 12 63   0A 0A 2F 83 CF 7E 12 AE  q.K....c../.....
#             0010: 89 ED B4 81 BC 5E 14 C7   76 A4 B0 12 1C 51 14 10  .....^..v....Q..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.661 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B5 BC 44 3C C7 93 56 12 A3 1D 39 2B 7F 1E 76 AF 23 1C 7B 6A BB 87 01 AE DA E7 C0 C8 87 5A 0A CD",
#   "session id"          : "07 C5 8A 91 89 E0 0D C5 7A 5A C6 59 B6 59 DC 3D B8 4F FB 46 62 4C C7 05 16 59 F2 18 4B 19 81 0C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0C B5 C2 F0 8D 90 8A 46   04 D8 A2 33 8E CA B1 BF  .......F...3....
#           0010: 4F 6B 7E 4A 5F 8B 68 72   A1 C4 23 87 B3 8C 9D 22  Ok.J_.hr..#...."
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.662 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.662 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.663 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.664 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.664 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.666 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.666 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.666 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.666 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.667 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.675 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.677 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.678 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.682 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.682 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.683 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.685 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.686 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.686 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.686 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.687 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.688 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.691 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 D7 CF 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:16.000 UTC",
#       "not  after"         : "2023-12-27 01:54:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 A3 38 09 04 4B 55 BD   E5 46 D4 D6 54 EC E5 5F  ..8..KU..F..T.._
#           0010: DB 5D 09 E0                                        .]..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.691 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.773 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.777 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 99 70 BA A8 8D E8 3C   1B DA E8 1E F3 6B D0 0B  s.p....<.....k..
#     0010: A8 B0 42 F7 FC 38 00 18   D6 6C D1 5F 88 53 23 88  ..B..8...l._.S#.
#     0020: 56 0E 3E 46 A4 65 50 AD   EC BD 75 57 C8 02 9B 5B  V.>F.eP...uW...[
#     0030: A3 DE B3 F5 5A 75 DC 9B   A6 A7 48 07 D2 BE 24 21  ....Zu....H...$!
#     0040: 8E 36 12 3A B4 65 9B 6B   BB D8 35 C0 A4 BB BA F6  .6.:.e.k..5.....
#     0050: 9F 27 E8 B7 C2 04 E4 13   F4 F3 C8 B5 EE 60 3A E7  .'...........`:.
#     0060: C3 8D D6 E3 3F B7 B0 EA   FB DE 2A 5B 30 18 BB CA  ....?.....*[0...
#     0070: 88 39 A8 84 26 76 FB 4F   F9 C8 5C 8A 76 F6 4F AC  .9..&v.O..\.v.O.
#     0080: FD 43 5F B8 D5 C1 A6 D4   21 86 3B BC 89 0B F8 01  .C_.....!.;.....
#     0090: A1 1F 07 72 8B F8 2A 74   41 34 FB 55 C2 9F EE D5  ...r..*tA4.U....
#     00A0: 60 86 7E C8 77 23 B7 2C   79 A3 8B 6A E7 7E 4C 4D  `...w#.,y..j..LM
#     00B0: E8 E8 4E 4A 84 75 19 FB   80 1A 30 85 18 59 E8 A8  ..NJ.u....0..Y..
#     00C0: 51 14 5C F3 66 F0 36 26   46 A4 5F CE B8 82 D8 8E  Q.\.f.6&F._.....
#     00D0: 5E BB B9 0A B6 FC E0 FA   11 74 79 D9 E5 E3 22 EE  ^........ty...".
#     00E0: F7 BA 84 58 56 7F 0F 68   21 84 71 11 63 22 2E FC  ...XV..h!.q.c"..
#     00F0: 47 72 B1 18 CB F8 C6 27   31 A9 00 6C 27 2B 37 EB  Gr.....'1..l'+7.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.779 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 CE 43 49 C8 A2 33 17   BA BB 9B 9D 04 9D AD 42  ..CI..3........B
#     0010: FE 45 8D EC 5F BF DB 72   B1 A1 2A 5E C0 66 7E B6  .E.._..r..*^.f..
#     0020: B4 D0 05 47 F6 AD FA 15   45 43 E7 E2 44 9B A8 7C  ...G....EC..D...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.781 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:44.782 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.782 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:44.783 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.783 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:44.783 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:44.783 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.784 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.786 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 ED C7 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:20.000 UTC",
#       "not  after"         : "2023-12-27 01:54:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 44 F9 39 C9 0F 2D C1 63   BA DB F8 AA 1D 26 F6 B2  D.9..-.c.....&..
#           0010: 63 E7 7C CE                                        c...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 1A 99 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:13.000 UTC",
#       "not  after"         : "2023-12-27 01:54:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#           0010: 40 D9 4C 81                                        @.L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.813 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C2 F0 A3 DE DB 4B 33 FD   40 CD C2 4C BA DB AB A9  .....K3.@..L....
#     0010: 71 BB E7 EE 57 E1 30 2F   77 B1 B7 B2 CD E9 1C 39  q...W.0/w......9
#     0020: D4 74 79 FB 65 B5 1B 72   2D F6 A0 7C E5 FD 02 4B  .ty.e..r-......K
#     0030: 02 B2 3A D3 E4 75 F7 E4   52 59 EF 22 57 CE 9A F2  ..:..u..RY."W...
#     0040: 7F 4C D7 5C F6 B1 B2 16   ED 67 AA C4 88 1A 6F 9C  .L.\.....g....o.
#     0050: 9C 73 7C 1B 3D FC 3C 8B   C1 6A D4 46 22 24 E5 A5  .s..=.<..j.F"$..
#     0060: 61 3A D2 2D F7 52 D0 DE   64 36 56 A9 EC 4D 55 4D  a:.-.R..d6V..MUM
#     0070: 8C C1 B2 9C 97 EC D8 B0   0B 80 48 91 1F FC 5D 03  ..........H...].
#     0080: 54 91 9C 29 39 F2 8E 51   2B 08 BC 01 16 F4 C8 E2  T..)9..Q+.......
#     0090: 19 2C 2B E9 45 06 D8 EA   D8 9A 5D 85 5A 98 A0 4B  .,+.E.....].Z..K
#     00A0: BE B2 D1 9A 54 99 26 E1   F8 25 85 BE CA 4D 42 D1  ....T.&..%...MB.
#     00B0: 71 6B B1 C3 A7 76 AC F2   74 A2 9B C0 7A 33 65 9E  qk...v..t...z3e.
#     00C0: 31 E2 7D D3 27 C7 0F B4   C3 4B CD 04 DF C6 A7 69  1...'....K.....i
#     00D0: D4 48 A0 34 87 27 77 DC   2E 2F 3B 23 72 27 F0 8E  .H.4.'w../;#r'..
#     00E0: B4 E9 BF CB B1 2C 82 C2   99 99 C8 6D 71 AF CD 51  .....,.....mq..Q
#     00F0: 68 45 D2 FF 32 A8 06 D6   C4 C7 68 D7 3D E3 EA 48  hE..2.....h.=..H
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.814 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 34 DC 80 92 FA FA F2 E1   E0 11 D2 43 EE 47 6A C3  4..........C.Gj.
#     0010: F3 25 39 69 1E 8B 47 EF   DC 8A 41 F7 F6 97 29 E5  .%9i..G...A...).
#     0020: 87 85 35 24 02 3D 42 C9   6B 5A 81 DE 6F 22 FA C4  ..5$.=B.kZ..o"..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.815 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:44.866 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0D 68 1C 74 59 DB CE DA E8 74 2B 02 FF CB 5A 5A A0 FA 27 3F 51 F4 3F 19 F4 6C F4 2F 74 A3 CB F5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 01:54:45.132 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 01:54:45.133 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-28 01:54:46.092; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-28 01:54:46.097; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-28 01:54:46.483; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 01:54:46.486; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-28 01:54:46.487; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-AxUvsA/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:46.522 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 ED C7 33",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:20.000 UTC",
#     "not  after"         : "2023-12-27 01:54:20.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 44 F9 39 C9 0F 2D C1 63   BA DB F8 AA 1D 26 F6 B2  D.9..-.c.....&..
#         0010: 63 E7 7C CE                                        c...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:46.527 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 9D AC 5C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:11.000 UTC",
#     "not  after"         : "2023-12-27 01:54:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:46.542 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:46.883 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:46.883 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:46.884 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:54:46.884 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:47.047 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:47.049 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:47.050 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.056 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.068 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.068 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.068 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:47.072 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3C C1 5C 64 F0 25 41 99 D9 AD D7 FD 8E D7 D1 1C 0B 33 B4 AB E2 48 3C 65 34 AF B7 CB 0E CD 73 3A",
#   "session id"          : "4D C8 B4 4F 81 32 59 64 7A A4 60 E6 D4 D0 9A 2D B6 0A 8A 7F C1 B8 02 8A 67 87 41 D3 AF D1 40 6D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CE B7 86 EC 6C EE 9F 14   00 12 57 9C AA C4 BD C1  ....l.....W.....
#             0010: 6D 91 82 8B B5 23 B5 B0   6E D3 F2 F4 D2 B2 9C 60  m....#..n......`
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.187 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A1 DA 06 1A 94 0B 13 70 B7 D4 E9 8F 25 25 B6 8E 20 E3 DC D1 08 C6 63 CE 34 E7 1A 9A B4 64 59 A8",
#   "session id"          : "4D C8 B4 4F 81 32 59 64 7A A4 60 E6 D4 D0 9A 2D B6 0A 8A 7F C1 B8 02 8A 67 87 41 D3 AF D1 40 6D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0F 64 06 8C 6D 3D B7 FA   9D FE 40 5D 49 06 EB 6D  .d..m=....@]I..m
#           0010: 00 AF 79 6C 57 B4 02 40   D3 54 EB DE 56 EF F9 16  ..ylW..@.T..V...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.188 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.188 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.190 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.190 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.190 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.190 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.191 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.193 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.193 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.194 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.195 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.195 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.203 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.204 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.206 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.209 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.210 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.210 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.213 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.214 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.215 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.216 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.216 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.220 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 D7 CF 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:16.000 UTC",
#       "not  after"         : "2023-12-27 01:54:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 A3 38 09 04 4B 55 BD   E5 46 D4 D6 54 EC E5 5F  ..8..KU..F..T.._
#           0010: DB 5D 09 E0                                        .]..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.220 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.311 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 1A 99 34",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-28 01:54:13.000 UTC",
#     "not  after"         : "2023-12-27 01:54:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#         0010: 40 D9 4C 81                                        @.L.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#         0010: 15 07 68 35                                        ..h5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.315 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 F7 F5 64 3C 24 5F 0E   3D 0A E2 96 20 80 8F 0D  4..d<$_.=... ...
#     0010: C3 A1 D2 70 55 0F D7 32   A6 CD C0 28 E5 81 F7 5E  ...pU..2...(...^
#     0020: FE 2A DC 34 22 CA D8 D3   9A BE 0F CD 43 37 EA 80  .*.4".......C7..
#     0030: C8 CA AA BD FB B7 27 FC   96 49 34 F0 C3 D6 5D CA  ......'..I4...].
#     0040: 5F D2 F7 98 75 02 6F 26   94 2A 62 3A E1 D7 0F 0C  _...u.o&.*b:....
#     0050: D2 FC 04 2E 4C 46 BC A6   70 F4 86 66 46 40 D3 10  ....LF..p..fF@..
#     0060: 49 2A 0B 58 17 4B 23 32   46 30 46 EB 48 3D 8C E7  I*.X.K#2F0F.H=..
#     0070: C0 A8 85 7B 70 A5 FB 3E   FF DB 3E DD 92 AF 76 78  ....p..>..>...vx
#     0080: 26 FC 23 07 65 BB 2F 78   C8 41 A9 5A A8 E4 11 9D  &.#.e./x.A.Z....
#     0090: BC AA 4E 99 B1 69 E0 6F   CC A1 90 1E 6E 5D A1 7D  ..N..i.o....n]..
#     00A0: 94 B4 B3 78 8F 4E 3F 02   40 13 15 1B B9 B0 42 7C  ...x.N?.@.....B.
#     00B0: 61 1E A5 94 1A 89 A1 2C   C8 A6 01 B5 C6 6E DF DD  a......,.....n..
#     00C0: 65 95 45 F9 F1 F4 95 33   57 F9 7A DD 9E CE 42 E3  e.E....3W.z...B.
#     00D0: 2D AE CB 5D 8F 94 B4 87   FE D5 8E 32 11 81 A3 20  -..].......2...
#     00E0: 4B 5B DC 1B 17 7B 60 A0   E1 9C 0F 3C 95 2B 5E 45  K[....`....<.+^E
#     00F0: A2 C3 AC 3A 44 08 0E A1   34 00 20 D5 F9 49 6A BF  ...:D...4. ..Ij.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.318 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D 82 40 EC D6 45 9E 08   1C 8E E8 9F F8 D6 DC 9F  =.@..E..........
#     0010: 5F 8A A2 EB FC 84 0C BD   61 3A C4 EB 11 FC DB 04  _.......a:......
#     0020: 3E B5 84 DD 40 AF 0D F7   66 D5 AD 46 51 FB 35 7E  >...@...f..FQ.5.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.320 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:47.321 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.322 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:47.322 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.322 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-28 01:54:47.323 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:47.323 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.323 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.327 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 ED C7 33",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:20.000 UTC",
#       "not  after"         : "2023-12-27 01:54:20.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 44 F9 39 C9 0F 2D C1 63   BA DB F8 AA 1D 26 F6 B2  D.9..-.c.....&..
#           0010: 63 E7 7C CE                                        c...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 1A 99 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:13.000 UTC",
#       "not  after"         : "2023-12-27 01:54:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#           0010: 40 D9 4C 81                                        @.L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.354 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 34 D9 A8 FD 4C 5C 76   25 EF 62 B3 59 9A E5 C5  .4...L\v%.b.Y...
#     0010: D0 A7 CF 4E 5D BB 3D 17   CC 7A 79 79 8F DB EF 55  ...N].=..zyy...U
#     0020: 12 DC B7 EA B4 45 93 BF   29 56 81 DF F5 D9 30 B9  .....E..)V....0.
#     0030: 58 20 D3 E6 D3 B2 7A C1   EF A0 07 28 7F BB C1 BE  X ....z....(....
#     0040: A2 7A 10 B9 22 65 4B BE   D9 EA 48 16 60 E7 C6 82  .z.."eK...H.`...
#     0050: BD A1 C9 33 FB 1F B7 83   11 05 DA CF BD 43 C0 50  ...3.........C.P
#     0060: 95 6D A2 5C AF 77 54 82   73 D9 46 E2 B1 76 EC B6  .m.\.wT.s.F..v..
#     0070: 25 9B 12 02 F3 40 E7 0C   A9 5A 6E D1 FA 1B A5 FD  %....@...Zn.....
#     0080: 5E 9A 43 DB 0A 2E 33 57   8C F3 11 0C 2A 9D 81 34  ^.C...3W....*..4
#     0090: 95 7F 47 B6 96 E0 6A 12   6C 82 A1 D0 47 54 6C 34  ..G...j.l...GTl4
#     00A0: 11 FF 84 FC A0 5F 71 5E   F8 CE 76 6A 79 0E BD 0C  ....._q^..vjy...
#     00B0: B4 D2 45 01 3A 50 31 2E   81 E3 D1 01 D4 27 83 15  ..E.:P1......'..
#     00C0: 27 E5 3A 06 31 7A 82 74   1F B0 61 4D 9B 5B D3 A6  '.:.1z.t..aM.[..
#     00D0: FB AF 65 F6 23 A0 06 86   50 70 82 F9 5E 7A F5 3D  ..e.#...Pp..^z.=
#     00E0: 4A 71 68 D6 42 0E F5 B6   03 3A CF 70 E3 FA 49 AF  Jqh.B....:.p..I.
#     00F0: 7E 30 5A 64 21 E2 F6 5A   09 21 D4 BA 25 A3 D8 CB  .0Zd!..Z.!..%...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.355 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 18 2F D4 76 3A FE 5F AC   E7 1B 6D 49 59 AD BA 85  ./.v:._...mIY...
#     0010: 45 B7 2F B3 E5 19 72 20   F1 74 64 69 84 98 91 89  E./...r .tdi....
#     0020: 16 00 A5 4D FF 98 59 F2   E0 DE 7D 0C 83 52 8F 38  ...M..Y......R.8
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.356 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:47.410 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1A 87 48 1E 2F 31 BC 5D D8 A3 AE 90 40 D2 EC D9 DE D0 F3 95 F7 73 50 D2 70 B8 4D 3F 22 E3 D2 44",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-28 01:54:47.717 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-28 01:54:47.718 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-28 01:54:58.499; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:58.836 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 9D AC 5C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:11.000 UTC",
#       "not  after"         : "2023-12-27 01:54:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#           0010: 40 D9 4C 81                                        @.L.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 1A 99 34",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-28 01:54:13.000 UTC",
#       "not  after"         : "2023-12-27 01:54:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 61 D5 29 98 A2 EF 14 5C   8D 42 33 F6 0B 6B E1 37  a.)....\.B3..k.7
#           0010: 40 D9 4C 81                                        @.L.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 45 56 3B B4 5E AC CE   AD 4B A5 75 3F 4C 3B 3D  UEV;.^...K.u?L;=
#           0010: 15 07 68 35                                        ..h5
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-28 01:54:58.851 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:59.084 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.084 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:59.086 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-28 01:54:59.086 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.092 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.105 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.105 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-28 01:54:59.108 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "08 B9 CA 05 25 D6 CE C9 BB 32 10 77 30 88 10 26 2B C6 A1 3E A9 A1 48 62 F7 E0 D3 B2 7E F1 D8 F1",
#     "session id"          : "85 8C 2A DF D5 6A 4E DA 2F F6 16 24 E7 E4 95 0D 16 29 7F CA E8 BD F3 5A 2E 99 15 77 D1 77 DA 54",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 40 86 43 0D 64 B3 93 DE   3E FA 08 C7 F5 B9 BF 49  @.C.d...>......I
#               0010: 7E B0 F3 07 5D 12 FA 96   70 96 5E 9F 93 3E F1 7D  ....]...p.^..>..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.126 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "2D C6 D5 D0 8F 20 5A 8E CF DB 8E F9 A1 76 1E 31 1A E2 6D 6F 23 D5 6E 73 9A 79 A5 AE 32 D8 12 F5",
#     "session id"          : "85 8C 2A DF D5 6A 4E DA 2F F6 16 24 E7 E4 95 0D 16 29 7F CA E8 BD F3 5A 2E 99 15 77 D1 77 DA 54",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2D A6 08 4A CE 23 18 CA   E4 33 64 C9 2E 22 21 11  -..J.#...3d.."!.
#             0010: AB 10 ED 08 D1 C1 DB 8D   3A AB D5 78 27 1A 00 62  ........:..x'..b
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.126 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.127 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.127 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.128 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.131 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.131 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.131 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:59.132 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:59.133 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.133 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.140 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.141 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.142 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.146 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.146 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.146 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.146 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.147 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.147 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:59.147 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:54:59.147 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-28 01:54:59.148 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certific

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-28 01:56:17.344 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:56:17.391 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:56:17.392 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:56:17.392 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-28 01:56:17.392 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40392/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28208ms
ok 65 stop command for single port in 31723ms
ok 66 status detects locally running solr in 14346ms
ok 67 status does not expose cli parameters to end user in 216ms
ok 68 listing out files in 2172ms
ok 69 copying files around in 6643ms
ok 70 upconfig in 2621ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1230ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 73 Cleanup in 1228ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 12s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m39s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5559 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5559/

1 tests failed.
FAILED:  org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod

Error Message:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=323, name=OverseerExitThread, state=TIMED_WAITING, group=Overseer state updater.]
        at java.base@11.0.16/java.lang.Thread.sleep(Native Method)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryDelay(ZkCmdExecutor.java:101)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:80)
        at app//org.apache.solr.common.cloud.SolrZkClient.getData(SolrZkClient.java:436)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater.checkIfIamStillLeader(Overseer.java:482)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater$$Lambda$1403/0x0000000840629040.run(Unknown Source)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)

Stack Trace:
com.carrotsearch.randomizedtesting.ThreadLeakError: 1 thread leaked from SUITE scope at org.apache.solr.cloud.TestLeaderElectionZkExpiry: 
   1) Thread[id=323, name=OverseerExitThread, state=TIMED_WAITING, group=Overseer state updater.]
        at java.base@11.0.16/java.lang.Thread.sleep(Native Method)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryDelay(ZkCmdExecutor.java:101)
        at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:80)
        at app//org.apache.solr.common.cloud.SolrZkClient.getData(SolrZkClient.java:436)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater.checkIfIamStillLeader(Overseer.java:482)
        at app//org.apache.solr.cloud.Overseer$ClusterStateUpdater$$Lambda$1403/0x0000000840629040.run(Unknown Source)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
	at __randomizedtesting.SeedInfo.seed([A558F185E96F6578]:0)




Build Log:
[...truncated 2154 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34701/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 23:50:37.369; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 23:50:37.374; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 23:50:38.268; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 23:50:38.306; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23456ms
ok 61 start solr with client truststore and security manager in 25023ms
not ok 62 start solr with mTLS needed in 59242ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-KviqiV/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34701.
#
# Started Solr server on port 34701 (pid=201035). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34702.
#
# Started Solr server on port 34702 (pid=201460). Happy searching!
#
# INFO  - 2023-09-27 23:52:01.956; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 23:52:01.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 23:52:02.329; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 23:52:02.332; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 23:52:02.332; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:02.365 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 1F 80 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:38.000 UTC",
#     "not  after"         : "2023-12-26 23:51:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 01 0E 50 B7 FA 88 04   6F E6 29 7A D4 0A D9 75  ...P....o.)z...u
#         0010: E9 D2 AD 6D                                        ...m
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:02.369 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 38 6C 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:29.000 UTC",
#     "not  after"         : "2023-12-26 23:51:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:02.385 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:02.615 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.615 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:02.617 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:02.618 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.624 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.636 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.636 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.636 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:02.639 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A9 84 3F 6B 69 44 2A 1F AF 39 0C BA EB 78 B0 92 91 52 06 58 7F B1 7E 27 A6 3F F7 35 F0 4A 1E E5",
#   "session id"          : "FC 28 90 18 59 1D C0 CE 35 FF 0E EA A9 15 46 83 62 41 A7 91 16 3A 25 51 4B 3E 50 D7 EE E5 DF 32",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 23 D9 C7 05 3C 01 51 E5   95 91 90 B0 B6 A7 C2 EC  #...<.Q.........
#             0010: B3 99 E6 7F 1D D0 17 97   CC 21 71 EC 9C C5 D9 16  .........!q.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.756 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "05 7E 76 91 D1 31 8C B9 09 09 5D 7A 87 F1 61 17 21 5A C8 BA 5C 50 FE 8D 43 CF F1 E1 0C D0 05 C5",
#   "session id"          : "FC 28 90 18 59 1D C0 CE 35 FF 0E EA A9 15 46 83 62 41 A7 91 16 3A 25 51 4B 3E 50 D7 EE E5 DF 32",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1A 11 76 F7 DB 5A 13 06   0D A1 67 B3 3B 3B 0F 9E  ..v..Z....g.;;..
#           0010: 0C F8 81 CD 0D B1 F5 F3   1D 47 4F 2F 20 AD 59 48  .........GO/ .YH
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.756 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.756 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.757 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.758 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.760 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.760 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.760 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.761 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.769 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.771 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.772 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.775 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.775 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.775 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.776 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.778 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.778 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.778 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.779 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.779 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.780 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.780 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.783 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 6A 95 BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:34.000 UTC",
#       "not  after"         : "2023-12-26 23:51:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 5A C5 01 AD 32 4E 0F   72 B4 44 53 45 D8 57 5C  .Z...2N.r.DSE.W\
#           0010: F9 E7 CE 5C                                        ...\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.783 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:02.830 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:02.831 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:02.831 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:02.831 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.868 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.873 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C 8D 24 98 7C 9D 5B B7   A9 99 61 C6 2D C1 C1 CC  L.$...[...a.-...
#     0010: 85 99 B5 65 00 33 C1 55   6A 1E 36 02 76 DB B7 1F  ...e.3.Uj.6.v...
#     0020: F7 1C 1A 1A DE AC E4 68   41 49 27 45 37 2E 8E 71  .......hAI'E7..q
#     0030: B9 09 82 FB BA 3A C8 5E   59 59 C7 CE 74 C0 FC 51  .....:.^YY..t..Q
#     0040: D3 65 7E 99 E8 E3 E8 21   CB 40 5E 50 97 99 CF 85  .e.....!.@^P....
#     0050: C4 A6 20 1D 7C 87 C8 B5   74 18 90 AB 3F 66 4F CB  .. .....t...?fO.
#     0060: 42 DF 22 40 E9 3A EF 48   51 27 F2 8B A3 24 1B A6  B."@.:.HQ'...$..
#     0070: CB FB 1C 26 5E 98 01 42   D0 0A DC 06 E2 27 BC 10  ...&^..B.....'..
#     0080: 2A D4 C3 C7 5F BB 8C 1A   83 97 AD FE 45 99 BB EE  *..._.......E...
#     0090: 76 07 2F FE D5 2E 79 BB   6B 7E A4 F2 E0 0D 85 90  v./...y.k.......
#     00A0: 13 A7 92 93 EA 59 FC B2   D2 07 CD A0 BF 78 47 A8  .....Y.......xG.
#     00B0: 3F 96 A9 6F B7 A1 50 72   E1 EC AC 60 4D 31 13 75  ?..o..Pr...`M1.u
#     00C0: 21 B8 22 1A 70 F6 36 19   E4 94 7C 30 45 CC E0 6C  !.".p.6....0E..l
#     00D0: 9C 4E 29 5A E9 A5 57 6F   8C 64 26 BC 15 21 66 5C  .N)Z..Wo.d&..!f\
#     00E0: 39 F2 10 12 04 BF 20 7B   B4 0C A2 5C FC 97 08 3D  9..... ....\...=
#     00F0: AE C3 5E E1 08 B1 D0 14   6B E1 C1 25 22 D0 52 72  ..^.....k..%".Rr
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.875 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 AC 5A 92 B9 AD A3 05   98 E0 EC 33 D3 3D 90 67  ..Z........3.=.g
#     0010: AE 32 E2 1A D7 0A 0A 65   EE DA B6 21 F1 05 73 54  .2.....e...!..sT
#     0020: C8 79 EB BC 30 19 DD 3F   FD 10 57 B3 C2 2F EF 15  .y..0..?..W../..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.878 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:02.879 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.879 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:02.880 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.880 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:02.880 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:02.881 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.881 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.884 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 1F 80 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:38.000 UTC",
#       "not  after"         : "2023-12-26 23:51:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 01 0E 50 B7 FA 88 04   6F E6 29 7A D4 0A D9 75  ...P....o.)z...u
#           0010: E9 D2 AD 6D                                        ...m
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 C6 E0 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:31.000 UTC",
#       "not  after"         : "2023-12-26 23:51:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#           0010: 18 0D BD DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.924 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 20 0F 7D D5 97 04 C4 4E   09 9E 92 94 BC C8 30 8D   ......N......0.
#     0010: 46 92 96 CA F2 06 15 93   76 73 11 A3 16 67 A8 54  F.......vs...g.T
#     0020: EE 4B DD D5 FC 4D 8A 1E   71 64 63 6D 2E 4B 30 82  .K...M..qdcm.K0.
#     0030: 95 88 59 FF A3 F7 19 07   1E 36 21 D5 30 71 13 6C  ..Y......6!.0q.l
#     0040: AF 44 3A AB 2F F6 21 75   F0 C7 BB CE 2D 24 A9 F0  .D:./.!u....-$..
#     0050: 15 3B B3 82 F9 11 D6 2B   6A 0D AA B0 F0 C2 0B AD  .;.....+j.......
#     0060: B0 23 A2 9D 84 4B CA E9   C8 EE 89 FF C4 A1 F1 DF  .#...K..........
#     0070: AC 23 EC 1F C2 0A CE F4   7B 85 32 08 0F CD 6F DE  .#........2...o.
#     0080: 82 FF 78 66 4A 83 BB 75   91 B4 AC 9C 6A D5 69 16  ..xfJ..u....j.i.
#     0090: D9 A2 1F 29 AD A0 46 B8   A7 D4 CC 22 0D 32 10 72  ...)..F....".2.r
#     00A0: 63 B3 5C F3 51 AA E4 15   C3 7E 69 36 F1 AE 10 F6  c.\.Q.....i6....
#     00B0: A1 CD 10 1D F3 BF 0F 68   21 0F 03 8C 95 A3 6E 05  .......h!.....n.
#     00C0: D1 78 49 B7 8E F2 28 1B   EC 1A F1 82 82 99 29 D0  .xI...(.......).
#     00D0: EB 89 A1 46 9B AA 52 BC   A7 2B 08 80 8A FF 2E 5F  ...F..R..+....._
#     00E0: A0 59 D0 38 86 09 D4 94   7D 1D E4 45 77 A1 1B 62  .Y.8.......Ew..b
#     00F0: 3C AC 7C 4E 23 BC 20 32   B4 B6 EC 44 B4 81 F8 8A  <..N#. 2...D....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.926 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 8E CB A9 94 7D 0F D5   34 7B 67 99 B4 52 18 FC  ".......4.g..R..
#     0010: A5 67 2A F8 EE C9 B8 D0   FF 85 31 C2 02 FA 64 CE  .g*.......1...d.
#     0020: D6 DE 67 67 83 8A 66 65   14 D8 52 26 77 2B AB 1F  ..gg..fe..R&w+..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.927 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:02.982 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DF 5B C1 E8 9A 17 21 6C F2 36 CE 26 F2 F3 42 E8 A0 1B DF 62 02 74 33 BD 27 F3 74 09 92 54 07 08",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 23:52:03.295 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 23:52:03.296 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 23:52:04.225; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 23:52:04.231; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 23:52:04.612; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 23:52:04.615; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 23:52:04.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KviqiV/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:04.647 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 1F 80 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:38.000 UTC",
#     "not  after"         : "2023-12-26 23:51:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 01 0E 50 B7 FA 88 04   6F E6 29 7A D4 0A D9 75  ...P....o.)z...u
#         0010: E9 D2 AD 6D                                        ...m
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:04.652 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 38 6C 96",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:29.000 UTC",
#     "not  after"         : "2023-12-26 23:51:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:04.666 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:04.825 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:04.826 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:04.826 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:04.826 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:04.918 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.918 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:04.920 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:04.920 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.926 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.937 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.938 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:04.940 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "62 2E 9C 79 91 09 9B 23 29 0D D3 08 2B CC 50 DE 2D 0B 46 07 E6 54 76 7E B9 5F 09 D6 93 CC 2F B0",
#   "session id"          : "A3 8F 55 81 9B 3F 1B FD 42 9A E5 4A B3 CD 84 D6 95 8A F6 4E 31 CD 35 26 5F 7B CB 76 B6 88 DD 37",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 03 CE 33 1E DF 5F F9 5F   81 3C A5 69 50 DE BE 0B  ..3.._._.<.iP...
#             0010: 6C C1 6C D9 30 5B 29 9C   78 13 5A 52 18 2B BD 76  l.l.0[).x.ZR.+.v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.050 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BC 65 B4 2C 15 45 D3 5D 11 A5 8B 01 FE D9 9C 78 AE ED 01 4B 92 72 EF 9B 22 FC 76 7C BB FD 61 2B",
#   "session id"          : "A3 8F 55 81 9B 3F 1B FD 42 9A E5 4A B3 CD 84 D6 95 8A F6 4E 31 CD 35 26 5F 7B CB 76 B6 88 DD 37",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DC 86 07 07 57 64 0F 95   37 4C AD 73 61 4B 40 6A  ....Wd..7L.saK@j
#           0010: 4E 61 99 D7 99 55 0A F4   DF BC 58 9E 7A 0E CC 1F  Na...U....X.z...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.050 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.051 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.052 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.053 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.054 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.063 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.064 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.065 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.069 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.069 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.070 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.072 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.072 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.072 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.073 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.074 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.074 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.076 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 6A 95 BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:34.000 UTC",
#       "not  after"         : "2023-12-26 23:51:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CC 5A C5 01 AD 32 4E 0F   72 B4 44 53 45 D8 57 5C  .Z...2N.r.DSE.W\
#           0010: F9 E7 CE 5C                                        ...\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.077 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.155 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 C6 E0 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 23:51:31.000 UTC",
#     "not  after"         : "2023-12-26 23:51:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#         0010: 18 0D BD DD                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#         0010: 4C F1 90 6E                                        L..n
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.159 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 5B 0E 5D 98 41 7B 57   25 ED 4A 8E 43 83 51 49  ([.].A.W%.J.C.QI
#     0010: 25 4E 50 C4 F9 85 AD 80   5B F3 C6 CF A0 B1 B0 E8  %NP.....[.......
#     0020: 15 DF F1 9E 29 8E 87 F4   7F BF 0E F3 6F 92 68 44  ....).......o.hD
#     0030: 2B 31 58 F3 83 BF 95 3C   01 D6 45 83 2B 05 F8 BC  +1X....<..E.+...
#     0040: 8C CB 1B 30 69 5D 14 01   6B 4F 1B BC 3C 3C 57 0D  ...0i]..kO..<<W.
#     0050: 59 63 18 A4 2B F4 26 A2   C5 CC F0 AA 52 53 C5 A7  Yc..+.&.....RS..
#     0060: B2 E3 17 27 C9 D8 7C 70   14 EC DD 04 13 14 28 27  ...'...p......('
#     0070: 9A 51 04 E4 C2 B3 E4 AC   07 FA 85 5D CB 57 04 09  .Q.........].W..
#     0080: B7 3B 0F 41 E8 98 98 E8   53 2F 7D C4 BE E7 DD E6  .;.A....S/......
#     0090: 74 10 12 26 A0 0D BC E8   D1 48 7B 9A CD 86 E9 94  t..&.....H......
#     00A0: DA 14 23 6D 4E 79 54 6F   EA F7 2F 4A DF F3 6F 98  ..#mNyTo../J..o.
#     00B0: 73 9C 65 10 02 BC 5F 0A   17 63 2F 68 17 9A 19 97  s.e..._..c/h....
#     00C0: 3F 7F 32 7F B6 CE 86 16   5B 99 44 D2 3B 8F 78 00  ?.2.....[.D.;.x.
#     00D0: 7C 55 6A A9 87 D6 E8 B4   10 DE FC 25 FA D5 1A 0B  .Uj........%....
#     00E0: 75 72 4C 4F 37 C7 F3 26   21 05 7E 27 E5 14 62 96  urLO7..&!..'..b.
#     00F0: 93 5D 77 D3 7A 25 39 4B   2E 48 A1 57 07 EB 29 7C  .]w.z%9K.H.W..).
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.161 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 9E 2C 2B 75 8F 83 87   C6 FF C1 9A 44 61 B5 26  6.,+u.......Da.&
#     0010: 72 6E 1D 13 BD 1F 57 ED   61 DF A1 A6 A3 3F A6 3E  rn....W.a....?.>
#     0020: C5 5D DA 48 7E F9 35 B7   DE 76 D9 FA 74 6D 04 C8  .].H..5..v..tm..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:05.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:05.164 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 23:52:05.165 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:05.165 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.165 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.168 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 1F 80 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:38.000 UTC",
#       "not  after"         : "2023-12-26 23:51:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 01 0E 50 B7 FA 88 04   6F E6 29 7A D4 0A D9 75  ...P....o.)z...u
#           0010: E9 D2 AD 6D                                        ...m
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 C6 E0 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:31.000 UTC",
#       "not  after"         : "2023-12-26 23:51:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#           0010: 18 0D BD DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.194 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4E AC 84 8F 7F 2A 5A 9C   FE 9F 30 F5 09 01 3D 5D  N....*Z...0...=]
#     0010: 53 B0 36 3D 4E FA 45 D1   4B 68 8B 52 89 13 91 FA  S.6=N.E.Kh.R....
#     0020: AC 75 73 04 D4 67 D0 BD   31 BC DE B1 D8 FE 8B C8  .us..g..1.......
#     0030: 95 39 C8 E6 B1 31 2B 52   D8 32 B2 16 A5 3D 60 E8  .9...1+R.2...=`.
#     0040: A8 CC 4B 0C AF 8F DD 1A   A6 DC CA E8 F5 E3 F6 36  ..K............6
#     0050: 70 DE 36 4B 73 C4 BD 4F   9D 09 F2 35 51 06 DD 5D  p.6Ks..O...5Q..]
#     0060: 00 33 75 A8 6B B1 0B B6   98 C5 F7 7A 3D 71 BF 93  .3u.k......z=q..
#     0070: 79 C4 EB 24 E4 A7 CE D6   77 0E BE 3D F3 47 CF D2  y..$....w..=.G..
#     0080: 9D E3 33 40 79 05 5A 86   99 0E 70 5E 6B 2F 1D F4  ..3@y.Z...p^k/..
#     0090: D3 D0 45 0F BA E1 7E 08   91 7D DB E8 73 6B AE D8  ..E.........sk..
#     00A0: 67 C3 3A 49 BE B3 A9 10   E5 74 D5 D2 62 5F 7D BF  g.:I.....t..b_..
#     00B0: 05 4D E3 EE 64 4E 50 9E   9C B7 2B 9A 49 CD 01 60  .M..dNP...+.I..`
#     00C0: F1 73 99 16 F1 2F 8C 5C   09 55 A6 C3 5B 3B 3F 50  .s.../.\.U..[;?P
#     00D0: B5 C0 F5 32 AD EF 10 2A   97 ED B0 A8 18 19 52 EA  ...2...*......R.
#     00E0: 4D DF AD 19 5F EB 72 65   6C 50 31 8A 33 F9 1C 0D  M..._.relP1.3...
#     00F0: 62 0A 42 F9 BB B5 5D 08   2A 6C 95 1B 7E 23 08 0E  b.B...].*l...#..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.195 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B 5C C2 CA 62 F2 73 AB   D6 7C 4A 37 EA AB 33 C6  .\..b.s...J7..3.
#     0010: 6D 31 50 0C 06 98 76 50   A5 FB E9 1D A4 B0 4B 7A  m1P...vP......Kz
#     0020: 11 7A 43 9A 51 4B E7 6F   2E 28 3B AA 3A 4F 40 3C  .zC.QK.o.(;.:O@<
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.196 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:05.243 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3D B7 F2 6B 63 68 42 90 64 B7 DF 21 A3 50 BE 7D 95 25 E7 54 51 EA 3E EA C7 08 26 9D 21 A6 90 C3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 23:52:05.542 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 23:52:05.543 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 23:52:16.992; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:17.327 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 38 6C 96",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:29.000 UTC",
#       "not  after"         : "2023-12-26 23:51:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#           0010: 18 0D BD DD                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 C6 E0 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 23:51:31.000 UTC",
#       "not  after"         : "2023-12-26 23:51:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 80 F7 13 44 46 00 BE 4C   7C B7 B2 71 5C C7 2C 17  ...DF..L...q\.,.
#           0010: 18 0D BD DD                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 09 C9 EA 8B AE C3 6B   83 1A 7A 9E 1C 0C BC 48  .......k..z....H
#           0010: 4C F1 90 6E                                        L..n
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 23:52:17.345 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:17.753 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:17.753 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:17.753 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:52:17.754 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:17.839 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:17.841 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 23:52:17.841 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.847 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.859 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.860 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.860 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 23:52:17.862 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C9 6D 73 90 5B BE 20 45 BB 1A 96 38 62 8C 39 6B D4 06 01 1C 13 91 73 55 86 F9 A5 5F F3 21 B8 83",
#     "session id"          : "C7 79 A6 A7 54 68 02 1E 7D 2A F7 78 5E 2A EB 99 2D 77 A2 D9 2D EA 4D A8 5F FC C2 D2 7C 44 05 BB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AC 8A 15 FB 33 9C 1B 90   CF CD 4C CD 32 70 58 B9  ....3.....L.2pX.
#               0010: 61 6C 97 8B 07 D3 EE 97   1B 08 F6 6B 55 CF D6 50  al.........kU..P
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.884 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EB A9 94 1D 94 F0 85 79 4D 47 AA 7B 2F 45 B9 F0 6E 7F 4B B1 44 D2 C6 85 44 C5 CA 43 CA B7 2A 36",
#     "session id"          : "C7 79 A6 A7 54 68 02 1E 7D 2A F7 78 5E 2A EB 99 2D 77 A2 D9 2D EA 4D A8 5F FC C2 D2 7C 44 05 BB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: EE 7D D3 01 78 F5 68 91   71 1C 47 E4 75 25 3A 06  ....x.h.q.G.u%:.
#             0010: E2 00 98 49 F7 E3 47 F1   12 81 5F 7B D0 99 EC 7D  ...I..G..._.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.885 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.885 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.887 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.889 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.889 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.889 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:17.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:52:17.891 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.891 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.891 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.898 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.899 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.901 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 23:52:17.904 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)":

[...truncated too long message...]

tPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 23:53:38.407 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:53:38.461 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:53:38.461 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:53:38.462 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 23:53:38.462 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34702/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28088ms
ok 65 stop command for single port in 31195ms
ok 66 status detects locally running solr in 14330ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2177ms
ok 69 copying files around in 6535ms
ok 70 upconfig in 2650ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1227ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1228ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.TestLeaderElectionZkExpiry.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.TestLeaderElectionZkExpiry.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=A558F185E96F6578 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 2s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m27s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5558 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5558/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39267/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 20:41:03.024; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 20:41:03.030; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 20:41:03.979; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 20:41:04.020; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22641ms
ok 61 start solr with client truststore and security manager in 25214ms
not ok 62 start solr with mTLS needed in 56660ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7imyYk/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39267.
#
# Started Solr server on port 39267 (pid=198371). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39268.
#
# Started Solr server on port 39268 (pid=198798). Happy searching!
#
# INFO  - 2023-09-27 20:42:26.911; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 20:42:26.917; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 20:42:27.301; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 20:42:27.305; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 20:42:27.305; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:27.339 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 AC 1A DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:42:03.000 UTC",
#     "not  after"         : "2023-12-26 20:42:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 53 50 3A E4 05 17 13 59   35 70 7D E5 F6 EC 33 D1  SP:....Y5p....3.
#         0010: AE B8 F3 EE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:27.344 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 31 B7 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:54.000 UTC",
#     "not  after"         : "2023-12-26 20:41:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:27.360 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:27.717 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:27.717 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:27.718 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:27.718 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:27.853 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.853 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:27.855 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:27.855 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.862 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.875 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.875 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.876 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:27.879 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 E5 09 11 C5 31 1D 72 45 C0 2E EA CC 2C 14 1A 71 07 7C 8F 2E EA 63 38 26 DC 43 9F F3 01 7B AD",
#   "session id"          : "12 06 7A B4 90 01 3D 68 8C EC F7 5C 58 A0 50 A5 E4 93 9D D3 28 A2 AD 00 6E D0 C4 63 49 CD 4C 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F4 A2 D8 BE E6 08 6D AE   F7 78 4A 1E A9 DF 56 38  ......m..xJ...V8
#             0010: 97 03 95 A4 C9 30 E4 F8   B3 3C 19 DA 7A 22 58 20  .....0...<..z"X
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.994 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 D4 DC FE 34 D9 05 D8 08 AD D3 F2 01 66 4D 8B 40 41 54 48 A2 71 5F 42 93 D2 E8 36 20 98 82 FD",
#   "session id"          : "12 06 7A B4 90 01 3D 68 8C EC F7 5C 58 A0 50 A5 E4 93 9D D3 28 A2 AD 00 6E D0 C4 63 49 CD 4C 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C3 EB 2C 1B C5 A4 FE A5   4B EE 15 9A 10 68 4D D8  ..,.....K....hM.
#           0010: B3 B2 D2 1B 5D ED 7A 7C   A9 DD 45 C5 E8 9E 63 15  ....].z...E...c.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.994 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.994 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.996 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.997 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.997 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.999 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.999 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.999 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:27.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.001 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.009 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.010 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.011 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.015 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.016 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.016 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.016 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.016 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.016 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.017 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.017 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.018 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.019 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.019 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.019 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.020 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.021 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.025 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 2E 2E 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:59.000 UTC",
#       "not  after"         : "2023-12-26 20:41:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B A2 96 AA 62 CD DD 85   FE 6A C0 98 F8 0A A8 7F  k...b....j......
#           0010: 9B A3 67 E5                                        ..g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.025 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.115 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.119 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5A 21 A5 1C A3 13 D6 85   6A AF F4 B7 25 B5 0E A8  Z!......j...%...
#     0010: F5 E7 33 25 45 81 1E 58   D6 81 A9 94 11 DE D5 4D  ..3%E..X.......M
#     0020: F4 5E E0 5A CD 6E 7D 70   AA 6E 3B 23 15 1E 00 DD  .^.Z.n.p.n;#....
#     0030: 1F B2 E2 16 77 98 16 B1   D2 D4 62 15 E3 05 77 8B  ....w.....b...w.
#     0040: 88 36 2E 24 0B D6 F1 AE   E8 49 1F FD 64 85 C9 95  .6.$.....I..d...
#     0050: 4F A4 15 64 D7 A5 A2 8E   A7 08 79 73 B2 C2 A1 2E  O..d......ys....
#     0060: 8C 9F 23 2C 10 FC 6E 98   FB 8B 9A A3 5F EB EB 97  ..#,..n....._...
#     0070: 79 28 5B F1 90 AC 1D A8   62 75 57 49 50 15 51 30  y([.....buWIP.Q0
#     0080: B6 05 60 7F 60 BC F1 29   D6 F4 B9 89 F8 06 C7 65  ..`.`..).......e
#     0090: 1F C3 5C D4 C7 C9 8E 12   BD F5 72 93 13 6D 07 BE  ..\.......r..m..
#     00A0: EB 9E 15 25 14 48 3E 93   18 33 92 26 FA 00 1D 13  ...%.H>..3.&....
#     00B0: 54 D8 AC 16 39 39 61 4B   B2 82 42 BE AC DD 1A A3  T...99aK..B.....
#     00C0: 83 18 45 84 61 8D CA B9   F6 03 7E A7 BA 1E 7B B5  ..E.a...........
#     00D0: A4 51 13 35 FA 3F 4E F1   01 D2 DF F2 B1 14 9B 42  .Q.5.?N........B
#     00E0: 87 53 27 74 90 F9 C8 9E   49 98 0B C6 42 7D 5D E1  .S't....I...B.].
#     00F0: C5 BE 33 06 1F 50 9C 70   33 54 62 A1 27 34 BB CF  ..3..P.p3Tb.'4..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.121 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 2A F0 E8 09 41 18 70   35 B1 93 29 E6 AC 05 1C  .*...A.p5..)....
#     0010: 5E 36 11 C1 C5 D8 DC 4D   FF F2 5D B6 97 83 3D 73  ^6.....M..]...=s
#     0020: 22 E0 65 05 BC 68 65 2E   2B B1 2F 8D 60 C5 22 F6  ".e..he.+./.`.".
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.123 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:28.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:28.124 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.124 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:28.125 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:28.125 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.126 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.130 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 AC 1A DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:42:03.000 UTC",
#       "not  after"         : "2023-12-26 20:42:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 53 50 3A E4 05 17 13 59   35 70 7D E5 F6 EC 33 D1  SP:....Y5p....3.
#           0010: AE B8 F3 EE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 98 3D EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:56.000 UTC",
#       "not  after"         : "2023-12-26 20:41:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#           0010: 13 27 21 C2                                        .'!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.157 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 FF 02 1B B9 B8 79 AC   88 16 56 DA 7F 32 55 CB  8.....y...V..2U.
#     0010: D5 9B F3 26 AE 22 FF 5F   E3 F4 55 40 16 BE E6 03  ...&."._..U@....
#     0020: 5E 2C 11 83 2F 1C 60 86   A3 66 72 44 42 F2 A7 71  ^,../.`..frDB..q
#     0030: F8 C6 FA 3F 50 62 EE 5A   5B FE 7C B1 CD A5 DB E6  ...?Pb.Z[.......
#     0040: A1 B2 F3 5B 03 1D 66 2C   81 3B 5B 02 88 B4 58 5C  ...[..f,.;[...X\
#     0050: A1 9F 51 EB 7C A3 CC 26   60 BE 56 00 3C EC 03 57  ..Q....&`.V.<..W
#     0060: 8C A9 7A C9 3C CA 14 C3   4C 72 93 68 3F 77 E1 5D  ..z.<...Lr.h?w.]
#     0070: 5C 46 71 BE 30 25 83 66   20 11 1F E3 7F 8B AB D7  \Fq.0%.f .......
#     0080: 21 4E 5A 81 98 48 7C 85   B2 C2 6A D2 78 D2 6C 9F  !NZ..H....j.x.l.
#     0090: E2 F7 29 29 AF ED 9A 73   04 B9 E0 DF CE 89 D0 E4  ..))...s........
#     00A0: 30 F5 22 B4 F2 DF 3E 5C   0D AA 8F 77 86 95 82 E1  0."...>\...w....
#     00B0: 61 8E 2D 8B 03 A6 CD E5   AE A9 2B 2E 58 4F 09 A3  a.-.......+.XO..
#     00C0: 34 F7 32 FA 9E D2 3C 89   2D E5 62 32 DC 8D 35 2A  4.2...<.-.b2..5*
#     00D0: EC 8E 4B 9E D8 A8 38 8C   DB B6 EF DB CE E7 F7 C2  ..K...8.........
#     00E0: 98 16 DE 56 36 C9 58 DF   D5 88 86 FC AB 9F 27 46  ...V6.X.......'F
#     00F0: 9C 60 DC CA FD FC 42 D6   2B 15 5B 71 E4 D5 39 D7  .`....B.+.[q..9.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.158 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5F 67 52 DF 1D 49 7B 93   BB CA DD DD DB 8D 16 45  _gR..I.........E
#     0010: C4 90 90 E0 B7 EC B5 EA   EC AB 75 DD C9 58 EC 09  ..........u..X..
#     0020: 10 10 86 B7 DA 82 7D 37   4E 73 66 70 07 04 E2 15  .......7Nsfp....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.159 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:28.217 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "44 96 AC 8D 43 B3 B0 77 68 1C 45 EB 3F D9 73 C4 F5 88 4E 92 16 38 6D 90 CC 1E 24 4C 55 2F 26 25",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 20:42:28.494 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 20:42:28.495 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 20:42:29.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 20:42:29.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 20:42:29.847; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 20:42:29.850; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 20:42:29.851; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7imyYk/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:29.883 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 AC 1A DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:42:03.000 UTC",
#     "not  after"         : "2023-12-26 20:42:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 53 50 3A E4 05 17 13 59   35 70 7D E5 F6 EC 33 D1  SP:....Y5p....3.
#         0010: AE B8 F3 EE                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:29.888 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 31 B7 75",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:54.000 UTC",
#     "not  after"         : "2023-12-26 20:41:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:29.903 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:30.256 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:30.256 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:30.257 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:30.257 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:30.389 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:30.391 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:30.391 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.398 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.410 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.410 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:30.413 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BC 52 64 C8 11 87 14 83 F4 7B 17 52 B6 5C 25 28 61 1C 88 83 54 68 4B CD E4 D8 4F 09 61 A4 49 3A",
#   "session id"          : "25 3E 71 1C 50 5B 97 28 39 87 40 60 5B 16 18 80 1C 10 0D E6 94 03 24 B7 73 A9 3E FF 61 22 54 B1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9D F6 99 34 D1 FF 51 07   99 40 8D DA EE 28 CA 8D  ...4..Q..@...(..
#             0010: 94 5D AA DF 4E 8F D4 2E   89 4E D0 FB D8 30 65 70  .]..N....N...0ep
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.521 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "48 C2 24 35 BF 6E B5 32 1D 42 BF 05 08 E4 3C 2C 6D 5E 77 1F 48 CE A7 90 12 3E 22 8E B8 F5 F1 62",
#   "session id"          : "25 3E 71 1C 50 5B 97 28 39 87 40 60 5B 16 18 80 1C 10 0D E6 94 03 24 B7 73 A9 3E FF 61 22 54 B1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 42 56 19 13 AA EB 49 3E   5B 82 84 53 DD B6 8A B5  BV....I>[..S....
#           0010: 5F D7 D8 D3 14 D6 5D A6   56 46 BF B9 E2 D6 D7 79  _.....].VF.....y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.522 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.524 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.524 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.524 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.526 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.526 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.527 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.528 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.528 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.535 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.537 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.538 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.541 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.542 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.543 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.544 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.545 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.545 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.545 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.546 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.547 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.547 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.550 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 2E 2E 42",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:59.000 UTC",
#       "not  after"         : "2023-12-26 20:41:59.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B A2 96 AA 62 CD DD 85   FE 6A C0 98 F8 0A A8 7F  k...b....j......
#           0010: 9B A3 67 E5                                        ..g.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.550 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.643 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 98 3D EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 20:41:56.000 UTC",
#     "not  after"         : "2023-12-26 20:41:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#         0010: 13 27 21 C2                                        .'!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#         0010: C8 67 8C 41                                        .g.A
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.647 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 DA DE F8 E9 00 5E 1A   A7 19 CE DE 7F FD FC B3  Q.....^.........
#     0010: 4A 67 3F 8F 08 A2 52 3B   58 75 63 D3 16 12 AE 1A  Jg?...R;Xuc.....
#     0020: C9 37 F1 60 98 EE 65 F0   82 31 F2 C7 25 D6 0F 35  .7.`..e..1..%..5
#     0030: 38 3C F0 EE 3E 35 C1 60   2F 53 DA E9 FB 60 0A 0C  8<..>5.`/S...`..
#     0040: EF CE BD 2A 61 98 3E B9   53 7C 28 DD C1 ED 66 77  ...*a.>.S.(...fw
#     0050: 57 9B 89 26 9E 02 1E 1E   80 0F 73 EC A8 7C 0C 80  W..&......s.....
#     0060: CC EE C7 58 0C 6A FF 60   A9 7C 5C 28 26 DE 69 86  ...X.j.`..\(&.i.
#     0070: 1B F8 16 8A 5D 65 33 FD   1E 22 84 0A 25 DE AA 5B  ....]e3.."..%..[
#     0080: E2 05 F8 B1 3E 9F 06 5E   2B C2 57 1A 61 26 05 A8  ....>..^+.W.a&..
#     0090: FC D0 14 4D 1A BD 33 33   67 BE A4 78 0D 5B A2 36  ...M..33g..x.[.6
#     00A0: 13 1D B4 BB 8C 9F 92 EE   05 45 A7 FA C3 ED D1 7C  .........E......
#     00B0: 16 28 96 33 44 55 C6 64   66 41 69 3B 87 15 F7 4C  .(.3DU.dfAi;...L
#     00C0: 66 85 88 C2 9E 6B F4 7D   79 24 42 2B FA E5 60 99  f....k..y$B+..`.
#     00D0: 6D 94 38 0E EC DB 58 14   03 86 2C 13 79 0C BA D2  m.8...X...,.y...
#     00E0: 06 D5 89 D9 DC 61 4A 59   51 CD F4 BA 1C 24 47 3E  .....aJYQ....$G>
#     00F0: 42 D3 58 6D C2 27 7D A3   30 09 8F B6 29 98 96 67  B.Xm.'..0...)..g
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.649 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BC F9 58 87 EE 11 98 7A   88 87 01 2C 24 F7 6F F5  ..X....z...,$.o.
#     0010: 96 B0 9B 2C F7 EF 3F C1   D9 A6 33 CE 5E A4 F7 8D  ...,..?...3.^...
#     0020: 4D 0B AE 38 47 70 1F E7   F1 E9 E4 34 EE 36 F1 AB  M..8Gp.....4.6..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.651 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:30.653 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.653 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:30.653 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.653 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 20:42:30.654 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:30.654 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.654 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.658 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 AC 1A DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:42:03.000 UTC",
#       "not  after"         : "2023-12-26 20:42:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 53 50 3A E4 05 17 13 59   35 70 7D E5 F6 EC 33 D1  SP:....Y5p....3.
#           0010: AE B8 F3 EE                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 98 3D EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:56.000 UTC",
#       "not  after"         : "2023-12-26 20:41:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#           0010: 13 27 21 C2                                        .'!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.684 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 22 7E 24 96 6C DD BC   6C D8 CE 96 F8 A5 19 15  .".$.l..l.......
#     0010: 9A 0B 3F FE 82 EA 9D C1   8E 83 25 54 C0 D6 5D 6E  ..?.......%T..]n
#     0020: F1 64 2F 86 14 F1 55 F1   ED A4 2A D2 11 89 14 E9  .d/...U...*.....
#     0030: A0 52 D8 B2 90 2A FA 5B   B5 82 00 E2 2C 44 49 A7  .R...*.[....,DI.
#     0040: 03 38 23 98 8C BB 86 46   E2 55 BB 02 91 14 E5 6C  .8#....F.U.....l
#     0050: CE B3 2E E5 35 27 2F 95   A9 8E B2 A5 C5 B6 4A 0D  ....5'/.......J.
#     0060: 41 6D 3F 4D B7 8D 21 B2   B2 0F 97 D7 FF 33 29 AA  Am?M..!......3).
#     0070: 2C 78 4A DB E1 FC 2B 35   46 AC 1A 7B C7 F3 9B 95  ,xJ...+5F.......
#     0080: 28 8E 72 5D 9C FE CB 8A   39 B9 D9 46 E1 CB E5 28  (.r]....9..F...(
#     0090: D4 00 A0 8A 41 A8 70 57   91 F5 8F 0E 42 1E BB 66  ....A.pW....B..f
#     00A0: 6A C0 CA F7 C2 2C 64 20   56 55 77 F3 69 97 A2 37  j....,d VUw.i..7
#     00B0: A5 52 11 57 86 1A 8A A5   25 E8 B4 B7 69 7A 98 FB  .R.W....%...iz..
#     00C0: BD D3 D1 6C C6 83 BD C9   C6 8D 52 94 D3 54 45 B3  ...l......R..TE.
#     00D0: D9 F1 B7 3B F4 D7 4F 0C   80 EE 01 BD FF D1 6B 6D  ...;..O.......km
#     00E0: BF 0C 14 26 FC 12 18 C8   8D FC D3 96 50 6B 4F 49  ...&........PkOI
#     00F0: 22 E5 2B 02 3C 36 45 51   8C D8 2A E9 DB 7A C6 45  ".+.<6EQ..*..z.E
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.686 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 B9 5A CF DD AE 63 D6   3E 44 21 5C DF 18 69 41  @.Z...c.>D!\..iA
#     0010: 44 C8 9B E9 D3 1F 1E A1   F4 03 C0 64 AE FF A9 D1  D..........d....
#     0020: 29 35 C8 C5 46 59 83 DC   D6 E1 82 40 58 69 8E 61  )5..FY.....@Xi.a
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.687 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:30.756 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AC AB 84 E8 E9 B4 F2 3B F3 05 02 30 66 75 81 70 B9 2A 94 33 2E 6A 00 2B CA 16 14 1D 22 44 2E 3D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 20:42:31.025 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 20:42:31.026 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 20:42:41.563; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:41.896 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 98 3D EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:56.000 UTC",
#       "not  after"         : "2023-12-26 20:41:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#           0010: 13 27 21 C2                                        .'!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1F D0 6C 93 0C 54 FE 37   EC B0 40 96 3D 72 20 A0  ..l..T.7..@.=r .
#           0010: C8 67 8C 41                                        .g.A
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 31 B7 75",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 20:41:54.000 UTC",
#       "not  after"         : "2023-12-26 20:41:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 97 73 88 6D DA E1 E0   05 D8 4C 2E B9 4D F9 A5  g.s.m.....L..M..
#           0010: 13 27 21 C2                                        .'!.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 20:42:41.913 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:42.349 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:42.350 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:42.350 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:42:42.350 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:42.436 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.437 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:42.439 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 20:42:42.439 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.446 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.459 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.459 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.460 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 20:42:42.462 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "88 77 D6 F6 29 36 4D CD 97 28 64 63 52 C0 9C F0 A7 D5 12 77 31 1A 2D 0E 42 3C 82 CE CC 12 A1 E3",
#     "session id"          : "00 D5 9A BF 3E C4 66 9F 2E B8 93 D7 64 D9 C8 69 DD A1 75 1A 27 FE AA 58 83 5B 76 51 FB 35 89 92",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A0 DB 2A 96 11 D8 2F 03   5A ED 9B 77 E4 FD A6 A4  ..*.../.Z..w....
#               0010: EB 9E 39 A3 46 FC 45 3D   15 18 BE 8B 65 7A 48 19  ..9.F.E=....ezH.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.483 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "A1 7C 0E 71 D8 69 54 54 F8 27 2C 97 34 1E C9 1D 86 C6 C1 7A 83 3D 4B F4 AC 18 83 03 57 EF 54 F2",
#     "session id"          : "00 D5 9A BF 3E C4 66 9F 2E B8 93 D7 64 D9 C8 69 DD A1 75 1A 27 FE AA 58 83 5B 76 51 FB 35 89 92",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 37 B3 53 E5 79 B5 97   61 2F 08 9B C7 A6 83 53  h7.S.y..a/.....S
#             0010: F9 FD 5C 49 B7 4B 8E AA   43 99 2E CA 40 DA 06 44  ..\I.K..C...@..D
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.483 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.483 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.485 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.487 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.487 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.488 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.496 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.498 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.499 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.503 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.504 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:42.504 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:42:42.504 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 20:42:42.505 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, r

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 20:44:01.209 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:44:01.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:44:01.261 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:44:01.261 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 20:44:01.261 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39268/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28035ms
ok 65 stop command for single port in 30978ms
ok 66 status detects locally running solr in 14328ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2170ms
ok 69 copying files around in 6567ms
ok 70 upconfig in 2652ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 47s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m13.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5557 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5557/

All tests passed

Build Log:
[...truncated 1232 lines...]
#   ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/6-1
# WARN  - 2023-09-27 17:34:11.758; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>

> Task :solr:core:renderSiteJavadoc
> Task :solr:modules:jaegertracer-configurator:renderSiteJavadoc
> Task :solr:modules:opentelemetry:renderSiteJavadoc
> Task :solr:modules:clustering:renderSiteJavadoc
> Task :solr:modules:analysis-extras:renderSiteJavadoc
> Task :solr:modules:scripting:renderSiteJavadoc
> Task :solr:modules:s3-repository:renderSiteJavadoc
> Task :solr:modules:gcs-repository:renderSiteJavadoc
> Task :solr:modules:jwt-auth:renderSiteJavadoc
> Task :solr:modules:langid:renderSiteJavadoc
> Task :solr:modules:hadoop-auth:renderSiteJavadoc
> Task :solr:modules:sql:renderSiteJavadoc
> Task :solr:modules:extraction:renderSiteJavadoc
> Task :solr:modules:hdfs:renderSiteJavadoc
> Task :solr:modules:ltr:renderSiteJavadoc
> Task :solr:modules:analytics:renderSiteJavadoc
> Task :solr:test-framework:renderSiteJavadoc

> Task :solr:packaging:integrationTests
ok 7 reject d option with invalid config dir in 16631ms

> Task :solr:benchmark:renderSiteJavadoc
> Task :solr:documentation:documentation

> Task :solr:packaging:integrationTests
not ok 8 accept d option with builtin config in 18035ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 53)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/8-3
# WARN  - 2023-09-27 17:34:46.473; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>

> Task :solr:documentation:checkBrokenLinks

> Task :solr:packaging:integrationTests
not ok 9 accept d option with explicit path to config in 18059ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 63)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #4 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/9-4
# WARN  - 2023-09-27 17:35:04.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
not ok 10 accept n option as config name in 18410ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_create_collection.bats, line 68)
#   `assert_output --partial "Created collection 'COLL_NAME'"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   Created collection 'COLL_NAME'
# output (6 lines):
#
#   ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #5 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/10-5
# WARN  - 2023-09-27 17:35:22.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>

> Task :solr:documentation:check

> Task :solr:packaging:integrationTests
not ok 11 allow config reuse when n option specifies same config in 17961ms
# (in test file test/test_create_collection.bats, line 73)
#   `run -0 solr create_collection -c COLL_NAME_1 -n shared_config' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #6 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/11-6
# WARN  - 2023-09-27 17:35:40.981; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
not ok 12 create multisharded collections when s provided in 18293ms
# (in test file test/test_create_collection.bats, line 83)
#   `run -0 solr create_collection -c COLL_NAME -s 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #7 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/12-7
# WARN  - 2023-09-27 17:35:59.296; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/octet-stream, application/vnd.apache.solr.javabin] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
not ok 13 create replicated collections when rf provided in 18324ms
# (in test file test/test_create_collection.bats, line 89)
#   `run -0 solr create_collection -c COLL_NAME -rf 2' failed, expected exit code 0, got 1
# Please find the SOLR_HOME snapshot for failed test #8 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/13-8
# WARN  - 2023-09-27 17:36:17.646; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
#
# ERROR: java.util.concurrent.TimeoutException: Could not connect to ZooKeeper localhost:34797 within 15000 ms
#
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 33797 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Error from server at http://localhost:33797/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 14 can delete collections in 9626ms
ok 15 collection delete also deletes zk config in 7966ms
ok 16 deletes accompanying zk config with nondefault name in 8201ms
ok 17 deleteConfig option can opt to leave config in zk in 8291ms
ok 18 SOLR-16755 test works with noprompt in 37866ms
ok 19 Check export command in 29001ms
ok 20 export fails on non cloud mode in 17074ms
ok 21 using curl to extract a single pdf file in 24121ms
ok 22 using the bin/solr post tool to extract content from pdf in 24581ms
ok 23 using the bin/solr post tool to crawl web site in 27130ms
ok 24 healthcheck on cloud solr in 36041ms
ok 25 start help flag prints help in 150ms
ok 26 stop help flag prints help in 144ms
ok 27 restart help flag prints help in 149ms
ok 28 status help flag prints help in 47ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 143ms
ok 30 create help flag prints help in 143ms
ok 31 createcore help flag prints help in 145ms
ok 32 createcollection help flag prints help in 145ms
ok 33 delete help flag prints help in 143ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 147ms
ok 36 auth help flag prints help in 145ms
ok 37 assert help flag prints help in 985ms
ok 38 post help flag prints help in 980ms
ok 39 SQL Module in 23801ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26043ms
ok 41 icu collation in analysis-extras module in 19208ms
ok 42 package detects no running solr in 232ms
ok 43 lifecycle of package in 16372ms
ok 44 deploying and undeploying a collection level package in 20412ms
ok 45 Affinity placement plugin using sysprop in 23758ms
ok 46 Random placement plugin using ENV in 22576ms
ok 47 Check help command in 2864ms
ok 48 basic post with a type specified in 5949ms
ok 49 basic post WITHOUT a type specified in 12932ms
ok 50 crawling a directory in 4611ms
ok 51 crawling a web site in 5292ms
ok 52 commit and optimize and delete in 4003ms
ok 53 args mode in 6587ms
ok 54 stdin mode in 3448ms
ok 55 post solr log into solr via script in 9529ms
ok 56 post solr log into solr via cli in 7535ms
ok 57 allowPaths - backup in 23183ms
ok 58 start solr with ssl in 25100ms
not ok 59 use different hostname when not checking peer-name in 26865ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33797.
#
# Started Solr server on port 33797 (pid=196291). Happy searching!
#
# INFO  - 2023-09-27 17:48:52.981; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 17:48:52.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 17:48:53.340; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@758705fa(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-27 17:48:53.410; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-27 17:48:53.411; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@2a640157[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-09-27 17:49:02.579; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-09-27 17:49:02.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-09-27 17:49:02.968; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33797/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 17:49:04.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 17:49:04.481; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 17:49:05.387; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 17:49:05.426; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22596ms
ok 61 start solr with client truststore and security manager in 24921ms
not ok 62 start solr with mTLS needed in 61527ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-VTfCc6/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33797.
#
# Started Solr server on port 33797 (pid=201172). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33798.
#
# Started Solr server on port 33798 (pid=201599). Happy searching!
#
# INFO  - 2023-09-27 17:50:28.248; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 17:50:28.253; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 17:50:28.644; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 17:50:28.648; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 17:50:28.648; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.684 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 48 A8 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:50:04.000 UTC",
#     "not  after"         : "2023-12-26 17:50:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 E7 E5 B6 08 59 7C 00   9B DA A1 25 89 0A 93 78  .....Y.....%...x
#         0010: 6B 08 B4 53                                        k..S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.689 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 1B 8E CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:56.000 UTC",
#     "not  after"         : "2023-12-26 17:49:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:28.706 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.042 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:29.043 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.192 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.193 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.195 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:29.195 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.213 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:29.216 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "13 7E 15 02 4A 21 4C 4F 55 B7 D9 36 69 12 EC BD E5 F0 B4 B8 F1 31 B9 44 B9 E5 20 5B CB 92 F1 9D",
#   "session id"          : "BF FE 13 80 36 BC 27 1F 02 10 42 AE E1 6E 62 F0 22 80 07 0B 34 CE 3F D2 41 CA D3 AD 9F F4 A2 47",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B8 75 86 27 DC 60 0F 85   B6 CB 4D 79 F7 DD E5 9B  .u.'.`....My....
#             0010: 90 74 54 11 AD 8E 35 0F   AA 6F 8C C1 89 E0 F5 5E  .tT...5..o.....^
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.333 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DF DA 23 B7 C0 E2 10 37 5E 58 1E C8 B1 4C B9 4A B0 21 01 8A 82 62 C5 D1 93 D5 EF 83 A2 F8 59 B2",
#   "session id"          : "BF FE 13 80 36 BC 27 1F 02 10 42 AE E1 6E 62 F0 22 80 07 0B 34 CE 3F D2 41 CA D3 AD 9F F4 A2 47",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 AB 9A E9 A5 E8 FA 5C   D7 A7 12 69 7E 2E EF 7B  h......\...i....
#           0010: 16 B6 93 29 A4 E7 76 E1   EC 17 E0 CB 64 04 A8 23  ...)..v.....d..#
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.333 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.334 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.335 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.336 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.338 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.339 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.340 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.348 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.350 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.351 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.356 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.357 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.358 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.359 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.359 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.360 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.361 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.362 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.362 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.365 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 36 5F 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:50:00.000 UTC",
#       "not  after"         : "2023-12-26 17:50:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 74 71 93 76 A6 1B CB   D1 6F 0A 49 3E 28 66 E1  #tq.v....o.I>(f.
#           0010: 0D DA EA 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.458 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 2B 98 C0 CD CD C2 70   FC DC B2 4D 05 74 EE 8B  .+.....p...M.t..
#     0010: 6E DF 97 36 FE D3 11 CC   76 9A 3F 7D 76 A1 50 AA  n..6....v.?.v.P.
#     0020: A5 C9 F4 EF 3F 93 FF AB   3E 13 0A 9A F4 7C D9 A7  ....?...>.......
#     0030: E5 13 32 25 07 68 70 A9   D2 82 13 B1 E0 56 22 81  ..2%.hp......V".
#     0040: 5E 62 08 78 B4 E2 37 68   CE 11 7E 89 07 75 73 FF  ^b.x..7h.....us.
#     0050: 52 3C DB 32 EB 0F 12 FE   D3 FC E5 15 B0 85 81 BD  R<.2............
#     0060: B4 F4 3D E2 2D 17 13 F5   57 59 74 46 00 3D 50 C1  ..=.-...WYtF.=P.
#     0070: 5F 59 C7 46 A0 DD CE CB   D1 BB F3 48 BA 39 86 2F  _Y.F.......H.9./
#     0080: 55 F0 38 41 C9 15 71 4A   36 F2 16 9B D7 FD 12 4D  U.8A..qJ6......M
#     0090: ED C3 CA E9 83 3C EE 5B   E5 55 D3 1F 29 1B 6A 5D  .....<.[.U..).j]
#     00A0: 5E 15 27 CF 13 8B 20 B8   AF 73 BA 4A C5 D9 71 E7  ^.'... ..s.J..q.
#     00B0: 12 FA 93 5A 8D A4 ED 99   E8 4B CE AB 8A 6D A9 C4  ...Z.....K...m..
#     00C0: 98 63 B8 2A EA 03 79 53   AF F8 C8 91 E8 9C 8B 45  .c.*..yS.......E
#     00D0: E7 62 F6 16 E0 C8 71 C8   40 7E AE 9B 73 3D 39 0B  .b....q.@...s=9.
#     00E0: BA 66 42 65 12 2A 96 CE   51 7D 27 78 12 7D 18 C7  .fBe.*..Q.'x....
#     00F0: E5 7E 59 9A BA B8 54 0B   30 5D 5E 65 6F 56 4B 6A  ..Y...T.0]^eoVKj
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.459 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 0B 78 9A D7 75 FF 37   F3 31 38 AF 2E E3 4A 34  ..x..u.7.18...J4
#     0010: FB 81 1C B2 F1 52 D2 4C   7A 1F D9 6A 1A 59 C4 FB  .....R.Lz..j.Y..
#     0020: 34 81 25 59 99 89 BB 89   EB CF 13 27 C0 69 72 14  4.%Y.......'.ir.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:29.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:29.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.465 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.468 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 48 A8 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:50:04.000 UTC",
#       "not  after"         : "2023-12-26 17:50:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 E7 E5 B6 08 59 7C 00   9B DA A1 25 89 0A 93 78  .....Y.....%...x
#           0010: 6B 08 B4 53                                        k..S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 6E 57 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:49:58.000 UTC",
#       "not  after"         : "2023-12-26 17:49:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#           0010: 65 29 FE A3                                        e)..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.495 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 9D 9E 4A 9B EB D3 19   28 43 16 8D DB 7F 4A C5  ...J....(C....J.
#     0010: 76 41 A7 CB FA 4D 71 CA   1D D7 F0 39 06 95 C8 A6  vA...Mq....9....
#     0020: E2 29 06 11 97 F6 C6 B9   DB E8 AB C2 54 14 BF B4  .)..........T...
#     0030: 47 2F A3 C3 A7 C5 77 B3   26 04 C7 AA E2 4C 16 64  G/....w.&....L.d
#     0040: 0D 19 EC 4D 72 2E 7D 5B   93 3F 07 71 30 E8 AF DB  ...Mr..[.?.q0...
#     0050: A6 0A 03 2E 7D 29 EF B5   0E 98 BF 08 CE 66 9B 57  .....).......f.W
#     0060: AC 3A A0 09 21 E7 64 F6   05 1F 61 FD 69 72 1B 6E  .:..!.d...a.ir.n
#     0070: C9 C2 CD 26 26 D2 36 F4   8B 76 84 9C 00 68 CA C7  ...&&.6..v...h..
#     0080: 35 B3 F6 14 91 5F 6B F2   D8 47 3D C4 06 E5 D8 64  5...._k..G=....d
#     0090: 9E 88 BF 96 D3 34 9D 5B   95 61 5D 52 BE 20 AA 70  .....4.[.a]R. .p
#     00A0: AF 23 23 AD 01 16 95 34   FA B6 4C 8D 28 E9 B7 EF  .##....4..L.(...
#     00B0: C6 3D 8E 76 9B 2A CF D8   53 E9 34 FC 34 76 8E F1  .=.v.*..S.4.4v..
#     00C0: BF 2A 18 65 71 73 2D A6   C9 57 C2 87 06 00 CD 69  .*.eqs-..W.....i
#     00D0: D7 53 5A 57 3D 66 4B 8E   95 20 ED 34 9C 2C C6 20  .SZW=fK.. .4.,.
#     00E0: 3D 10 E1 45 3A 87 8A 2F   D2 A0 2F E2 BB C3 86 53  =..E:../../....S
#     00F0: 79 D8 C3 BD 59 1F 48 ED   3A CE DA B1 BD 50 06 2F  y...Y.H.:....P./
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.497 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D2 A9 A7 68 27 67 E6 23   07 9A 71 B4 F3 B1 1A 04  ...h'g.#..q.....
#     0010: B0 0D 48 EC 6B E5 42 34   57 92 1B F0 B1 4C 85 A4  ..H.k.B4W....L..
#     0020: 91 FD 4B F9 CD F5 40 8E   41 FE 6A 46 38 AA FC 85  ..K...@.A.jF8...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.498 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:29.549 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "89 DA 83 76 EE 36 CC 12 E8 A7 CE 07 8D 16 44 52 FF 99 94 8A 00 99 02 74 AF 5D 10 E4 77 55 40 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 17:50:29.871 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 17:50:29.872 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 17:50:30.812; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 17:50:30.818; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 17:50:31.240; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 17:50:31.243; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 17:50:31.244; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-VTfCc6/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.278 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 48 A8 80",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:50:04.000 UTC",
#     "not  after"         : "2023-12-26 17:50:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 E7 E5 B6 08 59 7C 00   9B DA A1 25 89 0A 93 78  .....Y.....%...x
#         0010: 6B 08 B4 53                                        k..S
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.283 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 1B 8E CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:56.000 UTC",
#     "not  after"         : "2023-12-26 17:49:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:31.298 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.657 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.657 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.658 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:50:31.658 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.791 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.792 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.794 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 17:50:31.795 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.801 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.814 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.814 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 17:50:31.818 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D9 AC 8E F7 47 6D 6E 8A 2A 07 DA 95 D2 9F 10 27 C4 F6 38 67 60 4B 32 D1 13 1D D1 77 2C A8 E5 CE",
#   "session id"          : "7F 8B 1D F1 6C 6B 95 A9 C7 3C A0 05 6C 36 EF E9 57 DB DE A2 03 00 2D 49 F6 58 BB 0D 65 A1 D9 9C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8F 2C C0 40 BC 74 2B CC   E3 7E BC 79 B8 65 D6 55  .,.@.t+....y.e.U
#             0010: EE CF 4A 1A 07 05 AE 5F   08 A3 1A C6 C2 DF 33 2A  ..J...._......3*
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.934 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 54 93 A6 59 57 54 35 E3 F3 7E 3C F7 BB CD C9 BB D9 13 05 7D 91 5B 1C 52 8E FF E1 3D D4 FE 97",
#   "session id"          : "7F 8B 1D F1 6C 6B 95 A9 C7 3C A0 05 6C 36 EF E9 57 DB DE A2 03 00 2D 49 F6 58 BB 0D 65 A1 D9 9C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 90 89 A7 C5 48 7B 4E CF   CA 0F D6 61 2E C7 F9 11  ....H.N....a....
#           0010: 54 DC D6 37 18 98 1B E2   E3 B5 39 1F BA 54 BC 7C  T..7......9..T..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.935 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.935 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.937 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.939 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.949 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.951 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.952 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.956 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.957 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.959 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.959 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.960 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.960 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.961 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.962 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:31.962 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.966 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 36 5F 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:50:00.000 UTC",
#       "not  after"         : "2023-12-26 17:50:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 74 71 93 76 A6 1B CB   D1 6F 0A 49 3E 28 66 E1  #tq.v....o.I>(f.
#           0010: 0D DA EA 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:31.966 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.049 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 6E 57 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 17:49:58.000 UTC",
#     "not  after"         : "2023-12-26 17:49:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#         0010: 65 29 FE A3                                        e)..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#         0010: C0 41 B0 38                                        .A.8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.053 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 67 10 7B 5B C0 30 36 BB   C2 98 D0 9A D2 8D 07 12  g..[.06.........
#     0010: 0E 3D 5A D8 01 FB 18 AB   08 43 8F D3 7E 10 8C 52  .=Z......C.....R
#     0020: 68 D4 2D C3 35 1D C9 7B   34 1B 5E AC 0B 41 4B 1E  h.-.5...4.^..AK.
#     0030: B1 4F 3A 3F 52 E6 26 D2   1B 18 E2 8C D3 A2 33 D1  .O:?R.&.......3.
#     0040: F5 E6 AA AF 71 49 85 83   5C 70 FB EF 28 06 F3 F5  ....qI..\p..(...
#     0050: 50 DA E5 34 3A AB 8C 55   3D 49 F1 53 F5 1C 1A E2  P..4:..U=I.S....
#     0060: 75 21 20 97 CF BB 59 2A   BB EA 0A 35 4E D0 7E 6A  u! ...Y*...5N..j
#     0070: 38 EB 3B AA C4 D6 C2 F8   09 E5 24 6F EE 51 B0 68  8.;.......$o.Q.h
#     0080: BF A9 BA 7B 22 7F B9 E0   EC 82 2F 2C 9A A0 28 1B  ...."...../,..(.
#     0090: DF 02 D6 15 F4 6C D2 93   63 B8 8B C5 FB A4 16 E3  .....l..c.......
#     00A0: DA 54 CD DE FE 2F AD 6F   BD 65 B5 6F D8 D3 A7 E1  .T.../.o.e.o....
#     00B0: B6 CA 71 17 EC 8D 93 19   A9 76 1A D6 99 C4 4B AC  ..q......v....K.
#     00C0: 43 5A 6E C2 47 4B 8D 33   F3 09 EC AA A5 20 14 48  CZn.GK.3..... .H
#     00D0: B1 40 8D 83 4F 07 8B 97   37 2C 0E 45 5B AB E7 B6  .@..O...7,.E[...
#     00E0: AE C4 EC 2D 5C 6B 1E 81   CF C7 A5 10 20 ED 00 02  ...-\k...... ...
#     00F0: 0F BC 8C A2 37 CE 9E CE   70 75 22 7E 4A 07 AB 65  ....7...pu".J..e
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.055 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 C8 5D 11 31 2C E9 85   66 F5 08 55 E3 79 C5 E7  ..].1,..f..U.y..
#     0010: 5F 89 AB 6E E8 E2 D6 06   75 8A E2 73 11 3E EB B0  _..n....u..s.>..
#     0020: B1 EC D1 64 19 2A C7 E8   33 76 FD 62 A4 10 0F 6C  ...d.*..3v.b...l
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.057 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.058 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.058 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:50:32.059 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.060 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.062 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 48 A8 80",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:50:04.000 UTC",
#       "not  after"         : "2023-12-26 17:50:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 E7 E5 B6 08 59 7C 00   9B DA A1 25 89 0A 93 78  .....Y.....%...x
#           0010: 6B 08 B4 53                                        k..S
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 6E 57 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 17:49:58.000 UTC",
#       "not  after"         : "2023-12-26 17:49:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 E9 DF C4 34 6E EA DD   9B 9E A8 A0 F4 D2 B3 DE  ....4n..........
#           0010: 65 29 FE A3                                        e)..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B8 05 59 F9 36 CF CE BA   FD 62 92 77 79 52 C2 DE  ..Y.6....b.wyR..
#           0010: C0 41 B0 38                                        .A.8
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.089 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 DC E7 06 24 87 46 06   3F 9C D3 A7 B2 D8 DD 03  ....$.F.?.......
#     0010: 40 66 28 10 10 99 C1 57   B3 54 70 81 B5 CE 69 F3  @f(....W.Tp...i.
#     0020: B1 87 88 E3 EC 82 91 9B   60 D5 B4 34 4F D1 84 13  ........`..4O...
#     0030: 87 BA 91 4C BA 9F F4 78   20 0D E0 88 16 65 B0 00  ...L...x ....e..
#     0040: 09 60 4F 25 E4 BE 5D 94   2D 66 87 E0 66 48 47 A8  .`O%..].-f..fHG.
#     0050: 00 F1 91 09 DA CC A1 CF   1C FB F9 EA 73 B1 0E 87  ............s...
#     0060: 93 13 F4 CB CC 69 62 E7   23 00 14 DB AA 57 16 DD  .....ib.#....W..
#     0070: 15 15 37 35 54 19 96 40   52 59 0A B0 79 D4 81 DA  ..75T..@RY..y...
#     0080: 14 48 A4 8F CD CA DB 01   40 54 27 C6 FD 8D C6 20  .H......@T'....
#     0090: 7C A8 21 3A F6 81 16 AB   16 9D 31 C9 6F 47 E3 98  ..!:......1.oG..
#     00A0: 02 2D 47 97 68 99 16 40   78 83 A8 E2 7E 55 B6 D6  .-G.h..@x....U..
#     00B0: F4 AF 20 9A F5 C8 53 64   2E 5A 99 97 77 AC D3 0A  .. ...Sd.Z..w...
#     00C0: 98 09 D4 77 D2 FF B6 69   F6 01 75 CC 81 21 2A 72  ...w...i..u..!*r
#     00D0: 66 5A 3D 81 7E F4 F6 BB   D8 F6 03 2D D4 9C 22 20  fZ=........-.."
#     00E0: 56 82 74 FA 06 C8 6F BC   87 D3 B8 98 76 9E 59 51  V.t...o.....v.YQ
#     00F0: BF 4D 3B 2C DD 13 6A B3   85 2F FE 31 C8 B8 CE A4  .M;,..j../.1....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.090 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 47 D5 CB 69 82 D0 93 F1   1C 82 27 20 63 9A 19 99  G..i......' c...
#     0010: CD 91 84 A1 A4 FE 31 69   DA 6B 99 F1 52 17 23 3E  ......1i.k..R.#>
#     0020: D3 22 B2 3C A4 A0 34 41   3D 36 0F 72 95 58 AD 9E  .".<..4A=6.r.X..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.091 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 17:50:32.148 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F4 C3 4E BA 1A B3 C8 C4 C6 11 B9 58 B1 B4 70 FB 19 62 58 E8 76 AE 0D D1 3D 1E D9 19 CA 55 E1 6D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 17:50:32.419 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 17:50:32.421 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 17:50:43.697; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 17:50:44.022 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 1B 8E CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, 

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 17:52:07.378 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.420 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 17:52:07.421 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33798/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28081ms
ok 65 stop command for single port in 30725ms
ok 66 status detects locally running solr in 14352ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6505ms
ok 70 upconfig in 2595ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 26m 32s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 26m58s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5556 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5556/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37805/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 15:14:35.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 15:14:35.834; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 15:14:37.026; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 15:14:37.069; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23403ms
ok 61 start solr with client truststore and security manager in 25809ms
not ok 62 start solr with mTLS needed in 58611ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-4XoKAg/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37805.
#
# Started Solr server on port 37805 (pid=199762). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 37806.
#
# Started Solr server on port 37806 (pid=200185). Happy searching!
#
# INFO  - 2023-09-27 15:16:02.341; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 15:16:02.347; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 15:16:02.719; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 15:16:02.722; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 15:16:02.722; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:02.755 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 99 0B 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:38.000 UTC",
#     "not  after"         : "2023-12-26 15:15:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 B6 42 6E AA 67 F7 14   E6 62 80 4B 66 B4 C6 7E  I.Bn.g...b.Kf...
#         0010: CE 24 A3 F0                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:02.759 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 FA D3 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:29.000 UTC",
#     "not  after"         : "2023-12-26 15:15:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:02.774 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:02.864 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:02.865 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:02.865 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:02.865 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:03.014 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:03.016 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:03.016 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.036 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.036 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.036 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:03.039 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DB E0 BE 54 56 97 12 34 52 10 1C 98 ED B9 B7 55 79 71 86 AC D7 3F 3C 21 17 1C E0 0F 81 BD D9 A0",
#   "session id"          : "39 C9 DB 12 64 96 96 DA 76 7E 5A 3D 5F 2B 50 F4 E4 AA F5 86 09 95 BF 69 10 A2 34 12 B2 BD 8C FF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F8 12 6E 93 FF C0 DF E8   CC 76 B9 1C 9C F3 34 58  ..n......v....4X
#             0010: F3 6B AC 1F 8C D3 71 2D   D5 9C 6D 6C 36 E4 35 12  .k....q-..ml6.5.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.176 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 A1 C8 FC D8 35 4A 8E 0E 45 CB E0 56 87 9F 09 64 BA 34 DB FD 0A 5D 5C D5 66 1B F0 52 C5 92 A1",
#   "session id"          : "39 C9 DB 12 64 96 96 DA 76 7E 5A 3D 5F 2B 50 F4 E4 AA F5 86 09 95 BF 69 10 A2 34 12 B2 BD 8C FF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C2 54 30 E3 32 64 A9 0C   8F A1 2B D1 0D 63 A8 03  .T0.2d....+..c..
#           0010: 07 24 8E 75 3D AD 2F 0F   9D B6 E9 8B 87 0C 36 5A  .$.u=./.......6Z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.177 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.177 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.179 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.179 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.181 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.181 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.183 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.192 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.194 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.195 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.205 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.205 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.205 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.205 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.205 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.206 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.208 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.208 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.208 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.209 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.210 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.210 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.214 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 22 A0 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:34.000 UTC",
#       "not  after"         : "2023-12-26 15:15:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 63 73 B2 76 A0 1A 7F   91 DE 5A 2F 40 ED E7 89  Ncs.v.....Z/@...
#           0010: 51 2C BE 1A                                        Q,..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.215 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.303 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.310 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 70 A7 98 34 5B 22 94 0A   B0 0F F3 DD 55 EC C6 17  p..4["......U...
#     0010: 1A 74 9C 61 10 DF E8 AB   2D 68 FE 69 F4 A7 19 E2  .t.a....-h.i....
#     0020: 0B 32 6D EB D4 38 0E E9   92 0E FC 37 4C D4 76 64  .2m..8.....7L.vd
#     0030: D0 0A 21 B5 41 C9 E7 CB   AB 2B B5 90 66 5B 9C 98  ..!.A....+..f[..
#     0040: 40 1B FB 6A 0B 5D 33 42   C0 21 0C A2 3C BC 6E 9E  @..j.]3B.!..<.n.
#     0050: 1B 80 C4 35 48 4C 74 9F   8B D0 B2 B9 3A 92 FB 8C  ...5HLt.....:...
#     0060: 21 B5 DD 93 A5 A9 90 92   E7 35 EC 97 B9 C8 43 40  !........5....C@
#     0070: 8E 1F F1 A7 8D 13 7C 6C   2E C2 01 EA 18 2A 97 2F  .......l.....*./
#     0080: 54 A1 65 22 22 B8 7D 43   A5 73 2B 15 25 40 7D 90  T.e""..C.s+.%@..
#     0090: 23 70 B5 1C 52 DF 14 0F   13 B1 AD 8F 37 C9 04 F5  #p..R.......7...
#     00A0: 04 26 27 F8 2B 12 12 29   3E A5 5B DE FC E2 09 10  .&'.+..)>.[.....
#     00B0: B3 04 42 13 2C 10 A4 E8   95 E4 95 E3 68 02 03 4C  ..B.,.......h..L
#     00C0: F6 E2 C8 C1 82 9F E7 70   9B 97 25 F4 01 C4 03 CC  .......p..%.....
#     00D0: 12 FD 9D 06 8A DE 3E 14   BC 56 37 E6 49 86 C1 74  ......>..V7.I..t
#     00E0: F2 BE 86 52 34 D8 83 6E   60 E1 6D 9C 6B F4 AD 6E  ...R4..n`.m.k..n
#     00F0: 6F 84 9C 4D 49 8F 54 B0   79 72 4A D3 F4 AC A9 79  o..MI.T.yrJ....y
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.312 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 09 71 D1 89 95 6F 8A DA   17 2E 56 EA 7D 2C 33 0D  .q...o....V..,3.
#     0010: 09 76 DE 4C 3C 5A D1 D2   C4 2E 18 39 0B DB 1E B2  .v.L<Z.....9....
#     0020: FB DB DD 9C B8 00 D2 41   FE 5D D8 EE 29 9A FF 54  .......A.]..)..T
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.316 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:03.317 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:03.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:03.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:03.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.319 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.322 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 99 0B 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:38.000 UTC",
#       "not  after"         : "2023-12-26 15:15:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 B6 42 6E AA 67 F7 14   E6 62 80 4B 66 B4 C6 7E  I.Bn.g...b.Kf...
#           0010: CE 24 A3 F0                                        .$..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 6B 8B BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:31.000 UTC",
#       "not  after"         : "2023-12-26 15:15:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#           0010: D9 D1 38 BC                                        ..8.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.364 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 21 06 9F 38 ED 8E 5C   F4 6B A8 0A 70 E2 8B 69  .!..8..\.k..p..i
#     0010: C1 7A F4 6F B9 1D 3D 85   15 19 B9 B2 44 6A B8 AD  .z.o..=.....Dj..
#     0020: 06 AB 15 65 56 85 C9 2A   36 C9 7A 17 3F C6 12 8C  ...eV..*6.z.?...
#     0030: C4 FD 89 A6 C1 23 52 D4   76 A0 B2 47 D0 AA 9A 57  .....#R.v..G...W
#     0040: 81 F0 96 30 5B 01 B9 ED   05 85 79 04 B3 7E AC 32  ...0[.....y....2
#     0050: 81 87 A5 B5 98 79 B0 2B   C9 A2 52 AB 55 BE AA D5  .....y.+..R.U...
#     0060: 68 08 75 7E A5 CE 99 DF   AA 2C AF 6E 2F DD DA 5D  h.u......,.n/..]
#     0070: 06 E2 98 13 14 AC 52 AC   6F 26 67 69 56 DD F5 C1  ......R.o&giV...
#     0080: D8 EE 5E 95 44 54 02 68   F5 0E C8 FB 86 3A 9D 53  ..^.DT.h.....:.S
#     0090: A5 FF 15 19 37 73 77 68   D3 FF 7E 80 0D 8C 4B 53  ....7swh......KS
#     00A0: A7 D5 58 33 E4 34 69 F1   4C 62 50 0D E2 BA 8A 15  ..X3.4i.LbP.....
#     00B0: 89 F2 2A 85 11 C3 88 86   80 B0 7D 82 3C EE 51 B6  ..*.........<.Q.
#     00C0: DE A5 83 F9 33 B0 4F 04   E1 3D 61 42 5F 7A B9 BA  ....3.O..=aB_z..
#     00D0: E0 69 72 88 0A 7C 20 CD   CA 2D F2 78 D3 C4 A6 68  .ir... ..-.x...h
#     00E0: D0 11 3F BC 1C 39 33 F6   F8 40 81 7C 25 52 69 7C  ..?..93..@..%Ri.
#     00F0: D1 3E 03 64 F5 5A F0 3E   4B CA 80 5C 65 84 EB AE  .>.d.Z.>K..\e...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.366 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 8D 3D F2 56 C4 56 6A   A7 EC 50 F3 BF 30 30 DB  ..=.V.Vj..P..00.
#     0010: A7 1C 08 6C 68 AB 06 D4   81 67 D3 EB C3 4D 87 A6  ...lh....g...M..
#     0020: B9 38 FD 0B AD 97 D9 41   F8 4F F9 57 60 D7 4B 05  .8.....A.O.W`.K.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.366 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:03.416 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5C 06 7A 01 D1 5F 67 19 A6 2E 76 51 D8 50 44 51 C9 17 DD 89 01 59 AA 5F 7B 6F 70 8D 86 CF 8D 4A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 15:16:03.741 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 15:16:03.743 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 15:16:04.728; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 15:16:04.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 15:16:05.106; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@906d29b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@584f54e6[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 15:16:05.110; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@584f54e6[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 15:16:05.110; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(ca,h=[localhost],a=[],w=[]) for Client@584f54e6[provider=null,keyStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-4XoKAg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:05.146 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 99 0B 78",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:38.000 UTC",
#     "not  after"         : "2023-12-26 15:15:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 B6 42 6E AA 67 F7 14   E6 62 80 4B 66 B4 C6 7E  I.Bn.g...b.Kf...
#         0010: CE 24 A3 F0                                        .$..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:05.151 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "55 FA D3 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:29.000 UTC",
#     "not  after"         : "2023-12-26 15:15:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:05.168 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:05.457 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:05.460 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:05.460 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:16:05.460 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:05.619 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.620 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:05.622 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:05.622 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.642 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.642 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.642 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:05.645 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 9D CF FB 46 48 D8 C6 86 F6 C0 DD 98 C7 12 21 17 65 57 27 F5 CA 79 73 19 24 9D 88 4C 87 CF D7",
#   "session id"          : "4E 1A B6 0F DD 47 3E 1D 22 83 D8 2B 59 F3 DA E9 6C 21 08 F7 27 1A 61 AA 20 5E 67 47 76 A6 C2 C3",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 02 79 3B 23 6C 17 B5 53   B8 53 9E 6F FB 01 23 FE  .y;#l..S.S.o..#.
#             0010: 61 CF 3F F8 6F 8A 27 ED   A5 33 CE EC 61 4D 9A 7A  a.?.o.'..3..aM.z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.777 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "02 CD 9D 74 05 0E 0D 10 96 77 E9 EA 14 CC C8 5F 70 E9 F5 8F 36 54 C8 F1 7A 6D 85 58 93 CA FF 95",
#   "session id"          : "4E 1A B6 0F DD 47 3E 1D 22 83 D8 2B 59 F3 DA E9 6C 21 08 F7 27 1A 61 AA 20 5E 67 47 76 A6 C2 C3",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6B 45 64 A7 50 ED 28 1B   F5 DF 44 F1 0E BC 96 2E  kEd.P.(...D.....
#           0010: 9D 55 1A 0F 35 D9 E3 2A   4F F2 AB 3B 17 8A 80 7C  .U..5..*O..;....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.777 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.778 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.779 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.780 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.780 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.782 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.782 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.783 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.783 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.783 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.783 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.784 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.793 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.796 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.797 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.806 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.806 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.806 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.807 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.807 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.807 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.809 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.810 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.810 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.810 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.812 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.817 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 22 A0 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:34.000 UTC",
#       "not  after"         : "2023-12-26 15:15:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E 63 73 B2 76 A0 1A 7F   91 DE 5A 2F 40 ED E7 89  Ncs.v.....Z/@...
#           0010: 51 2C BE 1A                                        Q,..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.817 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.909 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 6B 8B BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 15:15:31.000 UTC",
#     "not  after"         : "2023-12-26 15:15:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#         0010: D9 D1 38 BC                                        ..8.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#         0010: E8 40 68 76                                        .@hv
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.916 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3F BC 0F C2 E5 F3 8F DF   11 0F 72 73 91 63 22 DC  ?.........rs.c".
#     0010: A7 BD C1 F8 98 44 BF A2   56 15 58 A4 34 BD 0F 18  .....D..V.X.4...
#     0020: E1 B5 F2 A9 79 97 89 75   D5 B5 7A 09 96 F4 EB 04  ....y..u..z.....
#     0030: C0 6D DD 29 9F 41 A4 14   F0 3A 12 5D 76 2E 7C 79  .m.).A...:.]v..y
#     0040: 5C E0 C7 A6 2C 8A 8D B4   59 B7 33 0B B7 1C B1 7F  \...,...Y.3.....
#     0050: EC E6 D4 85 30 CC F4 F7   E7 CF D1 31 F9 FE 61 E5  ....0......1..a.
#     0060: FD 38 54 48 24 CF BC EA   2F A4 44 B1 BD 1C 11 EA  .8TH$.../.D.....
#     0070: 38 90 3E 5E 38 4B 53 FA   EA 60 15 3C 9E E9 13 2E  8.>^8KS..`.<....
#     0080: 3B 55 1D F6 53 33 9D 36   47 97 23 66 0E D1 FB 26  ;U..S3.6G.#f...&
#     0090: E9 9B CB FD 7F F7 B0 BC   08 6E 31 7D C2 AE 31 6D  .........n1...1m
#     00A0: 67 FC 30 7F 0C 7B AA 32   7D 29 07 AE 2F 67 BB CE  g.0....2.)../g..
#     00B0: F8 76 CA 27 01 DD B3 54   41 99 85 5C 66 FB 1F EF  .v.'...TA..\f...
#     00C0: 33 9E 9E AF ED 5F F9 3D   7C BA 28 CD 2A 7F 33 B3  3...._.=..(.*.3.
#     00D0: 88 89 08 76 57 91 81 70   45 9A B9 B0 7D 01 73 65  ...vW..pE.....se
#     00E0: 49 5C 77 6F 46 55 1F 08   14 4D 9D 01 60 58 FB 0C  I\woFU...M..`X..
#     00F0: 46 2A F9 F8 5A 35 4E 96   2B A4 3D 69 2B F8 7C FE  F*..Z5N.+.=i+...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.918 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 98 74 27 22 FA 5B 18 C5   9A 84 64 3B 87 C9 40 27  .t'".[....d;..@'
#     0010: CE 27 91 08 92 7B 73 26   E9 AE EA 67 20 B1 FA 27  .'....s&...g ..'
#     0020: CF 1F A4 A4 62 25 D5 BA   91 D4 58 09 C4 9E 59 2D  ....b%....X...Y-
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.922 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:05.923 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.923 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:05.924 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.924 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 15:16:05.924 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:05.924 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.925 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.929 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 99 0B 78",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:38.000 UTC",
#       "not  after"         : "2023-12-26 15:15:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 B6 42 6E AA 67 F7 14   E6 62 80 4B 66 B4 C6 7E  I.Bn.g...b.Kf...
#           0010: CE 24 A3 F0                                        .$..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 6B 8B BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:31.000 UTC",
#       "not  after"         : "2023-12-26 15:15:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#           0010: D9 D1 38 BC                                        ..8.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.972 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 32 62 97 AA EB 92 DD   03 0B 53 F6 AA AA 18 EB  c2b.......S.....
#     0010: 88 CF C0 B5 57 F2 98 4C   FF E6 2A 87 AA 97 7D 6D  ....W..L..*....m
#     0020: 1C D5 CE 78 27 12 AB 6F   B6 AF 9C 57 41 AC EC 49  ...x'..o...WA..I
#     0030: A1 F6 21 84 A8 E3 1F 4F   5F F7 70 B1 29 51 82 67  ..!....O_.p.)Q.g
#     0040: 20 7D F0 FD 6E 85 9E 84   89 72 A1 54 CF 9D 20 50   ...n....r.T.. P
#     0050: 80 20 7F 9E DF EA BC 96   0F CF 6E 11 AB 12 01 25  . ........n....%
#     0060: 57 0E DF 0D 66 FB D6 20   B7 4D FA 14 F7 2C EE 40  W...f.. .M...,.@
#     0070: 7B C9 A9 F1 DE 7F 8C 3A   16 17 76 DC 90 DA D8 4F  .......:..v....O
#     0080: 6E F0 93 AB 2F 85 3E 1D   D0 4F 6F 02 72 DF 29 61  n.../.>..Oo.r.)a
#     0090: 0F 8F 5F F9 1D A4 22 7F   A1 0A E4 04 11 31 7F 31  .._..."......1.1
#     00A0: CC EB 32 07 36 38 B0 8D   72 05 E0 17 49 8A 70 16  ..2.68..r...I.p.
#     00B0: 1A 22 C4 84 11 76 E6 A1   29 33 73 59 02 C2 07 6D  ."...v..)3sY...m
#     00C0: C2 BD 05 20 F8 4B 28 18   C8 42 45 A1 82 80 8E F0  ... .K(..BE.....
#     00D0: 0C 14 FE 57 E2 38 6C B6   56 E5 67 35 AA 2E 5B D3  ...W.8l.V.g5..[.
#     00E0: 6B 1C C2 BA AD F6 7F AB   45 9F 0D 32 C2 CE D6 74  k.......E..2...t
#     00F0: A1 47 EB 53 7D 47 0D 31   7E D4 0A 36 C4 8C AF EF  .G.S.G.1...6....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.973 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C2 55 2D 5D 5A 30 54 64   91 9A 32 53 48 AD CD 1A  .U-]Z0Td..2SH...
#     0010: 2A B9 E6 72 9C FC CC 5C   5C CB 7A 31 C8 DB 0D A4  *..r...\\.z1....
#     0020: 61 A5 14 22 E6 B9 AB F8   EE 52 B1 1A 2B 0E 1F 7A  a..".....R..+..z
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:05.974 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:06.029 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E7 E3 B4 03 97 3F 3D A1 15 97 2F 57 77 49 8D 68 A5 94 C4 31 26 8E A0 A4 77 AC 7B 96 60 F9 74 56",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 15:16:06.329 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 15:16:06.330 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 15:16:17.773; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:18.126 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 FA D3 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:29.000 UTC",
#       "not  after"         : "2023-12-26 15:15:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#           0010: D9 D1 38 BC                                        ..8.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 6B 8B BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 15:15:31.000 UTC",
#       "not  after"         : "2023-12-26 15:15:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 8B 98 E2 B5 1B 32 A5   05 15 F8 72 EA 79 48 00  $.....2....r.yH.
#           0010: D9 D1 38 BC                                        ..8.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 37 7C EA C4 3F 40 61   6A 29 D8 DA 2E 08 58 DE  .7...?@aj)....X.
#           0010: E8 40 68 76                                        .@hv
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 15:16:18.143 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:18.380 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.380 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:18.382 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 15:16:18.382 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.387 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.401 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.401 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.402 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 15:16:18.404 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C2 7C 71 4A C7 D3 B2 8D 38 9D 95 6D B0 97 D2 9F B2 32 22 70 61 67 FB 14 A6 F3 55 B6 69 9D 57 78",
#     "session id"          : "6F E1 08 2A 59 54 1F 8C 6B AA BF 3E 96 8D F4 9D DD DB 58 43 6D A8 5A 7A CA E4 3A EC A2 1B BC 60",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 93 0B 2C E9 03 DD F0 61   93 AF 50 4B 77 1D 90 15  ..,....a..PKw...
#               0010: FC 60 73 61 10 9A F6 58   44 FD 1E 57 30 D0 4A 25  .`sa...XD..W0.J%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.425 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F4 79 96 01 BA BB 14 28 CE 00 81 C6 FB 0B FC A9 27 C1 BD EC B1 6D 0D 51 C9 30 1F 1F 10 4E 68 AE",
#     "session id"          : "6F E1 08 2A 59 54 1F 8C 6B AA BF 3E 96 8D F4 9D DD DB 58 43 6D A8 5A 7A CA E4 3A EC A2 1B BC 60",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F4 B5 29 6C CA EA A4 29   3E 62 71 E1 F5 71 9C C5  ..)l...)>bq..q..
#             0010: CE 29 BB D5 32 18 7A 91   17 E7 CF 4C 5B D7 F8 00  .)..2.z....L[...
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.426 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.426 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.427 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.428 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.428 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.430 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.430 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.430 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.431 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:18.432 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:18.432 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.432 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.432 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.441 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.443 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.444 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.453 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.453 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.453 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.454 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:18.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:16:18.454 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 15:16:18.455 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 15:17:42.024 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:17:42.076 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:17:42.076 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:17:42.076 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 15:17:42.077 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37806/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28378ms
ok 65 stop command for single port in 31370ms
ok 66 status detects locally running solr in 14678ms
ok 67 status does not expose cli parameters to end user in 235ms
ok 68 listing out files in 2257ms
ok 69 copying files around in 6962ms
ok 70 upconfig in 2863ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1268ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1273ms
ok 73 Cleanup in 1241ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 12s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m41s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5555 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5555/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32969/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 12:43:47.725; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 12:43:47.730; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 12:43:48.952; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 12:43:48.993; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22120ms
ok 61 start solr with client truststore and security manager in 24764ms
not ok 62 start solr with mTLS needed in 57090ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lkIF4b/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32969.
#
# Started Solr server on port 32969 (pid=200030). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 32970.
#
# Started Solr server on port 32970 (pid=200441). Happy searching!
#
# INFO  - 2023-09-27 12:45:10.859; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 12:45:10.865; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 12:45:11.259; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 12:45:11.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 12:45:11.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:11.296 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 67 13 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:47.000 UTC",
#     "not  after"         : "2023-12-26 12:44:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 7D 62 2E 87 F5 50 16   E9 74 DD A9 6E 10 62 65  ..b...P..t..n.be
#         0010: A5 62 B9 86                                        .b..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:11.300 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 02 76 5F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:38.000 UTC",
#     "not  after"         : "2023-12-26 12:44:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:11.315 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:11.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:11.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:11.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:11.647 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:11.798 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.798 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:11.800 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:11.800 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.805 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.817 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:11.821 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "65 46 A9 9E 29 BF 3B 56 95 92 FC 42 0E D9 19 12 45 69 F9 34 65 64 A7 2F 2E 14 04 89 64 D0 CD 90",
#   "session id"          : "40 72 23 02 C1 9F E3 BF C0 97 78 E8 3B 4A 2E 74 90 E9 B8 03 98 67 1C 20 A2 08 3F 17 D1 C3 CF 9F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 81 AD CA 74 78 C7 3B C5   A2 6D AD 9C 71 70 FD B8  ...tx.;..m..qp..
#             0010: F8 06 52 E1 32 C4 7F 70   AB 50 E3 A2 02 00 F0 07  ..R.2..p.P......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.967 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A6 EA 13 5B 46 5F D0 96 5F 80 E5 B3 E3 F9 50 62 F6 CE 4E CA 53 E8 89 50 4C 4F CF 7A BD D3 F9 B1",
#   "session id"          : "40 72 23 02 C1 9F E3 BF C0 97 78 E8 3B 4A 2E 74 90 E9 B8 03 98 67 1C 20 A2 08 3F 17 D1 C3 CF 9F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 C6 F0 FC E0 37 87 A5   46 DC DB 0A 67 E3 94 12  w....7..F...g...
#           0010: 20 AE 19 06 BE FC C0 9B   8C 7F B7 12 C3 18 8B 34   ..............4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.968 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.968 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.969 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.970 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.972 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.973 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:11.974 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:11.975 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.982 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.984 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.985 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.989 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.989 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:11.990 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:11.991 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.992 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.993 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.993 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.993 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.995 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:11.996 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:11.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.000 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E C4 21 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:43.000 UTC",
#       "not  after"         : "2023-12-26 12:44:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 75 A4 A9 96 2D 74 6F   A1 E1 FF D6 63 19 12 6C  Zu...-to....c..l
#           0010: B3 C9 EC EC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.096 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.100 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 1C C1 E0 63 A9 E8 48   6C 9E 2F 17 7B C0 80 23  n...c..Hl./....#
#     0010: 59 6B 2E F7 43 DA 5C 0D   BE DA 22 7E 16 93 E0 87  Yk..C.\...".....
#     0020: 45 9A 43 BA 6C 43 C0 D5   5E 3F 0B BE 25 37 CE 8F  E.C.lC..^?..%7..
#     0030: E5 9A 82 CB 85 FD FA 1A   9B AE C8 B9 40 15 F1 75  ............@..u
#     0040: 06 0E 3E 1C 09 D5 55 07   78 75 1E EC 02 F4 BC 06  ..>...U.xu......
#     0050: 7E FE EB F2 16 AA 36 FA   2D 34 11 DE 8A 10 B3 6D  ......6.-4.....m
#     0060: F5 F0 55 AC 28 3D 3C F9   67 8C BA F9 3E 96 AB E4  ..U.(=<.g...>...
#     0070: 3B 4C 72 2E 4B AE C6 D5   32 DC 82 7A 0D 5E 7F C8  ;Lr.K...2..z.^..
#     0080: 40 10 4D 56 4F 35 45 4F   29 FD EB CD 97 D2 B0 BD  @.MVO5EO).......
#     0090: 13 03 0A 01 35 37 81 22   22 F4 C1 86 B4 D3 45 2B  ....57."".....E+
#     00A0: 89 F3 B0 52 2C 87 4F 49   BB 62 E6 FE 51 38 E1 4F  ...R,.OI.b..Q8.O
#     00B0: 9E AE F3 8D D1 65 74 90   81 6E 5F 30 00 8B 07 70  .....et..n_0...p
#     00C0: C2 82 A8 FA F2 7E 43 F4   34 0E A2 87 A8 D1 C4 EC  ......C.4.......
#     00D0: F1 B3 0B E8 C4 96 16 54   43 49 88 74 C8 35 43 D3  .......TCI.t.5C.
#     00E0: AC D8 AA D8 A6 BF D6 15   2A 75 55 35 13 1A 8D 25  ........*uU5...%
#     00F0: E0 27 B2 DC EA 45 61 CC   88 D0 CD 52 71 1E 9B 50  .'...Ea....Rq..P
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.102 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AC 39 F7 1C 54 11 56 A9   5B BF 5E 2F 02 BD A8 04  .9..T.V.[.^/....
#     0010: DB 1B 2C 0C C7 CB 12 EC   C1 B0 00 1B DC 92 C0 71  ..,............q
#     0020: 5D 00 A1 35 40 89 81 10   9D 44 95 53 EB 4A F1 FB  ]..5@....D.S.J..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.105 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:12.106 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:12.106 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:12.107 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:12.107 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:12.107 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:12.108 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.108 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.111 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 67 13 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:47.000 UTC",
#       "not  after"         : "2023-12-26 12:44:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 7D 62 2E 87 F5 50 16   E9 74 DD A9 6E 10 62 65  ..b...P..t..n.be
#           0010: A5 62 B9 86                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 78 DD 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:40.000 UTC",
#       "not  after"         : "2023-12-26 12:44:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#           0010: 0B 98 10 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.137 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 E1 BC B2 CB B2 33 63   37 B6 A4 FF 80 0F 3F CD  ......3c7.....?.
#     0010: B6 E0 47 83 62 FB 88 7A   AC 2C 26 4F 1D 87 6C 98  ..G.b..z.,&O..l.
#     0020: 3C C6 13 69 03 F7 0A 3D   EE FD 41 6A 22 F1 F2 6A  <..i...=..Aj"..j
#     0030: 65 05 35 EE 23 15 07 64   4D 63 FB 79 FE 25 E4 3C  e.5.#..dMc.y.%.<
#     0040: D5 74 EE 58 C4 F0 88 93   0B EE A5 95 24 41 0F D9  .t.X........$A..
#     0050: 71 BA 2A 88 E5 1D 3F E4   82 F7 45 3C 95 A4 DF 65  q.*...?...E<...e
#     0060: CA 82 65 CB 93 A0 D5 EB   B2 E0 A3 6D 69 E9 EC 7C  ..e........mi...
#     0070: 1C 16 36 75 9B 16 DD 44   1B E8 76 69 27 E6 D3 BF  ..6u...D..vi'...
#     0080: 0C 27 5C C1 2D 9F F5 D0   A2 FF D8 95 3C 90 FD 7F  .'\.-.......<...
#     0090: 32 34 D2 95 5D D2 B9 17   C8 A6 21 39 13 1A E4 94  24..].....!9....
#     00A0: 7A 1E C2 D5 7F A8 12 33   0F 4B 69 0A E7 FD 7D 04  z......3.Ki.....
#     00B0: ED E5 40 E1 2D 2E F4 5C   8B 70 AE 26 52 F4 7B 9E  ..@.-..\.p.&R...
#     00C0: CB 4F D2 80 EA 29 E2 01   34 23 BE C5 96 A9 35 BA  .O...)..4#....5.
#     00D0: C1 AB FB 3D 74 75 14 E6   B1 D2 2C 30 03 14 26 E9  ...=tu....,0..&.
#     00E0: 31 F4 B9 FA 66 15 01 BB   DF 16 31 B9 FD EA 1B 6A  1...f.....1....j
#     00F0: 93 D5 1B 2E 83 67 0E 5F   54 6F 23 DD 85 E9 70 58  .....g._To#...pX
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.138 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 93 6D CB 5A 1B 5E 39 FC   09 F1 25 79 0C 1B 2C CC  .m.Z.^9...%y..,.
#     0010: D8 41 4F 7F C4 77 95 11   58 4E 32 AE 02 5E 54 E4  .AO..w..XN2..^T.
#     0020: 90 87 CF 8D 68 A9 BA B9   87 0F 7C CB 74 BE 53 4E  ....h.......t.SN
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.139 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:12.190 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "24 C9 99 9F 4F 3A A1 35 7C B1 82 C3 05 12 91 47 B6 48 5C D8 2B D4 A2 82 3C 16 D5 1C 9A 45 BC A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 12:45:12.465 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 12:45:12.466 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 12:45:13.382; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 12:45:13.388; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 12:45:13.745; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 12:45:13.748; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 12:45:13.748; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lkIF4b/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:13.780 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "16 67 13 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:47.000 UTC",
#     "not  after"         : "2023-12-26 12:44:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 7D 62 2E 87 F5 50 16   E9 74 DD A9 6E 10 62 65  ..b...P..t..n.be
#         0010: A5 62 B9 86                                        .b..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:13.784 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 02 76 5F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:38.000 UTC",
#     "not  after"         : "2023-12-26 12:44:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:13.798 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:13.883 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:13.885 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:13.886 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:45:13.886 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:14.019 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.020 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:14.021 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:14.022 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.039 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.039 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.039 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:14.041 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A4 6B A4 1D 30 74 0C 24 34 30 BC BC B4 14 EB AF AD 23 20 E3 D3 0D 09 75 F1 C6 CA CB F9 DE 27 0D",
#   "session id"          : "25 64 51 1D 77 1D 1E 46 24 FE 3E 2E B2 AC E8 8C 79 E5 F5 54 72 9D 59 23 95 1D 84 ED BD F7 8B 49",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 64 37 E7 3D 78 71 72 FD   C9 9A EB 28 6F 0D 75 52  d7.=xqr....(o.uR
#             0010: CE 42 1C 01 81 33 CA B9   09 9C 7E 9B C1 83 DB 0B  .B...3..........
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.153 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "76 68 16 10 69 38 38 4B 4D 82 BD 38 FA C5 5A DD A6 A7 40 3A 09 C8 B4 94 BF 7B 14 01 AE D6 13 BC",
#   "session id"          : "25 64 51 1D 77 1D 1E 46 24 FE 3E 2E B2 AC E8 8C 79 E5 F5 54 72 9D 59 23 95 1D 84 ED BD F7 8B 49",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 57 81 D6 AE CA F9 2F DD   B9 71 C4 47 98 2E FC 0F  W...../..q.G....
#           0010: F7 B4 1E DA 48 36 AE 8E   83 29 E4 B3 80 CA C0 3B  ....H6...).....;
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.153 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.154 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.155 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.156 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.156 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.156 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.157 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.158 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.158 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.158 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.160 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.167 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.168 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.173 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.173 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.174 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.174 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.175 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.176 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.176 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.177 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.178 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.178 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.181 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E C4 21 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:43.000 UTC",
#       "not  after"         : "2023-12-26 12:44:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 75 A4 A9 96 2D 74 6F   A1 E1 FF D6 63 19 12 6C  Zu...-to....c..l
#           0010: B3 C9 EC EC                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.181 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.261 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "48 78 DD 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 12:44:40.000 UTC",
#     "not  after"         : "2023-12-26 12:44:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#         0010: 0B 98 10 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#         0010: 55 D2 55 4B                                        U.UK
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.265 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 61 86 5E 53 52 4D 32 E3   92 EA C4 A5 FA 53 3D 7D  a.^SRM2......S=.
#     0010: DB 44 AF A9 31 97 80 EF   3B 3B BF 0C 06 66 65 CB  .D..1...;;...fe.
#     0020: 4E B7 29 BF CE A9 F8 7D   4D 13 29 4E 35 EE 1C 40  N.).....M.)N5..@
#     0030: 85 2A 6B 05 87 3C FC E0   A3 94 95 45 F8 0F 92 88  .*k..<.....E....
#     0040: 74 01 12 A0 CE C5 0C BF   1B 84 B8 44 54 E3 91 3B  t..........DT..;
#     0050: 13 59 16 45 B5 B9 EC 64   14 B0 B5 11 E8 01 19 39  .Y.E...d.......9
#     0060: A2 3D 21 41 2E 67 62 30   4B DA 9D 07 F9 60 6F 46  .=!A.gb0K....`oF
#     0070: 12 D4 C3 B8 BE 43 0F 51   77 A7 A4 93 CC FC 2A 0C  .....C.Qw.....*.
#     0080: 06 3E FE E8 3E 00 55 C4   38 9B 00 C4 3E 9F 19 97  .>..>.U.8...>...
#     0090: 1B 16 67 CD F0 35 40 25   C3 AD 02 9B 0F DE 5E 41  ..g..5@%......^A
#     00A0: 42 B5 60 EC 52 9E 0A AC   BB AD 57 18 A8 93 13 DF  B.`.R.....W.....
#     00B0: A5 65 75 0F 19 97 5B 0F   B0 05 9F B7 0E F9 79 BA  .eu...[.......y.
#     00C0: D0 2C 45 99 F3 1F F4 1D   4B 91 A8 0E 91 1C 1A 63  .,E.....K......c
#     00D0: 77 CC 47 8E 14 D5 0B B0   63 43 1C 56 83 91 F4 26  w.G.....cC.V...&
#     00E0: BE E2 14 51 D1 FF 3E 03   49 49 02 65 9C F9 24 0E  ...Q..>.II.e..$.
#     00F0: CA D4 28 7F 39 76 A2 94   F0 C1 B5 B6 40 D5 3C 15  ..(.9v......@.<.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.267 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BB 61 54 85 58 00 64 26   19 6F F8 C2 92 32 A9 F0  .aT.X.d&.o...2..
#     0010: E5 F5 02 74 CA D6 84 54   D5 81 06 0E 18 15 5E 65  ...t...T......^e
#     0020: 3D 03 DE 9E 7D BE 23 C5   42 E1 F2 AF E9 0C 93 DC  =.....#.B.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.269 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:14.270 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.270 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:14.271 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.271 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 12:45:14.271 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:14.271 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.272 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.274 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "16 67 13 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:47.000 UTC",
#       "not  after"         : "2023-12-26 12:44:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 7D 62 2E 87 F5 50 16   E9 74 DD A9 6E 10 62 65  ..b...P..t..n.be
#           0010: A5 62 B9 86                                        .b..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 78 DD 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:40.000 UTC",
#       "not  after"         : "2023-12-26 12:44:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#           0010: 0B 98 10 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.299 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C 9A BC 58 59 69 5B 5D   99 F0 A0 AF E4 59 D9 55  ...XYi[].....Y.U
#     0010: 07 E1 98 E7 96 71 EE F9   3F 24 EC 12 43 BC 02 D9  .....q..?$..C...
#     0020: 7B EF BE F9 92 67 31 67   3A 4E D4 C1 A3 20 0D 70  .....g1g:N... .p
#     0030: DD 92 B0 EE A8 1C D9 01   AE 91 A6 60 CA A6 10 17  ...........`....
#     0040: 3C A6 90 A0 8A B3 46 F7   E2 63 B9 8B 4A 7A E6 B7  <.....F..c..Jz..
#     0050: 86 09 4F 27 D0 94 E2 CD   D1 D1 95 86 6E 09 D6 0B  ..O'........n...
#     0060: F2 86 9C 91 7E 6B CE 8B   D2 80 A8 CA 98 EF 77 E2  .....k........w.
#     0070: 40 01 B5 F1 55 EA E0 2D   5C 75 31 47 46 D5 C6 E2  @...U..-\u1GF...
#     0080: 58 99 A4 ED 2E AF 1B CD   99 C6 4A C4 65 43 18 58  X.........J.eC.X
#     0090: 4D 61 CA 9A 46 8C 30 B6   35 CB 7A B5 B7 D5 5B 70  Ma..F.0.5.z...[p
#     00A0: 01 A8 5B 87 F5 5E FE 30   C6 BC D1 2E 44 65 C6 3F  ..[..^.0....De.?
#     00B0: 24 C8 AD 36 6F B9 DC F4   87 25 A3 D1 4B 1E 22 06  $..6o....%..K.".
#     00C0: D2 85 21 56 6B 73 9E 53   F0 54 37 DA 92 7C 37 5A  ..!Vks.S.T7...7Z
#     00D0: C3 A9 AD B0 1F 54 86 6B   8B 88 60 A0 7E 3F C7 95  .....T.k..`..?..
#     00E0: 9A 59 F4 E8 27 FD 07 54   AB DF 54 8B 31 B5 BD 23  .Y..'..T..T.1..#
#     00F0: A6 39 76 A3 11 B9 D3 BE   EF 20 00 15 42 A5 56 22  .9v...... ..B.V"
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.301 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E A0 14 B1 2A 5B D3 76   A4 56 4B 4A 72 08 E9 4C  ....*[.v.VKJr..L
#     0010: DA 8D 2A 6B 62 B1 2E BF   98 1C EE F0 5F BE 42 EC  ..*kb......._.B.
#     0020: 64 DA 71 FB 57 AC 5D FF   0B 98 0F ED F8 7E 01 16  d.q.W.].........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.301 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:14.347 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A1 94 1F AE A6 A8 FB 4D 47 41 00 EB DE 68 1A EB 4B 23 C3 BB 1E CF E6 5D 35 24 79 6D CA 5B 0C 5F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 12:45:14.671 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 12:45:14.672 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 12:45:26.228; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:26.578 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 02 76 5F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:38.000 UTC",
#       "not  after"         : "2023-12-26 12:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#           0010: 0B 98 10 06                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "48 78 DD 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 12:44:40.000 UTC",
#       "not  after"         : "2023-12-26 12:44:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 DD BF 8E 97 38 73 8F   5D AD 40 70 29 4D 07 F0  .....8s.].@p)M..
#           0010: 0B 98 10 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 3E 5F 02 79 4C ED 4D   20 19 BE 98 CC F7 CE 8F  .>_.yL.M .......
#           0010: 55 D2 55 4B                                        U.UK
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 12:45:26.597 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:26.850 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.851 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:26.852 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 12:45:26.853 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.859 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.871 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.871 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.871 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 12:45:26.874 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E6 DA BE D6 C4 2B 8B 16 63 E3 84 AB 0C 28 A1 E9 16 A9 BA E8 9B F6 50 47 D1 0E 8B BA E3 8E E7 68",
#     "session id"          : "DD 4E AA 50 C3 4D DD 00 57 63 70 85 59 2E C5 91 6F 50 CD 7C 6D 14 6C 21 A3 11 12 E4 AE BF 76 D0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D6 64 D9 4C 0C 56 51 4D   E7 DF 96 A6 9A B7 41 CF  .d.L.VQM......A.
#               0010: 84 E1 DC 06 A5 03 73 8C   1D 9B 48 CA 76 3F 54 77  ......s...H.v?Tw
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.895 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4D 13 B1 DC 8E BF C2 5A A4 B0 DD 15 2B E0 6B 08 5C E3 FB 67 15 67 60 63 76 CB 10 96 00 53 CE 96",
#     "session id"          : "DD 4E AA 50 C3 4D DD 00 57 63 70 85 59 2E C5 91 6F 50 CD 7C 6D 14 6C 21 A3 11 12 E4 AE BF 76 D0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2E 9B 6A 60 AD 17 BD 32   28 FD FD 20 54 D6 90 E1  ..j`...2(.. T...
#             0010: 13 23 F2 19 84 5E 5B 0B   1D 1E 65 22 BB 69 49 30  .#...^[...e".iI0
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.896 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.896 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.898 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.898 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.901 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.901 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.901 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:26.903 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:26.903 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.911 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.912 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.914 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.917 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:26.919 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:45:26.919 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 12:45:26.920 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certific

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 12:46:45.639 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:46:45.686 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:46:45.687 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:46:45.687 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 12:46:45.687 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32970/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28368ms
ok 65 stop command for single port in 31190ms
ok 66 status detects locally running solr in 14335ms
ok 67 status does not expose cli parameters to end user in 210ms
ok 68 listing out files in 2153ms
ok 69 copying files around in 6483ms
ok 70 upconfig in 2597ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1234ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 42s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m7.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5554 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5554/

All tests passed

Build Log:
[...truncated 1330 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33139/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 10:50:41.154; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 10:50:41.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 10:50:42.068; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 10:50:42.107; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22158ms
ok 61 start solr with client truststore and security manager in 25036ms
not ok 62 start solr with mTLS needed in 60480ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-60JUsK/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33139.
#
# Started Solr server on port 33139 (pid=201584). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33140.
#
# Started Solr server on port 33140 (pid=202012). Happy searching!
#
# INFO  - 2023-09-27 10:52:04.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 10:52:04.208; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 10:52:04.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 10:52:04.618; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 10:52:04.618; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:04.653 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 27 B6 B4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:40.000 UTC",
#     "not  after"         : "2023-12-26 10:51:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 7E C6 26 48 80 9A EE   71 AC 8D 5A 17 2D 3F FC  ...&H...q..Z.-?.
#         0010: 17 9B C3 76                                        ...v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:04.658 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 2F 37 BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:32.000 UTC",
#     "not  after"         : "2023-12-26 10:51:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:04.674 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:05.004 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:05.006 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:05.007 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:05.007 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:05.157 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.157 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:05.159 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:05.159 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.165 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.177 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.178 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:05.181 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4D 68 FD 52 7A 06 CB FC 56 1A 81 D3 49 A1 F5 46 1B 56 F2 39 AF 6E A0 5A 8F AA FB D4 39 A2 4A 9C",
#   "session id"          : "73 0B AC 6A 3D 4F CD 9B 01 E2 91 48 95 5D 98 3D 4E 72 BD 1D DD 4F A8 ED E4 F2 AA 44 07 67 BA BC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6C B0 FC 77 E8 0F AE 7E   73 CB 7E 7C A3 4D 02 EB  l..w....s....M..
#             0010: 30 8B 3E 36 57 D4 B2 EB   8F C0 6D A2 1B AA 1F 1E  0.>6W.....m.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.288 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C1 A8 96 4C B1 0E 0F 69 8A EA 54 F1 D7 59 4F 71 79 34 2A E9 83 A7 73 DC D9 91 87 54 15 78 FC BC",
#   "session id"          : "73 0B AC 6A 3D 4F CD 9B 01 E2 91 48 95 5D 98 3D 4E 72 BD 1D DD 4F A8 ED E4 F2 AA 44 07 67 BA BC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 28 E3 C7 89 C2 29 1F 9A   F7 57 DC EE 6D B7 02 53  (....)...W..m..S
#           0010: E5 21 04 2C 6A CE E4 78   2E C2 8C 1C D7 82 56 29  .!.,j..x......V)
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.288 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.289 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.290 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.292 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.292 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.301 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.303 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.304 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.307 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.308 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.310 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.311 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.311 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.312 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.313 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.314 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.314 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.318 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 3C 3F 06",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:36.000 UTC",
#       "not  after"         : "2023-12-26 10:51:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 95 18 CE AE 16 80 04   31 0B D6 8B 0A D6 51 5B  ........1.....Q[
#           0010: 11 A9 45 C7                                        ..E.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.401 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.404 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 54 4D 2B 14 BD 8B F2 9F   D8 37 23 22 B9 B2 DC 4A  TM+......7#"...J
#     0010: D4 9B A0 2A AC D4 A1 20   BE 7C 1E D5 B8 90 6F 5F  ...*... ......o_
#     0020: 9C 42 9A 18 2C FC 1A 7E   36 B4 F5 84 84 BA 2D EA  .B..,...6.....-.
#     0030: 97 6E 17 AA C4 83 DF AB   D3 B3 3C 1A 73 E5 FA 03  .n........<.s...
#     0040: 8F C5 2A 35 6D C2 EE 32   42 15 2C 72 87 81 E4 75  ..*5m..2B.,r...u
#     0050: 2C 3A D9 69 07 2C 2C 09   99 AF C2 94 11 BF 1D F0  ,:.i.,,.........
#     0060: 7B D2 52 58 B0 8A 06 A0   9D 1C 49 72 38 48 08 66  ..RX......Ir8H.f
#     0070: 6E FC 60 CD 7B 6F 23 40   E2 07 F4 0E 7E 13 70 DD  n.`..o#@......p.
#     0080: B6 A3 25 B6 70 01 3F E0   F0 C9 24 F7 29 9A F7 C2  ..%.p.?...$.)...
#     0090: B0 AC 39 4E B0 BB 80 0B   F9 2D 01 51 D3 A6 16 5F  ..9N.....-.Q..._
#     00A0: 70 27 9B A2 04 85 8D 34   E5 F8 2E B2 FE 4A 8C D9  p'.....4.....J..
#     00B0: 94 81 35 A4 8F 2C 43 CC   39 A7 F0 0C 56 1D D6 94  ..5..,C.9...V...
#     00C0: 09 CF E2 A4 A1 B7 9E 0E   4C D1 7B D3 0D 95 FB C0  ........L.......
#     00D0: D0 BF 47 B4 EC 24 D6 8B   D1 CF 2F 6B C4 02 34 32  ..G..$..../k..42
#     00E0: EF 76 93 57 0E 71 4B 6B   CC 92 13 07 DB E5 0A CC  .v.W.qKk........
#     00F0: FE A4 35 C5 42 A7 43 7F   81 E2 6E E9 A5 DF 35 20  ..5.B.C...n...5
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.406 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 8F 24 A2 54 BC 0D C7   33 28 BC 77 1C 9A 59 0B  ..$.T...3(.w..Y.
#     0010: A4 1A C6 13 7E AB 90 37   40 EB 68 A2 C1 11 EA A3  .......7@.h.....
#     0020: 04 70 B5 01 38 D6 D4 F5   63 61 25 3A 4E 85 82 2B  .p..8...ca%:N..+
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.408 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:05.409 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.409 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:05.410 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.410 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:05.410 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:05.410 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.411 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.413 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E 27 B6 B4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:40.000 UTC",
#       "not  after"         : "2023-12-26 10:51:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 7E C6 26 48 80 9A EE   71 AC 8D 5A 17 2D 3F FC  ...&H...q..Z.-?.
#           0010: 17 9B C3 76                                        ...v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 47 DD B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:34.000 UTC",
#       "not  after"         : "2023-12-26 10:51:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#           0010: 7F 87 DF D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.440 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 23 BB 3C 64 BB E5 81 50   78 45 3A 6B B8 55 C8 0B  #.<d...PxE:k.U..
#     0010: CA B2 01 AB 48 A7 83 23   B6 A2 D2 4C A1 57 91 55  ....H..#...L.W.U
#     0020: 75 E9 A1 0B AB 54 09 FD   FA 9B 93 5B 0B D1 F7 A2  u....T.....[....
#     0030: F4 D6 7C AA CF 45 81 AD   F7 6C 16 90 78 FC 55 47  .....E...l..x.UG
#     0040: 71 EF D9 B4 43 19 92 EA   AE 5A 7B B7 D1 3B DB E3  q...C....Z...;..
#     0050: F5 00 D0 89 D9 16 F4 D4   FB F9 FC EC 1B 0C 28 2D  ..............(-
#     0060: 80 96 F0 79 89 96 CC 57   40 3B 32 6E 7B B7 54 67  ...y...W@;2n..Tg
#     0070: 84 1C F9 AA 6B E5 5D CF   C0 80 9F 04 53 7A 7E FF  ....k.].....Sz..
#     0080: D9 EB DC 58 FA 3F 41 85   BF FB 54 18 41 65 34 B7  ...X.?A...T.Ae4.
#     0090: B1 14 6A 0C 8A 30 A6 4A   B0 B8 42 9E DA 9C CD B9  ..j..0.J..B.....
#     00A0: BD EE 65 96 EC BA 31 DF   AD 9B CF 6F 3D CF CE 65  ..e...1....o=..e
#     00B0: 7B 2B E5 83 13 42 F2 2E   F1 9D AB 94 50 CE 71 83  .+...B......P.q.
#     00C0: FA 8E 34 6A 5B BA 09 11   44 AB BE DA D8 2E 24 3E  ..4j[...D.....$>
#     00D0: 2B 14 30 2C BC 75 5D 31   D0 0B CB B9 9D B7 47 C1  +.0,.u]1......G.
#     00E0: 77 86 9D E6 4D F4 08 C9   BA BF 94 C8 98 1E 6E F1  w...M.........n.
#     00F0: 0A 2F 3D BB 8B BF 3B EF   4E FA FD A4 CF 82 82 A0  ./=...;.N.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.441 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 C1 93 EE 80 ED 06 15   14 78 1C A4 78 13 1E C2  .........x..x...
#     0010: A0 A9 C4 47 BC 82 42 32   85 B4 FB 35 FE B1 18 A8  ...G..B2...5....
#     0020: F4 68 10 A4 63 EB 39 2C   2E 15 72 CD 37 48 C5 14  .h..c.9,..r.7H..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.441 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:05.495 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "59 BA E2 8F 0A 89 EE 02 81 11 A6 BE 3F 7C 65 9C D0 5E D0 42 3B E9 65 51 CE 5E 0E B9 85 DC 29 9F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 10:52:05.763 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 10:52:05.764 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 10:52:06.707; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 10:52:06.712; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 10:52:07.099; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 10:52:07.102; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 10:52:07.102; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-60JUsK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:07.134 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E 27 B6 B4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:40.000 UTC",
#     "not  after"         : "2023-12-26 10:51:40.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 7E C6 26 48 80 9A EE   71 AC 8D 5A 17 2D 3F FC  ...&H...q..Z.-?.
#         0010: 17 9B C3 76                                        ...v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:07.139 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B 2F 37 BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:32.000 UTC",
#     "not  after"         : "2023-12-26 10:51:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:07.154 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:07.500 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:07.501 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:07.501 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:52:07.501 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:07.632 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.632 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:07.634 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:07.635 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.641 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.653 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.653 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.653 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:07.656 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "85 8F 9F 8B C1 3C 27 AB 94 49 45 4D 3A DF D0 20 3C 59 0D 43 6B CF 1F E9 94 A2 06 AB A2 A9 BB 7B",
#   "session id"          : "71 AE A4 4B 36 1A 26 17 30 52 B0 58 68 15 FE D9 0F DD D1 1F BD D9 E9 6F 5E 38 83 F8 5A 54 F7 76",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 03 83 AF D6 9E 06 38 66   99 42 3D 4C A8 DA AD E5  ......8f.B=L....
#             0010: 67 A0 7E 9C 68 CC 5A CC   A4 6A 60 B6 D1 1B E0 6F  g...h.Z..j`....o
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.765 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "41 AB DB 23 3E AC 68 CC 7D 57 0F 42 99 24 A1 0A 7C 81 7A 1C 49 16 BE 72 8E D7 10 76 FB A0 C3 5D",
#   "session id"          : "71 AE A4 4B 36 1A 26 17 30 52 B0 58 68 15 FE D9 0F DD D1 1F BD D9 E9 6F 5E 38 83 F8 5A 54 F7 76",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FE 36 98 B5 63 55 8B BC   5B 0D C8 E5 CB 2E CB B1  .6..cU..[.......
#           0010: B6 6D C6 03 34 4B 8E D2   E0 D3 1E 0D D6 15 73 52  .m..4K........sR
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.765 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.765 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.766 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.767 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.768 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.768 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.769 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.770 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.771 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.780 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.781 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.783 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.786 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.787 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.787 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.787 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.787 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.787 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.788 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.788 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.790 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.790 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.790 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.791 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.792 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.792 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.792 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.795 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 3C 3F 06",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:36.000 UTC",
#       "not  after"         : "2023-12-26 10:51:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D4 95 18 CE AE 16 80 04   31 0B D6 8B 0A D6 51 5B  ........1.....Q[
#           0010: 11 A9 45 C7                                        ..E.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.796 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.887 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 47 DD B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 10:51:34.000 UTC",
#     "not  after"         : "2023-12-26 10:51:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#         0010: 7F 87 DF D8                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#         0010: 75 07 E2 8E                                        u...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.891 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 45 BF 06 F2 D0 8E 55   FC 2F D5 16 90 D9 34 B1  .E.....U./....4.
#     0010: 9C 75 B0 13 85 03 10 22   D3 F9 4D EA 10 DF D7 23  .u....."..M....#
#     0020: 6C C8 BB 6F 42 4C 95 41   AB 7F 45 1B 45 82 30 11  l..oBL.A..E.E.0.
#     0030: 62 5B 6E 62 DE 23 A3 73   F6 B1 4B 97 E9 A4 43 09  b[nb.#.s..K...C.
#     0040: 0F 6C 93 60 8A 5D 50 FF   D4 6B 48 5E CC CB EA 78  .l.`.]P..kH^...x
#     0050: 1D E2 84 8D 57 0C 47 EA   78 FD E1 17 87 59 F7 26  ....W.G.x....Y.&
#     0060: 18 7C 94 14 F5 70 8D C9   72 9C 8C 04 75 82 78 84  .....p..r...u.x.
#     0070: FB 79 21 95 16 46 33 A9   67 7A 95 E1 52 63 74 F5  .y!..F3.gz..Rct.
#     0080: 82 E7 9D 52 6B 49 A7 E5   E7 2D 4E 3F FD B1 4D 06  ...RkI...-N?..M.
#     0090: C9 51 04 25 DC E0 06 DD   39 2C 09 08 49 4D 09 E9  .Q.%....9,..IM..
#     00A0: 47 53 F8 2B 06 1A 48 57   D7 9B E9 40 D4 2B 6D 50  GS.+..HW...@.+mP
#     00B0: 9E 4C 10 17 C2 A9 74 32   F5 C5 70 42 20 7E AA 64  .L....t2..pB ..d
#     00C0: 75 C2 5F 0A B8 21 A5 C6   FE A4 B2 DB C2 0E BE 88  u._..!..........
#     00D0: 5F 7D FC 1A 13 5F EC 32   E2 CA BD 8B 9A C5 59 06  _...._.2......Y.
#     00E0: A1 F4 79 2B B4 BA B5 B7   54 EF A7 AE 5E 3E 22 05  ..y+....T...^>".
#     00F0: 87 F7 CB A9 6F 78 26 45   9C 5B CA 5B F8 E2 23 F7  ....ox&E.[.[..#.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.893 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 46 11 85 32 F9 26 26   31 2A F6 A2 34 17 3A 9E  .F..2.&&1*..4.:.
#     0010: B3 EF 44 91 29 A3 BB 2B   16 34 09 CC 4D 76 EA EE  ..D.)..+.4..Mv..
#     0020: 79 A3 AB 1F 0B 81 BB AF   62 84 EF 70 68 36 92 66  y.......b..ph6.f
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.895 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:07.896 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.896 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:07.896 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.897 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 10:52:07.897 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:07.897 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.898 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.901 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E 27 B6 B4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:40.000 UTC",
#       "not  after"         : "2023-12-26 10:51:40.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 7E C6 26 48 80 9A EE   71 AC 8D 5A 17 2D 3F FC  ...&H...q..Z.-?.
#           0010: 17 9B C3 76                                        ...v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 47 DD B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:34.000 UTC",
#       "not  after"         : "2023-12-26 10:51:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#           0010: 7F 87 DF D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.926 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 AC 4D 4F 7B 48 EA 3F   FA 9A AA C7 52 67 17 8B  ..MO.H.?....Rg..
#     0010: E5 06 5D 20 F3 D8 8E 54   21 97 8F B4 A5 AB 01 33  ..] ...T!......3
#     0020: 66 4B 4A 16 73 94 1C E2   7C 50 90 7E 78 65 F6 B2  fKJ.s....P..xe..
#     0030: 1B B5 7C 1C E7 0F E9 D4   1C 07 A1 87 54 3A BB C2  ............T:..
#     0040: 84 50 8C 74 75 08 BB AF   7D 80 1C B9 B9 B8 30 C6  .P.tu.........0.
#     0050: 30 EE 76 96 D8 10 6B 0A   A0 66 BA 55 23 57 90 AC  0.v...k..f.U#W..
#     0060: CE 99 75 CF DB AC 54 A1   33 14 53 09 6A 35 E9 17  ..u...T.3.S.j5..
#     0070: 93 74 BE 44 94 11 7D AC   5F 7E B2 EA EA 01 A3 EE  .t.D...._.......
#     0080: 6F 0D DA 40 3E C5 F4 71   5A C9 F2 DC A0 5E 4E 6D  o..@>..qZ....^Nm
#     0090: C0 C9 DF A0 9E C3 09 D8   C1 8E F0 EB 1A 11 53 2A  ..............S*
#     00A0: 27 9B 59 04 CD 0E 81 F1   47 19 C0 6D BF E5 2D 68  '.Y.....G..m..-h
#     00B0: 71 08 57 37 F2 BE 3E 42   57 FA 10 15 C6 83 B1 65  q.W7..>BW......e
#     00C0: C1 1A A9 D5 0E 89 E4 CE   25 40 21 A2 6B 4C 8F DA  ........%@!.kL..
#     00D0: 15 99 30 5E 0C 41 76 B4   8A 46 A8 3E 58 86 17 B0  ..0^.Av..F.>X...
#     00E0: 55 B8 B0 FA 62 4C E8 2A   CE 8F 83 FF 6E 7F 8B A5  U...bL.*....n...
#     00F0: 05 98 60 FE 92 1A 4D 2C   90 F6 97 0C A2 14 C2 51  ..`...M,.......Q
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.927 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 15 56 CE 5A 45 36 85   63 F4 B0 59 FC A8 B8 22  ..V.ZE6.c..Y..."
#     0010: CC 94 2E C8 45 C1 E0 01   85 22 33 ED DA 12 D3 C2  ....E...."3.....
#     0020: C7 E8 6F 67 59 61 0D 6D   E0 A1 96 68 D0 91 47 EF  ..ogYa.m...h..G.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.928 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:07.979 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "87 6E 5D DD 69 03 EF C5 66 BE C8 EB B0 84 DF C9 2E E6 8F 13 B8 D5 A1 AC 76 E5 69 F3 66 31 A6 56",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 10:52:08.241 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 10:52:08.242 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 10:52:19.031; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:19.370 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B 2F 37 BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:32.000 UTC",
#       "not  after"         : "2023-12-26 10:51:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#           0010: 7F 87 DF D8                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 47 DD B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 10:51:34.000 UTC",
#       "not  after"         : "2023-12-26 10:51:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC C6 61 A3 E6 7C 91 0D   BF 0B 23 BB 25 DB 61 54  ..a.......#.%.aT
#           0010: 7F 87 DF D8                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 05 32 83 41 3E 40 26   1A 07 7C 8A 3F 64 2F 55  ..2.A>@&....?d/U
#           0010: 75 07 E2 8E                                        u...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 10:52:19.385 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:19.604 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:19.606 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 10:52:19.607 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.612 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.624 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.624 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.624 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 10:52:19.626 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "69 2F E6 34 7F 23 F7 74 48 88 81 27 39 9F 68 58 9D 4E 84 6B 28 B7 FD 62 B7 20 63 9C 75 B0 C1 DF",
#     "session id"          : "23 48 BE A3 79 DA B3 37 63 CF FB DE 4E E9 C5 FF BF 31 8D 30 36 17 3F FA 79 32 2F 8C 9A 57 6A 61",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7F 94 E7 97 AF 64 2D F4   ED 24 45 8D F4 C2 7D 53  .....d-..$E....S
#               0010: A9 AE 8A D4 63 21 97 83   71 5F A1 6B BC 0C 28 42  ....c!..q_.k..(B
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.648 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3B 77 7B 5B C3 CF 4C D1 46 1D 72 95 BF 22 BA 58 30 91 57 C3 3E F0 00 69 52 AC 9B 31 29 E7 C4 49",
#     "session id"          : "23 48 BE A3 79 DA B3 37 63 CF FB DE 4E E9 C5 FF BF 31 8D 30 36 17 3F FA 79 32 2F 8C 9A 57 6A 61",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 30 FE 63 0C D4 16 A9   55 0D 3C 61 4A A6 5F 16  h0.c....U.<aJ._.
#             0010: 2A 8C 4E 61 DB 44 E5 41   52 7F EA 60 99 12 D4 04  *.Na.D.AR..`....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.648 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.648 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.650 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.652 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.652 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:19.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:19.654 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.661 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.663 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.664 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.667 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.667 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:52:19.668 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 10:52:19.670 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 10:53:42.272 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:53:42.320 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:53:42.321 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:53:42.321 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 10:53:42.321 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33140/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28321ms
ok 65 stop command for single port in 31016ms
ok 66 status detects locally running solr in 14618ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2166ms
ok 69 copying files around in 6485ms
ok 70 upconfig in 2601ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1233ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1218ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m58.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5553 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5553/

1 tests failed.
FAILED:  org.apache.solr.client.solrj.io.stream.StreamingTest.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 2 object(s) that were not released!!! [Input, Input]
org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:683)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:643)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

 expected null, but was:<ObjectTracker found 2 object(s) that were not released!!! [Input, Input]
org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:683)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:643)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

>

Stack Trace:
java.lang.AssertionError: ObjectTracker found 2 object(s) that were not released!!! [Input, Input]
org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:683)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:643)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

 expected null, but was:<ObjectTracker found 2 object(s) that were not released!!! [Input, Input]
org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:683)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.eclipse.jetty.client.util.InputStreamResponseListener$Input:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.eclipse.jetty.client.util.InputStreamResponseListener$Input
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener$ObjectReleaseTrackedInputStream.<init>(Http2SolrClient.java:1495)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$InputStreamReleaseTrackingResponseListener.getInputStream(Http2SolrClient.java:1489)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:532)
	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
	at org.apache.solr.client.solrj.io.stream.SolrStream.constructParser(SolrStream.java:304)
	at org.apache.solr.client.solrj.io.stream.SolrStream.open(SolrStream.java:129)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:539)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream$StreamOpener.call(CloudSolrStream.java:527)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.submit(AbstractExecutorService.java:140)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.lambda$openStreams$8(CloudSolrStream.java:419)
	at java.base/java.util.stream.ReferencePipeline$3$1.accept(ReferencePipeline.java:195)
	at java.base/java.util.ArrayList$ArrayListSpliterator.forEachRemaining(ArrayList.java:1655)
	at java.base/java.util.stream.AbstractPipeline.copyInto(AbstractPipeline.java:484)
	at java.base/java.util.stream.AbstractPipeline.wrapAndCopyInto(AbstractPipeline.java:474)
	at java.base/java.util.stream.ReduceOps$ReduceOp.evaluateSequential(ReduceOps.java:913)
	at java.base/java.util.stream.AbstractPipeline.evaluate(AbstractPipeline.java:234)
	at java.base/java.util.stream.ReferencePipeline.collect(ReferencePipeline.java:578)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.openStreams(CloudSolrStream.java:420)
	at org.apache.solr.client.solrj.io.stream.CloudSolrStream.open(CloudSolrStream.java:292)
	at org.apache.solr.client.solrj.io.stream.ExceptionStream.open(ExceptionStream.java:52)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.getTuple(StreamingTest.java:2895)
	at org.apache.solr.client.solrj.io.stream.StreamingTest.testExceptionStream(StreamingTest.java:643)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

>
	at __randomizedtesting.SeedInfo.seed([914B616585197797]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotNull(Assert.java:756)
	at org.junit.Assert.assertNull(Assert.java:738)
	at org.apache.solr.SolrTestCase$1.afterIfSuccessful(SolrTestCase.java:100)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:37)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2370 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.client.solrj.io.stream.StreamingTest.classMethod (:solr:solrj-streaming)
    Test output: /tmp/src/solr/solr/solrj-streaming/build/test-results/test/outputs/OUTPUT-org.apache.solr.client.solrj.io.stream.StreamingTest.txt
    Reproduce with: gradlew :solr:solrj-streaming:test --tests "org.apache.solr.client.solrj.io.stream.StreamingTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=914B616585197797 -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:solrj-streaming:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj-streaming/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 6m 8s
643 actionable tasks: 626 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 6m33s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5552 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5552/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36177/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-27 07:06:34.158; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 07:06:34.163; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-27 07:06:35.080; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-27 07:06:35.118; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22864ms
ok 61 start solr with client truststore and security manager in 25267ms
not ok 62 start solr with mTLS needed in 57085ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-J6Hcob/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36177.
#
# Started Solr server on port 36177 (pid=202628). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36178.
#
# Started Solr server on port 36178 (pid=203052). Happy searching!
#
# INFO  - 2023-09-27 07:07:58.386; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 07:07:58.392; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 07:07:58.769; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 07:07:58.772; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 07:07:58.772; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:07:58.804 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 45 8B 37",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:34.000 UTC",
#     "not  after"         : "2023-12-26 07:07:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 07 95 58 30 9A 1D 4F   2C 99 1F 55 D4 F2 3D 24  ...X0..O,..U..=$
#         0010: B6 D9 96 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:07:58.808 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 70 33 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:26.000 UTC",
#     "not  after"         : "2023-12-26 07:07:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:07:58.823 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:07:58.915 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:07:58.915 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:07:58.916 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:07:58.916 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:07:59.063 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.064 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:07:59.066 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:07:59.066 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.072 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.084 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.085 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.085 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:07:59.087 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3A 8C EB C6 26 56 A4 A3 BF 23 CD 32 CB AC 17 DC 70 2D 40 9B 1A 10 A8 00 5C 47 7A C5 6F 10 B4 F4",
#   "session id"          : "87 66 BB F4 F2 50 F1 FD DA FF D4 08 CB 5F D1 BC 22 C1 A6 C1 16 9F 2D A4 E2 CE E1 79 13 84 BF D9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 CC 2A 04 46 04 5C 7A   80 32 60 CC E4 99 5A 38  ..*.F.\z.2`...Z8
#             0010: CA 7E E2 17 CE 92 4C BF   F3 10 DF 16 0B 05 78 33  ......L.......x3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.199 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 1B A8 EA 8B 9C DF 24 09 C5 20 ED B4 B2 97 1E 6E 5F 5B F1 C6 89 BC 68 07 BB F2 72 F9 04 43 A9",
#   "session id"          : "87 66 BB F4 F2 50 F1 FD DA FF D4 08 CB 5F D1 BC 22 C1 A6 C1 16 9F 2D A4 E2 CE E1 79 13 84 BF D9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4A 6B DF 53 AA B2 03 D4   73 C2 57 2F 70 04 9D 74  Jk.S....s.W/p..t
#           0010: 65 F7 C6 9E BE DC 98 BE   0F 2D 72 EE A1 41 3D 69  e........-r..A=i
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.199 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.200 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.201 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.202 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.203 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.203 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.204 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.205 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.212 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.214 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.215 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.219 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.219 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.219 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.219 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.220 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.222 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.222 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.222 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.222 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.223 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.224 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.224 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.227 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 61 69 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:30.000 UTC",
#       "not  after"         : "2023-12-26 07:07:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 C8 77 A8 1B 06 F9 D2   66 C2 D5 9F A3 53 D6 7F  T.w.....f....S..
#           0010: E7 01 AF 4A                                        ...J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.227 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.308 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.312 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 C2 D5 81 AE 1E BF F0   A6 87 3C 39 4C 67 DC 34  0.........<9Lg.4
#     0010: FA 23 0B 68 66 36 6F 93   5B F1 DE F4 8B 7D 8B 42  .#.hf6o.[......B
#     0020: AA C5 A8 D6 F4 EC 21 92   24 70 4E 2C 44 EC 5A E2  ......!.$pN,D.Z.
#     0030: 30 FF 6C 4E FD 50 B3 BB   6D E3 1E 99 DC A5 FE 1B  0.lN.P..m.......
#     0040: BB 68 19 C9 8D 64 FC 09   44 D1 2F 9B 69 F4 17 30  .h...d..D./.i..0
#     0050: 98 47 EE 12 6E 32 74 13   3B AE EE 2C 11 3D 61 F5  .G..n2t.;..,.=a.
#     0060: 7F 55 D3 7D 59 C9 01 69   04 B8 F9 EC 4C D0 61 CB  .U..Y..i....L.a.
#     0070: CF 38 4B BF 1F 3A 16 A4   6E 3D D5 A5 0C 16 97 11  .8K..:..n=......
#     0080: 7B CC 39 3C F2 5C D8 D4   6A F0 64 EF BE 1D 2A FB  ..9<.\..j.d...*.
#     0090: 79 DF 53 CA CF AC CB 99   8D BE 5D 9E 5A 61 3D 8C  y.S.......].Za=.
#     00A0: A3 2E EE A6 BB 40 66 3E   98 20 64 FD 19 99 02 3A  .....@f>. d....:
#     00B0: 03 02 AB 5F BF 2F 81 92   1C 6B 3E 4D 3C CE 3E AF  ..._./...k>M<.>.
#     00C0: EB 66 F2 5E 70 5C 35 19   3E 97 FC 4D F4 75 56 9B  .f.^p\5.>..M.uV.
#     00D0: E4 D5 36 B9 B6 F0 80 0C   8F 0B F3 95 32 22 83 75  ..6.........2".u
#     00E0: D5 F2 38 02 5D E8 CD 8E   A0 53 54 BA 91 B5 C9 54  ..8.]....ST....T
#     00F0: DA 74 F0 0B 61 A2 18 48   60 4B 73 BF C9 A3 3F DC  .t..a..H`Ks...?.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.314 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 34 D9 86 A0 C8 F3 BD   68 44 57 FF 29 49 35 9E  .4......hDW.)I5.
#     0010: 37 75 D3 77 00 A6 22 5F   80 BE F6 30 7F 41 CF A1  7u.w.."_...0.A..
#     0020: 4D 14 EA 07 6C AC 16 58   4A 74 8F FF D7 00 E6 9D  M...l..XJt......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.317 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:07:59.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:07:59.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.319 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:07:59.319 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:07:59.319 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.319 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.322 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 45 8B 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:34.000 UTC",
#       "not  after"         : "2023-12-26 07:07:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 07 95 58 30 9A 1D 4F   2C 99 1F 55 D4 F2 3D 24  ...X0..O,..U..=$
#           0010: B6 D9 96 40                                        ...@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 6C 16 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:28.000 UTC",
#       "not  after"         : "2023-12-26 07:07:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#           0010: 65 A8 6D 05                                        e.m.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.347 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 3F D8 2C CC A3 89 13   51 9F A4 B7 5E A6 5E 33  .?.,....Q...^.^3
#     0010: 9D D9 84 FA 9B 0D D9 C4   5D F7 68 D3 D2 5A D9 86  ........].h..Z..
#     0020: EF 46 A0 8B D2 98 54 FB   0F 75 29 86 F3 E9 88 3D  .F....T..u)....=
#     0030: B9 04 31 07 11 C6 6C 4C   18 A4 D4 93 FF 2B 13 FA  ..1...lL.....+..
#     0040: 0D 05 72 D6 8B 2E 9A 8F   8A 82 0B 19 55 46 D6 59  ..r.........UF.Y
#     0050: 12 0B A8 A0 3B 2C CC 25   41 08 06 42 54 C4 06 26  ....;,.%A..BT..&
#     0060: AE 0A C5 93 5F 16 69 77   1C 3B B4 E0 43 65 FC 41  ...._.iw.;..Ce.A
#     0070: 4B 18 6C D5 A8 DE A7 E1   62 93 3A 2C DB 5D 5F 6D  K.l.....b.:,.]_m
#     0080: C4 32 8B 8F 05 00 82 31   02 53 16 2F 26 32 AF DB  .2.....1.S./&2..
#     0090: 9D 2A 29 7B 20 B0 92 D8   56 45 3B E5 E7 7F 25 BD  .*). ...VE;...%.
#     00A0: B0 BD F5 F5 91 ED 83 2E   68 B7 3D EE 12 A8 59 41  ........h.=...YA
#     00B0: 82 BC 87 C2 4C F4 DF 0D   3D 8B 97 76 79 11 05 C5  ....L...=..vy...
#     00C0: 4C D8 88 18 E5 4C B4 6F   3D DD C9 AD E6 A7 C6 AF  L....L.o=.......
#     00D0: 67 0F 1F C0 EB 40 56 66   5C CB AA B1 88 1A CF 84  g....@Vf\.......
#     00E0: D7 C1 1D 46 D1 73 09 09   15 BF A5 A9 C0 FF 60 23  ...F.s........`#
#     00F0: 66 23 A0 93 07 F4 E7 6A   12 B5 BF 32 09 66 A6 1D  f#.....j...2.f..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.348 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 05 49 C8 2B 63 06 67 D8   41 78 97 DB 4C BC 54 01  .I.+c.g.Ax..L.T.
#     0010: 01 3C D6 88 9A 47 50 B0   AE 15 A0 0E 01 C6 40 A8  .<...GP.......@.
#     0020: BB 5E 45 40 14 E0 97 F7   E1 13 4E 8B 96 04 6E CD  .^E@......N...n.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.348 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:07:59.400 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A0 F7 7F 7C 9D 3C E2 45 A6 80 D8 47 D0 2B 65 2E 6B 04 53 27 A9 BE DE 39 2A C3 EB FE 66 57 47 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 07:07:59.687 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 07:07:59.688 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-27 07:08:00.612; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-27 07:08:00.618; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-27 07:08:00.994; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604c5de8(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 07:08:00.997; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-27 07:08:00.998; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(ca,h=[localhost],a=[],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-J6Hcob/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:08:01.030 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 45 8B 37",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:34.000 UTC",
#     "not  after"         : "2023-12-26 07:07:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 07 95 58 30 9A 1D 4F   2C 99 1F 55 D4 F2 3D 24  ...X0..O,..U..=$
#         0010: B6 D9 96 40                                        ...@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:08:01.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 70 33 79",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:26.000 UTC",
#     "not  after"         : "2023-12-26 07:07:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-27 07:08:01.049 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:08:01.160 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:08:01.160 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:08:01.160 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:08:01.160 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:01.304 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:01.307 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:01.307 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.313 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.324 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.324 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.324 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:01.327 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "28 48 72 D9 97 35 56 4F 4E 6F 01 B0 94 4A 39 DD F3 26 DD 0D 6F 4B FA 6B 44 C5 E3 0A 0A ED D4 D2",
#   "session id"          : "83 3B 29 12 BF FC BE AC D8 59 C8 CA 12 79 A0 1E 36 C3 79 2B 55 C2 61 34 C6 0B B6 EC C4 75 6A 84",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 43 2C 36 82 75 83 26 7F   63 DA BE BB 8C 9F D3 5F  C,6.u.&.c......_
#             0010: AB 8A DB 58 6E CC 49 EB   FC 73 9E 72 41 DE 92 11  ...Xn.I..s.rA...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.449 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "05 B7 B2 E7 F5 48 09 A4 79 C8 31 F4 3C 5B 81 FF 27 2E 84 F9 81 1C 19 05 FE 7C B2 A7 47 9C 54 E5",
#   "session id"          : "83 3B 29 12 BF FC BE AC D8 59 C8 CA 12 79 A0 1E 36 C3 79 2B 55 C2 61 34 C6 0B B6 EC C4 75 6A 84",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 37 5C 3C 69 59 42 5B B3   00 CA CB 7E 79 E9 1F 3F  7\<iYB[.....y..?
#           0010: 65 62 A9 E2 20 D7 BD 00   E1 78 43 3B AB 19 FA 34  eb.. ....xC;...4
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.450 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.454 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.454 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.455 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.456 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.456 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.463 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.464 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.465 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.469 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.469 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.469 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.472 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.472 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.473 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.473 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.474 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.474 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.477 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 61 69 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:30.000 UTC",
#       "not  after"         : "2023-12-26 07:07:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 C8 77 A8 1B 06 F9 D2   66 C2 D5 9F A3 53 D6 7F  T.w.....f....S..
#           0010: E7 01 AF 4A                                        ...J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.477 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.557 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "40 6C 16 C4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-27 07:07:28.000 UTC",
#     "not  after"         : "2023-12-26 07:07:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#         0010: 65 A8 6D 05                                        e.m.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#         0010: F2 EA 18 FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.561 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 47 F8 32 76 C4 F3 99   21 17 76 40 5F 26 3C AE  uG.2v...!.v@_&<.
#     0010: F3 EF 06 A4 51 17 7D DD   39 C0 4E 7D 24 83 48 1B  ....Q...9.N.$.H.
#     0020: F9 DA FA 05 6F C3 91 9D   9F 73 ED FE EB 79 18 FC  ....o....s...y..
#     0030: BB E2 FC D4 A3 EE 75 1E   7B A0 A7 BF 4E 76 FA 70  ......u.....Nv.p
#     0040: C1 69 24 6C 62 A0 6F 84   3D 17 DB CF C9 AB 15 6A  .i$lb.o.=......j
#     0050: 7C 43 90 15 5A 2E D0 01   71 CD 85 1A 3D 8C C6 96  .C..Z...q...=...
#     0060: 46 64 23 90 FE 35 FD CB   54 A5 EF D3 F4 36 DF 9E  Fd#..5..T....6..
#     0070: 8F C6 4A A6 FF D3 E2 43   5C D1 26 33 B7 77 0D 90  ..J....C\.&3.w..
#     0080: 96 8A 45 DC 2E D4 3D 98   F8 2B 2C 9A 79 91 BB 98  ..E...=..+,.y...
#     0090: B3 26 E3 D7 16 2B E8 3B   29 59 27 6F 45 72 84 25  .&...+.;)Y'oEr.%
#     00A0: 73 1E 6A 5C A0 D1 E5 44   16 6E 81 08 07 18 C7 6E  s.j\...D.n.....n
#     00B0: 04 2F 64 FD 86 AC 4F CD   1A D9 BF 8A AD C9 95 60  ./d...O........`
#     00C0: 00 DA FB 7B 25 71 2C EA   E3 3A E8 DC 44 B5 40 A8  ....%q,..:..D.@.
#     00D0: DC CC 82 17 94 9A 70 C5   AD 1A 90 93 2E 95 3C 04  ......p.......<.
#     00E0: 5B E1 18 22 7C 2A E4 B6   89 4C AB E5 0A F4 B0 D7  [..".*...L......
#     00F0: 89 7D 2A E9 A9 3B 70 49   3F A3 FC 31 01 AE 56 3E  ..*..;pI?..1..V>
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.562 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 AE F0 80 76 50 C2 59   BC EC 89 BC 46 6E 0C CF  ....vP.Y....Fn..
#     0010: D7 51 15 2B 08 BD F7 67   1A C3 41 C0 16 BA B9 8D  .Q.+...g..A.....
#     0020: 7E 0E 9F 27 16 98 8D B6   88 C7 F9 00 27 07 4A B7  ...'........'.J.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.565 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:08:01.566 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.566 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:08:01.566 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.566 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-27 07:08:01.567 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:01.567 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.567 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.570 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 45 8B 37",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:34.000 UTC",
#       "not  after"         : "2023-12-26 07:07:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 07 95 58 30 9A 1D 4F   2C 99 1F 55 D4 F2 3D 24  ...X0..O,..U..=$
#           0010: B6 D9 96 40                                        ...@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 6C 16 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:28.000 UTC",
#       "not  after"         : "2023-12-26 07:07:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#           0010: 65 A8 6D 05                                        e.m.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.595 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 DE EF E5 6C FB 98 2D   2E B5 50 97 B6 EE E0 4B  F...l..-..P....K
#     0010: F0 24 CE D2 57 95 21 F8   E6 77 C5 DD 3D F1 0D 7A  .$..W.!..w..=..z
#     0020: 52 19 37 2C 36 6E 72 C5   13 5B 72 4D B5 E2 E3 C1  R.7,6nr..[rM....
#     0030: 19 A5 34 5F 53 C6 4E 29   FD EB D6 78 25 62 74 6C  ..4_S.N)...x%btl
#     0040: 1A 77 B4 19 2D 30 BB C6   0D 09 3D 22 C6 06 39 20  .w..-0....="..9
#     0050: 7D 9B 5B 17 D0 A0 60 C3   52 AF A7 3E 61 F8 BB 90  ..[...`.R..>a...
#     0060: 53 9F 33 EA C7 E6 BA E4   5E 38 42 72 FE 8F 12 91  S.3.....^8Br....
#     0070: FF B2 2B EE 76 79 97 88   EB 26 97 2C 40 20 6F 91  ..+.vy...&.,@ o.
#     0080: 4F 81 C4 7D C0 EC C5 8E   D7 91 2A C0 88 8A A7 6E  O.........*....n
#     0090: 10 4E 3B 5B 01 1D 0B 53   B9 CD 04 CD B6 15 BC 3A  .N;[...S.......:
#     00A0: 88 7E E5 5D 4B 53 5D 07   65 5A 32 39 C7 D3 33 28  ...]KS].eZ29..3(
#     00B0: F8 11 55 44 5D 8A 51 A9   0C D2 4C C7 FF CC 31 5E  ..UD].Q...L...1^
#     00C0: EB 69 F4 9E E0 DD 0D BD   09 E8 6E 9C 0D 11 2D E8  .i........n...-.
#     00D0: D5 76 7F E7 68 3F 72 C3   DC F0 AC 01 77 0E F1 6C  .v..h?r.....w..l
#     00E0: AE EB E0 A5 C3 B2 E8 2A   88 87 24 2B 13 F2 0B DD  .......*..$+....
#     00F0: 6C A4 18 57 A3 09 84 86   B4 F4 CD 2D F1 4A 9F 21  l..W.......-.J.!
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.596 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CE 59 4C 87 B0 5D 89 69   5B ED 42 C7 1E 44 5C 44  .YL..].i[.B..D\D
#     0010: B3 A3 AA 8F 77 78 4A 01   BF 8A 30 D2 BF 99 E6 FA  ....wxJ...0.....
#     0020: EB 41 43 5C 45 CE 97 D6   F9 0E 4C 5B 59 16 17 04  .AC\E.....L[Y...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.597 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:01.646 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "44 24 76 C5 20 72 95 03 7A 3C F4 B7 12 BE F8 67 AC A4 D7 06 C4 F5 F4 DA 40 D9 4A 18 17 6E 3D 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-27 07:08:01.933 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-27 07:08:01.934 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-27 07:08:13.499; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-27 07:08:13.829 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 70 33 79",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:26.000 UTC",
#       "not  after"         : "2023-12-26 07:07:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#           0010: 65 A8 6D 05                                        e.m.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 6C 16 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-27 07:07:28.000 UTC",
#       "not  after"         : "2023-12-26 07:07:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 28 D3 97 91 A2 82 8C 45   13 85 27 F0 6D DC 30 8A  (......E..'.m.0.
#           0010: 65 A8 6D 05                                        e.m.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 62 C6 C7 DE E7 8E 23   9E 1D 9C 2E 77 7E 46 1C  5b.....#....w.F.
#           0010: F2 EA 18 FB                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-27 07:08:13.848 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:14.119 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.120 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:14.122 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-27 07:08:14.122 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.141 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-27 07:08:14.144 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3E 53 32 18 2A 27 69 E2 93 98 B5 15 32 A8 1A 82 E9 2A 11 27 E9 40 22 D1 F6 DD F2 F2 CA AC 28 37",
#     "session id"          : "7F 5A BC 53 4C 37 C9 A8 2D 15 6E EB C9 B4 63 16 B0 57 11 B9 42 0A AF 75 99 04 1A C2 81 E5 1B F2",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E6 98 69 6F 8B 4A 93 8C   7B 77 F1 E5 A4 1C AB D6  ..io.J...w......
#               0010: F8 57 D4 7C 05 05 88 40   D6 A4 0D 00 F3 C7 5E 34  .W.....@......^4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.164 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "7A E6 42 6D DD 8B C6 14 26 A2 F7 6B 6E 39 3F CB 0B 24 CC A0 2E EF F9 42 B2 41 66 8E 36 68 86 9C",
#     "session id"          : "7F 5A BC 53 4C 37 C9 A8 2D 15 6E EB C9 B4 63 16 B0 57 11 B9 42 0A AF 75 99 04 1A C2 81 E5 1B F2",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BB 26 D6 43 AF 16 39 BB   4E F0 A2 A6 6F 8A F2 31  .&.C..9.N...o..1
#             0010: 72 E7 98 9F 24 68 28 0A   4A 3D 71 27 56 98 9E 2D  r...$h(.J=q'V..-
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.165 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.165 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.166 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.167 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.169 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.169 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.170 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.170 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.180 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.182 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.183 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.186 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.187 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:14.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:08:14.188 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-27 07:08:14.189 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificat

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-27 07:09:33.438 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:09:33.497 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:09:33.498 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:09:33.498 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-27 07:09:33.498 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36178/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28180ms
ok 65 stop command for single port in 31027ms
ok 66 status detects locally running solr in 14339ms
ok 67 status does not expose cli parameters to end user in 207ms
ok 68 listing out files in 2200ms
ok 69 copying files around in 6500ms
ok 70 upconfig in 2597ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 53s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m16.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5551 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5551/

3 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([F11CF1D6FC399DAD:C68705C8C4F54009]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.renewDelegationToken(TestSolrCloudWithDelegationTokens.java:136)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.verifyDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:346)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:365)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.ltr.feature.TestNoMatchSolrFeature.test1NoMatchFeatureReturnsFvWith1MatchingFeatureFromStoreAndDocWith0Score

Error Message:
java.lang.Exception: Test abandoned because suite timeout was reached.

Stack Trace:
java.lang.Exception: Test abandoned because suite timeout was reached.
	at __randomizedtesting.SeedInfo.seed([F11CF1D6FC399DAD]:0)


FAILED:  org.apache.solr.ltr.feature.TestNoMatchSolrFeature.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([F11CF1D6FC399DAD]:0)




Build Log:
[...truncated 2475 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.ltr.feature.TestNoMatchSolrFeature.test1NoMatchFeatureReturnsFvWith1MatchingFeatureFromStoreAndDocWith0Score (:solr:modules:ltr)
    Test output: /tmp/src/solr/solr/modules/ltr/build/test-results/test/outputs/OUTPUT-org.apache.solr.ltr.feature.TestNoMatchSolrFeature.txt
    Reproduce with: gradlew :solr:modules:ltr:test --tests "org.apache.solr.ltr.feature.TestNoMatchSolrFeature.test1NoMatchFeatureReturnsFvWith1MatchingFeatureFromStoreAndDocWith0Score" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F11CF1D6FC399DAD -Ptests.file.encoding=US-ASCII

  - org.apache.solr.ltr.feature.TestNoMatchSolrFeature.classMethod (:solr:modules:ltr)
    Test output: /tmp/src/solr/solr/modules/ltr/build/test-results/test/outputs/OUTPUT-org.apache.solr.ltr.feature.TestNoMatchSolrFeature.txt
    Reproduce with: gradlew :solr:modules:ltr:test --tests "org.apache.solr.ltr.feature.TestNoMatchSolrFeature.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F11CF1D6FC399DAD -Ptests.file.encoding=US-ASCII

  - org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F11CF1D6FC399DAD -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:hadoop-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hadoop-auth/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:modules:ltr:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/ltr/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 2h 1m 54s
629 actionable tasks: 612 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 2h2m21s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5550 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5550/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43663/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 22:50:28.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 22:50:28.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 22:50:29.534; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 22:50:29.575; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22202ms
ok 61 start solr with client truststore and security manager in 24845ms
not ok 62 start solr with mTLS needed in 58121ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-JNF1eK/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43663.
#
# Started Solr server on port 43663 (pid=200571). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43664.
#
# Started Solr server on port 43664 (pid=200995). Happy searching!
#
# INFO  - 2023-09-26 22:51:51.589; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 22:51:51.595; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 22:51:51.984; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 22:51:51.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 22:51:51.987; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:52.019 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F A2 3B A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:27.000 UTC",
#     "not  after"         : "2023-12-25 22:51:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 C1 97 2A B1 14 1F B9   95 20 AF D8 63 51 DB 73  E..*..... ..cQ.s
#         0010: B3 EF A7 EB                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:52.023 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 8D 19 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:19.000 UTC",
#     "not  after"         : "2023-12-25 22:51:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:52.037 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:52.124 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:52.124 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:52.125 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:52.125 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:52.266 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.266 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:52.268 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:52.268 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.273 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.284 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.284 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.285 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:52.287 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4C 52 3D BE DA FE 28 E8 12 EE 32 FC 16 46 E6 83 DD C7 E9 F1 5C 95 A8 E1 1B AF 8D D1 08 B0 0A E8",
#   "session id"          : "19 4F C4 26 E4 18 82 10 DC 31 87 83 62 2E E0 0F F6 B8 F6 44 F8 EE 5F 5E C6 33 1A 10 4C F8 24 2A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C2 F5 0C 39 00 6C 49 33   07 0C B2 07 40 F8 B1 B8  ...9.lI3....@...
#             0010: 87 0D 8B A5 97 2B 82 EB   8B B3 A8 38 18 EA 5D 30  .....+.....8..]0
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.399 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C4 A4 89 7B 4A 7F C8 DD A2 C6 61 07 E0 94 1B FC FF D2 63 35 51 54 7C 8B 0B E5 D2 BC 5C 9C 5A 76",
#   "session id"          : "19 4F C4 26 E4 18 82 10 DC 31 87 83 62 2E E0 0F F6 B8 F6 44 F8 EE 5F 5E C6 33 1A 10 4C F8 24 2A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 6B 33 54 04 B8 88 3C   66 D2 4A 8C 0D A9 6E F0  .k3T...<f.J...n.
#           0010: 70 E8 E7 A9 03 17 F0 84   F8 14 A4 08 1F 71 AF 60  p............q.`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.400 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.400 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.402 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.403 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.403 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.404 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.404 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.404 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.404 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.404 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.412 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.414 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.415 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.418 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.418 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.418 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.420 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.421 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.421 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.421 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.422 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.426 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 75 B5 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:23.000 UTC",
#       "not  after"         : "2023-12-25 22:51:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 87 E1 E5 8E BA CC 0D   37 92 16 DE 92 FE 50 BB  ........7.....P.
#           0010: 1F FB E9 81                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.426 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.506 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.510 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 24 3D 94 E5 E0 E3 7B   C0 00 72 A8 B0 4A CF 84  n$=.......r..J..
#     0010: C4 96 35 98 C0 61 0C A8   10 1D 99 ED 3F 2B A2 C2  ..5..a......?+..
#     0020: F6 9D 1C C5 94 78 0B 5E   EE D1 EA C3 2D 0F 48 90  .....x.^....-.H.
#     0030: 39 87 63 C7 FD 23 2F B6   7F 79 7C 61 25 7B D8 EC  9.c..#/..y.a%...
#     0040: 9B 54 4C 33 F9 9B D0 D7   10 4D 28 02 94 46 A3 71  .TL3.....M(..F.q
#     0050: A2 35 35 F3 E9 8E 99 89   BE 2E 4E A8 A0 B2 E9 BD  .55.......N.....
#     0060: B0 AA 1B 4C 91 FE F5 DD   CC 0C 2A 3E C6 0A 2A D0  ...L......*>..*.
#     0070: 6A D1 AE DD 4D C1 FA 0D   15 2A A3 F8 C2 98 12 AA  j...M....*......
#     0080: DC E8 CD 80 41 FE 61 A9   5C 18 CE F8 DD FD DF D2  ....A.a.\.......
#     0090: 5D F5 A8 BC 54 1A 71 85   96 10 CB 53 88 EC DA 01  ]...T.q....S....
#     00A0: D2 C8 E7 4B FE F9 76 78   2D 86 8B F1 7C BD 9D 93  ...K..vx-.......
#     00B0: 70 3D B5 BB AF 49 73 D1   15 78 69 EA 43 1E 6F 0E  p=...Is..xi.C.o.
#     00C0: E6 BE D2 78 5B D5 26 11   38 6B 18 0F 95 C8 C9 C0  ...x[.&.8k......
#     00D0: F5 05 42 93 C6 45 B9 79   2A 28 50 1D 63 51 D5 56  ..B..E.y*(P.cQ.V
#     00E0: D6 CD 6F 78 80 45 C3 DF   93 F6 85 ED 58 9D BA A2  ..ox.E......X...
#     00F0: 17 CF 81 37 ED F7 D8 50   CA F3 D6 B3 FB 05 D7 7E  ...7...P........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.512 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B8 61 05 9E 2F 7A A2 92   B9 E1 68 BD 4F B0 B8 83  .a../z....h.O...
#     0010: AE F5 E0 AC BE FE F0 5C   EB 8F 5F 73 E9 6A D0 EA  .......\.._s.j..
#     0020: BB A6 20 6B FB 23 37 EF   C3 A2 C5 FD D8 63 06 6A  .. k.#7......c.j
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.514 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:52.515 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.516 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:52.516 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.516 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:52.516 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:52.517 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.517 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.520 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F A2 3B A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:27.000 UTC",
#       "not  after"         : "2023-12-25 22:51:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 C1 97 2A B1 14 1F B9   95 20 AF D8 63 51 DB 73  E..*..... ..cQ.s
#           0010: B3 EF A7 EB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 B0 3A 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:21.000 UTC",
#       "not  after"         : "2023-12-25 22:51:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#           0010: BC 18 1B F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.544 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0B 2A 5B 20 DF 52 9C 5C   59 72 79 C4 8F 50 45 D9  .*[ .R.\Yry..PE.
#     0010: BA F6 CC BD 0E 07 22 88   67 1A 19 67 0E AA B4 53  ......".g..g...S
#     0020: 4D 67 66 AF C3 FC 83 FF   21 F4 09 53 65 EF 8F C8  Mgf.....!..Se...
#     0030: 11 BC 33 26 55 1C B7 CC   E1 9A CE 65 7D C0 AC 96  ..3&U......e....
#     0040: 5E 85 B0 22 84 ED 4E 75   DB 40 06 1A C2 67 1C C9  ^.."..Nu.@...g..
#     0050: 9F 30 ED E0 C4 C5 6B 80   3A 3B 37 17 19 B2 3F C9  .0....k.:;7...?.
#     0060: 64 F7 06 63 37 B1 A4 BB   29 75 DB 93 86 1B 10 CC  d..c7...)u......
#     0070: A0 85 F6 25 97 E1 BD 36   9F 55 5E 0A C1 DE E9 93  ...%...6.U^.....
#     0080: C7 00 01 3A AD 2E 72 60   03 43 D6 E5 F4 30 7C 36  ...:..r`.C...0.6
#     0090: 31 AD CB EE 4E CD FD 29   8D 8B 93 B2 9C 11 6F 27  1...N..)......o'
#     00A0: 24 EF E6 39 03 6E 0F 95   2A F5 97 75 37 8A 21 BB  $..9.n..*..u7.!.
#     00B0: 85 E2 46 6C CC 9B 27 BF   ED 46 39 1D 95 C1 ED EB  ..Fl..'..F9.....
#     00C0: B8 81 EE 37 1A C7 E7 B3   C0 86 4E F4 E2 3F 40 16  ...7......N..?@.
#     00D0: 52 51 B3 23 28 D4 D4 83   78 02 6F B0 99 03 F9 10  RQ.#(...x.o.....
#     00E0: B5 84 B0 E5 88 B0 00 1B   6B 8F 30 C5 3C CD 2D 55  ........k.0.<.-U
#     00F0: BE D4 FF 51 48 EA CF B7   99 66 EF 7F 08 CD 81 80  ...QH....f......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.545 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D 53 C4 C7 9C 8A 0A 50   E2 28 67 EE 84 D6 C0 D3  .S.....P.(g.....
#     0010: F1 F5 BB 39 00 81 BD A4   BA 40 2F 3F C2 C7 DA BF  ...9.....@/?....
#     0020: 8D 5A 02 79 A1 0D 1F AC   F9 ED EC 1C 54 F9 E0 76  .Z.y........T..v
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:52.596 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B3 94 8D DA D4 17 20 7C 1A 95 8A 80 A7 DE AE F6 B9 19 58 42 34 6A 77 11 A1 E1 02 F3 3B 89 28 38",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 22:51:52.873 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 22:51:52.874 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 22:51:53.824; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 22:51:53.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 22:51:54.218; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 22:51:54.221; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 22:51:54.222; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-JNF1eK/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:54.254 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F A2 3B A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:27.000 UTC",
#     "not  after"         : "2023-12-25 22:51:27.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 C1 97 2A B1 14 1F B9   95 20 AF D8 63 51 DB 73  E..*..... ..cQ.s
#         0010: B3 EF A7 EB                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:54.258 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 8D 19 4E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:19.000 UTC",
#     "not  after"         : "2023-12-25 22:51:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 22:51:54.273 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:54.672 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:54.672 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:54.672 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:51:54.673 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:54.804 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:54.806 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:51:54.806 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.812 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.824 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.825 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.825 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:51:54.828 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 7A AF A2 2A 43 3F 30 49 45 F8 33 83 40 6A 90 9C 58 14 AB 57 D6 14 98 FF 4C 4C 6A E9 01 CE E6",
#   "session id"          : "34 9F 3A 59 4C 9A 18 00 37 82 D4 55 E2 EC 40 CD 47 C2 12 7B 2C DF 63 C8 F6 0E 6C 01 E6 B1 BD C7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5B B4 6C 96 BE 58 8D 63   B2 0B FA CB CD 23 40 C6  [.l..X.c.....#@.
#             0010: 62 8B 53 49 7C 5A 6F 37   AC 82 4C 0D 69 88 29 1E  b.SI.Zo7..L.i.).
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.933 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 85 E5 99 07 25 58 05 70 44 B1 83 43 D7 FE B5 72 A7 66 41 5B 52 8B 23 9E AF 45 F4 18 CE 29 7A",
#   "session id"          : "34 9F 3A 59 4C 9A 18 00 37 82 D4 55 E2 EC 40 CD 47 C2 12 7B 2C DF 63 C8 F6 0E 6C 01 E6 B1 BD C7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6D 37 8E 0C DE FA 0E D3   12 D2 7A 1C 9C 94 76 53  m7........z...vS
#           0010: 86 CF 8A C0 E7 AC 95 04   1D E7 4F 0B 53 40 B4 06  ..........O.S@..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.934 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.934 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.936 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.936 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.938 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.938 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.938 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.938 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.939 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.947 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.949 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.950 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.953 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.953 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:54.954 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:54.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.956 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.957 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.957 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.957 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.958 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.959 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:54.959 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.963 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 75 B5 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:23.000 UTC",
#       "not  after"         : "2023-12-25 22:51:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C8 87 E1 E5 8E BA CC 0D   37 92 16 DE 92 FE 50 BB  ........7.....P.
#           0010: 1F FB E9 81                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:54.964 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.046 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 B0 3A 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 22:51:21.000 UTC",
#     "not  after"         : "2023-12-25 22:51:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#         0010: BC 18 1B F2                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#         0010: 02 1F 47 D2                                        ..G.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.050 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 B2 78 C1 71 B2 B3 5C   F1 F7 91 30 D9 61 CE E0  ..x.q..\...0.a..
#     0010: A0 E3 9A A4 6A DB 7F 37   D2 B1 A2 C5 F8 D7 51 66  ....j..7......Qf
#     0020: 3C 5D 5C B1 58 0A 90 D9   C5 1A 75 76 21 B8 61 F0  <]\.X.....uv!.a.
#     0030: 07 EA 1C F2 0B 66 90 BD   FB B5 78 51 CA 82 13 12  .....f....xQ....
#     0040: 75 66 CF 43 23 2A 3B 5A   03 3C 23 8D 87 77 1B 84  uf.C#*;Z.<#..w..
#     0050: 17 D1 D0 CF 44 39 E5 CA   DA EA 72 B1 4F 3B 90 9F  ....D9....r.O;..
#     0060: 63 04 34 07 FF 0F 0E 06   91 B4 72 8D F9 E8 BD B0  c.4.......r.....
#     0070: 07 B9 B5 34 87 10 18 8D   48 91 61 AA 4B 90 D5 57  ...4....H.a.K..W
#     0080: EC 4E CF A2 5E 20 CD 42   B4 74 AA A1 B1 85 2C 71  .N..^ .B.t....,q
#     0090: B4 A9 D7 B0 E0 22 4E E6   34 03 CA E9 56 F8 0F F0  ....."N.4...V...
#     00A0: 1F B2 51 20 A4 53 BE 90   C7 78 9E EB 9C 0A 86 98  ..Q .S...x......
#     00B0: 13 70 20 AF F4 90 8E D9   C5 08 7F 89 D4 38 89 80  .p ..........8..
#     00C0: CA 20 7F BE C6 9D DA 63   57 B1 1C 4D 78 8C 98 29  . .....cW..Mx..)
#     00D0: 30 9B 94 43 4B B5 41 1B   B6 FC E6 5D 31 35 B3 5F  0..CK.A....]15._
#     00E0: 97 FA 3B 32 95 38 EF 2D   A4 44 61 23 E9 6C A8 53  ..;2.8.-.Da#.l.S
#     00F0: 61 4F 4F 3F CA FF 66 B3   94 BE 1E 4E 3E 34 C8 14  aOO?..f....N>4..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.051 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B7 19 D8 6D 0E 50 37 C4   0D BC 4D FA 92 E9 66 EE  ...m.P7...M...f.
#     0010: B6 78 4F 72 77 C2 0C 35   9A F4 83 1B 19 70 C4 9A  .xOrw..5.....p..
#     0020: 63 AA 32 62 E2 49 B2 FE   E3 34 CF C2 7F 4F E7 99  c.2b.I...4...O..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:55.055 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:55.055 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:55.055 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:55.055 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 22:51:55.055 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:51:55.056 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.056 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.060 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F A2 3B A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:27.000 UTC",
#       "not  after"         : "2023-12-25 22:51:27.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 C1 97 2A B1 14 1F B9   95 20 AF D8 63 51 DB 73  E..*..... ..cQ.s
#           0010: B3 EF A7 EB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 B0 3A 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:21.000 UTC",
#       "not  after"         : "2023-12-25 22:51:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#           0010: BC 18 1B F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.087 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 6D 59 3E 66 E9 F6 58   42 52 4D 57 01 AB DA 48  .mY>f..XBRMW...H
#     0010: 5A 9F 66 79 C8 FA BF F5   92 F7 D9 66 A0 87 3C 27  Z.fy.......f..<'
#     0020: 29 C9 08 3E 74 59 77 23   ED 5C 15 C8 38 E7 8C 68  )..>tYw#.\..8..h
#     0030: E0 8B 2A 9E 49 CF 43 8F   DB BB A1 58 28 A3 3D E5  ..*.I.C....X(.=.
#     0040: 54 38 0D 95 80 AB EF FA   D1 9D 20 96 56 47 94 EB  T8........ .VG..
#     0050: 98 EA 5C B9 14 EA 27 8C   2B F5 06 FC 62 88 70 10  ..\...'.+...b.p.
#     0060: A2 F8 9F 69 09 DB 46 B2   F7 7B 6C 0C 56 35 AC 3D  ...i..F...l.V5.=
#     0070: 5E 16 91 93 3A 8C 83 FA   9E E4 86 47 7E AF B2 E3  ^...:......G....
#     0080: AF 22 E1 EE 2C 27 27 D5   B8 AE 33 DC 50 B0 3F 8A  ."..,''...3.P.?.
#     0090: 52 14 56 E1 3C 59 0B 15   41 BC 8D 7C 3E F6 03 CE  R.V.<Y..A...>...
#     00A0: 7D 0E 05 8A E9 1C BC 49   55 B5 CB 63 67 EB FC 23  .......IU..cg..#
#     00B0: A7 5F 92 CF 0C F1 01 F7   91 22 DA 89 76 C1 30 20  ._......."..v.0
#     00C0: A8 7A A3 2D 3A 1D 76 5C   CB 5A 80 00 29 50 36 B2  .z.-:.v\.Z..)P6.
#     00D0: 56 51 64 F3 B3 58 E7 9F   BC 23 80 F7 F1 96 22 DB  VQd..X...#....".
#     00E0: 49 26 6C 0F FA 26 DC A4   97 FD 49 7A C6 4F 33 06  I&l..&....Iz.O3.
#     00F0: 0A 52 43 40 0F 83 69 DF   78 07 1F 15 92 1E 9C 73  .RC@..i.x......s
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.088 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C7 15 97 03 A2 66 BA BF   17 3F A9 B0 71 42 6C 35  .....f...?..qBl5
#     0010: 76 DE D3 A1 3B 7A D5 62   44 CA FC CC EE 5B 64 EA  v...;z.bD....[d.
#     0020: F4 2E 8A 92 C3 F8 39 78   17 9F 92 85 28 5A 04 03  ......9x....(Z..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.089 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:51:55.146 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AD 3C 12 47 F5 06 4E 0F 83 5C 96 C4 DD B0 47 32 BB 25 CF B3 12 63 DF 12 8D 71 06 05 F3 C9 9C 06",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 22:51:55.460 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 22:51:55.461 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 22:52:05.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 22:52:06.332 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 B0 3A 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:21.000 UTC",
#       "not  after"         : "2023-12-25 22:51:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#           0010: BC 18 1B F2                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B5 07 C3 64 CC 7C 6A AC   08 3B F3 F3 B8 95 EF 06  ...d..j..;......
#           0010: 02 1F 47 D2                                        ..G.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 8D 19 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 22:51:19.000 UTC",
#       "not  after"         : "2023-12-25 22:51:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 02 B4 8A DE 4C 54 63   39 1C B0 68 E2 77 1A E3  :....LTc9..h.w..
#           0010: BC 18 1B F2                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 22:52:06.348 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:52:06.580 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:52:06.581 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 22:52:06.582 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.587 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.599 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.599 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 22:52:06.602 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "93 12 D5 E7 6D BC 7B 82 AD 6C A8 77 7E B3 6A 5D 50 BB 57 7E 32 75 35 9B 4A B7 73 CC E2 E7 55 9B",
#     "session id"          : "FB ED 8F 13 8A EF 49 C3 5B 7E 1D 84 24 BE 54 17 0D C2 9E 43 06 84 E7 DB AC ED 75 B4 8A 5A 2E C0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AB B7 47 51 CF AD 95 2E   E2 06 4A B9 67 44 2C 05  ..GQ......J.gD,.
#               0010: 90 02 AD 68 AD 2A E6 3E   C6 FE C8 4A 4F C1 31 39  ...h.*.>...JO.19
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.621 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5F 1A C4 96 26 BC 28 15 55 F5 DD 35 BE 14 B4 2A D6 68 0D 1B 38 08 47 52 1E 29 C4 20 20 7F 60 DA",
#     "session id"          : "FB ED 8F 13 8A EF 49 C3 5B 7E 1D 84 24 BE 54 17 0D C2 9E 43 06 84 E7 DB AC ED 75 B4 8A 5A 2E C0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8A 6B E8 D2 E3 3F 99 FE   2F 2C 82 99 95 23 27 75  .k...?../,...#'u
#             0010: 28 BD E9 92 83 9E 6E 77   3B A9 4D 0F DB D1 24 14  (.....nw;.M...$.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.622 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.622 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.624 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.626 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:52:06.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:52:06.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.635 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.636 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.637 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:52:06.642 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:52:06.642 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 22:52:06.643 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

EndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 22:53:28.197 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:53:28.250 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:53:28.250 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:53:28.250 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 22:53:28.250 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43664/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28058ms
ok 65 stop command for single port in 31031ms
ok 66 status detects locally running solr in 14324ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2161ms
ok 69 copying files around in 6551ms
ok 70 upconfig in 2698ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1230ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m36.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5549 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5549/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36673/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 20:22:58.206; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 20:22:58.211; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 20:22:59.122; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 20:22:59.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22102ms
ok 61 start solr with client truststore and security manager in 25380ms
not ok 62 start solr with mTLS needed in 60638ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-zjrmBL/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36673.
#
# Started Solr server on port 36673 (pid=200680). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 36674.
#
# Started Solr server on port 36674 (pid=201100). Happy searching!
#
# INFO  - 2023-09-26 20:24:21.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 20:24:21.591; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 20:24:21.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 20:24:21.961; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 20:24:21.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:21.993 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 02 E9 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:57.000 UTC",
#     "not  after"         : "2023-12-25 20:23:57.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B AB F8 A9 CD 77 3C CE   CB 30 E5 14 75 9E BD 0F  .....w<..0..u...
#         0010: 9B EA 36 55                                        ..6U
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:21.997 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 D3 D5 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:49.000 UTC",
#     "not  after"         : "2023-12-25 20:23:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:22.011 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:22.124 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:22.124 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:22.125 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:22.125 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:22.256 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.256 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:22.258 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:22.258 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.264 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.276 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.277 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.277 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:22.280 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AA FC 4F 4F B0 B6 1F 33 59 49 44 6E AC 7D D8 C9 60 A6 A2 10 0B D8 69 1A 53 9A B0 71 47 C8 A0 1D",
#   "session id"          : "48 E6 23 33 4B AC D8 02 75 78 01 34 49 F6 E5 0E 61 96 6A E9 D6 DB 95 02 E2 14 DA DC AB 9D 68 E9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B9 22 C1 27 0F 91 E9 FD   3A 24 80 2A D2 0C B5 F9  .".'....:$.*....
#             0010: EB DB 9C 0D 8E 18 83 05   DD 2E FB 42 1B 93 37 6C  ...........B..7l
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.397 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "10 05 C9 8D C8 95 E9 E0 73 96 80 EF E9 46 F5 1C 95 D1 05 45 15 FC 48 35 70 FD CC B7 62 02 0E 8A",
#   "session id"          : "48 E6 23 33 4B AC D8 02 75 78 01 34 49 F6 E5 0E 61 96 6A E9 D6 DB 95 02 E2 14 DA DC AB 9D 68 E9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BA 3F FC 45 FB 30 8D F1   BF EB 7B 04 CD B0 6F E8  .?.E.0........o.
#           0010: D3 2B A3 29 E8 7E 42 BE   DC BB 41 08 AA C6 0F 5F  .+.)..B...A...._
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.397 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.397 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.398 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.399 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.401 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.401 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.401 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.402 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.403 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.403 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.403 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.411 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.412 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.413 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.417 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.417 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.417 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.418 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.418 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.418 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.418 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.419 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.420 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.421 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.421 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.422 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.427 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 66 32 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:53.000 UTC",
#       "not  after"         : "2023-12-25 20:23:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 60 29 82 6C E2 E8 4C   C4 64 4F 5B 51 42 EC 81  .`).l..L.dO[QB..
#           0010: 0B 92 08 79                                        ...y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.427 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.516 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.520 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 A5 A2 1E D6 75 A0 0E   F4 1D CE 3C 2B 29 CC 95  .....u.....<+)..
#     0010: 86 81 1B AA 77 AF B8 00   E7 81 0B EA 33 0E 80 73  ....w.......3..s
#     0020: 38 40 C6 A3 7C EF C6 82   21 57 09 CB 22 78 F1 03  8@......!W.."x..
#     0030: A4 A5 BD DB 34 54 91 E1   2C 1D 37 0D 83 F1 AC 3C  ....4T..,.7....<
#     0040: 61 9D FA 42 06 5B 95 7B   B3 B2 4D 7C C6 1A 86 95  a..B.[....M.....
#     0050: 7E FC 2C FD 41 84 C5 FD   F0 FB 0B 8E 54 2C 31 E1  ..,.A.......T,1.
#     0060: 5A 35 21 9F 56 04 29 4D   CC B2 D3 56 DF FC AE 85  Z5!.V.)M...V....
#     0070: 33 F1 A7 FA 65 80 93 10   9A 4B B1 E6 1C 8F 8C BF  3...e....K......
#     0080: 4D 3C 6E 34 A3 D3 05 75   58 DA 2A 2B 45 D6 ED 4E  M<n4...uX.*+E..N
#     0090: C1 F3 6D F1 85 30 2F 25   8A D6 BE F8 C1 4E 57 24  ..m..0/%.....NW$
#     00A0: B8 18 18 F6 9D 7F 14 10   F4 F3 AF 04 14 11 25 61  ..............%a
#     00B0: 1A 30 4E 0F 28 84 CA 7F   12 E1 D6 24 63 90 B7 76  .0N.(......$c..v
#     00C0: DB C8 9F 10 B1 4E E8 A8   75 D4 F3 5F FA 10 26 F6  .....N..u.._..&.
#     00D0: DE C3 98 D7 FE 5E 90 0F   E0 8B 0A 72 95 90 38 3D  .....^.....r..8=
#     00E0: 1C E3 52 17 5B EC 8D 75   5C 3B 9F 07 01 AC B2 F8  ..R.[..u\;......
#     00F0: 69 05 AE 74 EF 01 7C 4F   59 AA E4 BB 81 2B CD 9D  i..t...OY....+..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.522 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AE 6F E0 02 D0 0F E2 8C   74 FA 16 33 D9 6B C3 42  .o......t..3.k.B
#     0010: 3F E3 5B 93 EB D0 03 A7   CB 54 2F 11 CE FF 0E DD  ?.[......T/.....
#     0020: B4 DE F9 81 C6 E0 E1 8D   8D C9 D3 40 E8 BB D9 5A  ...........@...Z
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.524 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:22.525 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.525 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:22.525 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.525 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:22.526 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:22.526 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.526 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.529 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 02 E9 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:57.000 UTC",
#       "not  after"         : "2023-12-25 20:23:57.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B AB F8 A9 CD 77 3C CE   CB 30 E5 14 75 9E BD 0F  .....w<..0..u...
#           0010: 9B EA 36 55                                        ..6U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AB 93 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:51.000 UTC",
#       "not  after"         : "2023-12-25 20:23:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#           0010: 09 CF B7 A5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.554 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 71 B5 55 10 FB BF E0   10 28 1B EA 8E 76 34 23  Wq.U.....(...v4#
#     0010: 6A 64 EE 4F 19 E8 C8 26   A3 61 F3 E1 F1 8E 50 62  jd.O...&.a....Pb
#     0020: 6F 1C E4 42 8C 56 61 13   E1 B4 C1 DF 5B E8 BC 20  o..B.Va.....[..
#     0030: B3 FB 1E 2B 54 D2 4E 86   3A FB 05 BB 81 58 21 CE  ...+T.N.:....X!.
#     0040: 3F 08 05 24 6E E5 91 F4   91 18 75 F8 12 FD C8 F5  ?..$n.....u.....
#     0050: 5A 1E 0E D0 5B 76 C5 F2   AC FF F4 24 52 E8 A8 EF  Z...[v.....$R...
#     0060: 3C FC 71 F4 68 C8 7C 79   A3 58 11 3D D5 BB 2D 05  <.q.h..y.X.=..-.
#     0070: EE B1 6E 3D ED E9 DB 29   5B 04 0A 96 C8 72 F8 60  ..n=...)[....r.`
#     0080: 93 1E 50 4A 57 A4 81 77   89 B1 8B EB CF CA FD DA  ..PJW..w........
#     0090: CD 86 4C 5E 90 75 41 3A   CD DB F3 E2 A9 68 5A 37  ..L^.uA:.....hZ7
#     00A0: 37 26 76 85 DC C9 24 BB   F3 7C F4 5F 6E 29 D8 A2  7&v...$...._n)..
#     00B0: 38 FF 40 1F 59 7E 51 64   5E B6 08 C9 2C BA 95 77  8.@.Y.Qd^...,..w
#     00C0: E5 D3 A1 AE 07 11 DE 97   18 71 2C F6 52 33 C3 07  .........q,.R3..
#     00D0: 6A 3B 60 02 C1 47 41 F3   6A 71 C7 19 F9 87 35 B2  j;`..GA.jq....5.
#     00E0: ED 5B C6 CB 78 AA 41 A7   29 B5 00 CB 86 3C 22 DD  .[..x.A.)....<".
#     00F0: 75 A7 1B 84 F0 18 60 97   10 1F 13 B7 87 71 CE A3  u.....`......q..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.555 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AE B8 76 72 F1 BE 09 BB   41 20 CA 6A 13 A5 55 30  ..vr....A .j..U0
#     0010: 60 74 07 46 FD 42 BB 8A   10 F3 70 BC 3C CB 5B A2  `t.F.B....p.<.[.
#     0020: 26 8D EA A4 1B B2 A9 34   D3 2B 1F C2 93 F8 6F F6  &......4.+....o.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.556 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:22.607 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 2E 90 DA AE A8 30 50 21 42 05 B4 FE C3 C4 31 A8 E7 4C 2D 15 FA 32 80 6C 12 3A A1 C1 B1 80 33",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 20:24:22.876 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 20:24:22.878 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 20:24:23.810; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 20:24:23.815; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 20:24:24.183; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 20:24:24.186; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 20:24:24.187; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zjrmBL/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:24.218 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 02 E9 4F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:57.000 UTC",
#     "not  after"         : "2023-12-25 20:23:57.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B AB F8 A9 CD 77 3C CE   CB 30 E5 14 75 9E BD 0F  .....w<..0..u...
#         0010: 9B EA 36 55                                        ..6U
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:24.223 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 D3 D5 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:49.000 UTC",
#     "not  after"         : "2023-12-25 20:23:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:24.237 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:24.558 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:24.558 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:24.559 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:24.559 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:24.696 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.696 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:24.698 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:24.698 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.704 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.716 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.716 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:24.718 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1D 19 F5 60 54 E2 03 1A 3F F6 D6 87 5D CD FE ED 06 B5 0B 46 AC 90 92 75 3D 01 79 65 C4 3C 57 06",
#   "session id"          : "2D 84 EA 23 56 93 C1 9E 48 0A 53 4D 64 C1 04 CB CB 88 98 2E 60 B6 16 AB 3B 80 B0 6B 75 12 7E 46",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 27 C5 3F 4F 9F BB 26 BB   2B 9E C8 C5 FC 27 D4 48  '.?O..&.+....'.H
#             0010: DC 7F 00 5D 1B D5 F3 48   3D CD 3D 7F 54 06 4B 66  ...]...H=.=.T.Kf
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.822 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B1 19 9D D2 1C 31 D1 25 7B D6 96 C2 0D 4F 97 87 82 D5 31 CE AD 6F 1D 31 C6 BF 45 F6 CD 17 70 4C",
#   "session id"          : "2D 84 EA 23 56 93 C1 9E 48 0A 53 4D 64 C1 04 CB CB 88 98 2E 60 B6 16 AB 3B 80 B0 6B 75 12 7E 46",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 17 75 CB E5 29 0A 68 32   C4 FD FC 6D 3E 84 F4 B7  .u..).h2...m>...
#           0010: 67 09 91 69 E1 23 22 35   72 3F 66 6D F1 12 D7 6D  g..i.#"5r?fm...m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.823 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.825 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.827 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.827 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.827 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.828 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.837 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.839 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.842 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.842 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.842 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.845 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.845 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.846 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.846 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.847 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.847 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.847 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.850 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 66 32 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:53.000 UTC",
#       "not  after"         : "2023-12-25 20:23:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 60 29 82 6C E2 E8 4C   C4 64 4F 5B 51 42 EC 81  .`).l..L.dO[QB..
#           0010: 0B 92 08 79                                        ...y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.851 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.935 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E AB 93 35",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 20:23:51.000 UTC",
#     "not  after"         : "2023-12-25 20:23:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#         0010: 09 CF B7 A5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#         0010: 95 CC 66 02                                        ..f.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.940 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A8 F1 F5 DE 7F E1 04 25   01 50 1F 2E 7F 28 67 0F  .......%.P...(g.
#     0010: 16 4F 72 CA 20 B2 C6 98   2D 71 76 44 CB BD 64 BE  .Or. ...-qvD..d.
#     0020: 57 D7 F0 EC 0E 6A BF E4   C1 A5 77 E4 5C 7F BE B9  W....j....w.\...
#     0030: 26 28 AE 1B 6A EE E2 55   7F 9A 2C 36 89 30 A8 FB  &(..j..U..,6.0..
#     0040: 5A 13 06 38 56 71 1F 12   25 7D 7D CA 65 33 6A 82  Z..8Vq..%...e3j.
#     0050: 4A 5C 2D 91 F4 32 BD 1B   33 01 24 1C 26 EE 01 5E  J\-..2..3.$.&..^
#     0060: 6A B9 28 1B 76 2E 96 11   96 1D 1D 53 CC B8 E5 DE  j.(.v......S....
#     0070: 79 8D 6A 5B 34 E2 0B 14   6D 6B 9B 19 EF C5 2C 5B  y.j[4...mk....,[
#     0080: E4 9D B4 61 71 54 22 34   76 6A 2F DC FA 6C CD 31  ...aqT"4vj/..l.1
#     0090: 59 78 77 93 68 C2 74 4C   34 FD 98 63 71 A2 C0 BF  Yxw.h.tL4..cq...
#     00A0: 54 6F 18 AB A0 BF 1D 8A   87 4D E5 80 F1 FE 3D 7B  To.......M....=.
#     00B0: BF 2D 13 CA F0 E6 BD A1   20 CF AD 30 3F B8 44 E7  .-...... ..0?.D.
#     00C0: 7C 93 98 B2 2C 28 87 DA   40 70 2B 26 20 04 E0 03  ....,(..@p+& ...
#     00D0: AD 41 44 E6 89 33 4B 67   85 78 AD 3D 2B FD AB 13  .AD..3Kg.x.=+...
#     00E0: DD CB 13 74 30 71 54 F8   01 E3 3C 37 70 AC 03 87  ...t0qT...<7p...
#     00F0: 7D 68 A4 E2 AD C7 10 08   DB EA B9 71 FC 28 66 68  .h.........q.(fh
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.942 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EB E2 A9 3A 37 3A B4 E9   B3 F1 C8 04 29 7B 6B C6  ...:7:......).k.
#     0010: 8C 4B 11 6A B0 2B 49 A7   BD 52 28 F5 FC EB B5 1A  .K.j.+I..R(.....
#     0020: A7 EA 4B 4A 2A 49 88 33   CC 58 09 CF D8 F0 76 FC  ..KJ*I.3.X....v.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.944 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:24.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.945 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:24.945 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.945 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 20:24:24.946 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:24.946 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.947 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.949 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 02 E9 4F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:57.000 UTC",
#       "not  after"         : "2023-12-25 20:23:57.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B AB F8 A9 CD 77 3C CE   CB 30 E5 14 75 9E BD 0F  .....w<..0..u...
#           0010: 9B EA 36 55                                        ..6U
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AB 93 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:51.000 UTC",
#       "not  after"         : "2023-12-25 20:23:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#           0010: 09 CF B7 A5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.974 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 09 04 D0 06 82 7E A7   3E F6 C6 91 89 15 22 28  G.......>....."(
#     0010: 37 D1 05 A4 09 A1 EC 39   0F 4E 97 44 A5 68 97 5F  7......9.N.D.h._
#     0020: CB 4D 21 1D 5D DD 77 F4   84 ED 5C 09 0E 15 53 13  .M!.].w...\...S.
#     0030: 72 FF 9E 1D BB 88 D6 03   CA 95 DA 4E 76 7E 2A 54  r..........Nv.*T
#     0040: 9D F8 F8 41 EF 1B D5 30   B7 C3 3C B9 E1 FF 65 81  ...A...0..<...e.
#     0050: AD CF DC 93 D0 CB EE A6   C4 37 7F 80 5C 62 13 07  .........7..\b..
#     0060: CF E1 9D 9A 51 77 6C 66   7C 79 D0 EB A9 59 F1 E7  ....Qwlf.y...Y..
#     0070: 3A 55 F4 03 D2 95 28 A5   C2 9B 14 DD 14 0B 47 89  :U....(.......G.
#     0080: A6 87 66 4D B7 86 DE D4   A6 7F D5 E0 97 FD C9 CA  ..fM............
#     0090: E1 E3 68 7D 2D 31 D4 C2   32 E5 59 97 D1 EC DC A4  ..h.-1..2.Y.....
#     00A0: 58 C0 70 72 E5 21 F1 A2   51 8C F8 D6 E1 B6 E2 B3  X.pr.!..Q.......
#     00B0: 08 D4 19 44 40 97 00 5E   AE 5B 55 07 2E 3C DF 2C  ...D@..^.[U..<.,
#     00C0: 9B C1 09 B8 56 3E 6B CF   09 40 79 F0 89 2F FE 6C  ....V>k..@y../.l
#     00D0: 7B 55 6F 66 02 E9 20 C3   C0 1C 29 C3 52 F0 2E EB  .Uof.. ...).R...
#     00E0: 65 20 F6 75 00 20 F2 B8   CE 09 50 B8 3F 3A 36 34  e .u. ....P.?:64
#     00F0: 8D 17 07 46 07 BF A2 2A   60 77 38 BB 68 0A A6 AD  ...F...*`w8.h...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.976 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 96 32 A2 CC 02 A0 57 69   97 41 1E 40 B2 AB 29 DF  .2....Wi.A.@..).
#     0010: D5 6E 1E A7 49 DC 72 00   C7 E7 99 68 1D CA 85 AC  .n..I.r....h....
#     0020: DA D4 BA 33 F3 8A 2D 41   28 D9 77 3B BA 4B 40 EF  ...3..-A(.w;.K@.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:24.976 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:25.024 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "83 57 C5 D3 40 92 30 AA 97 CA 90 4D F5 AD AF BA 72 8F 66 56 EE F5 4D D1 72 2F 85 7D A9 31 5E A6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 20:24:25.288 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 20:24:25.289 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 20:24:35.953; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:36.291 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E AB 93 35",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:51.000 UTC",
#       "not  after"         : "2023-12-25 20:23:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#           0010: 09 CF B7 A5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 25 C4 5D 64 06 AA E6   6D 31 4B 38 5D F4 FD 87  F%.]d...m1K8]...
#           0010: 95 CC 66 02                                        ..f.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 D3 D5 DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 20:23:49.000 UTC",
#       "not  after"         : "2023-12-25 20:23:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA 71 26 FC 03 C9 1B 44   B2 4A EB DD FB E4 B0 FD  .q&....D.J......
#           0010: 09 CF B7 A5                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 20:24:36.307 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:36.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:36.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:36.698 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:24:36.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:36.766 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.766 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:36.768 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 20:24:36.769 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.775 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.789 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.789 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.789 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 20:24:36.792 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F3 B7 BA 5D 66 67 0F 08 81 4F 23 1C 98 4A 29 A2 BE B7 EE 5A 99 AD C9 AA 1B E1 1B EE A6 A5 8A 14",
#     "session id"          : "15 61 28 63 ED 16 93 ED 3A 66 CF 72 9F D1 85 55 1F 2B 5B ED DE 84 C0 29 40 F8 C7 42 B9 DA 2F 57",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2E BF 97 99 6D 1C A4 B2   D3 27 5D DF 7C 58 E2 3D  ....m....']..X.=
#               0010: 26 F6 8D 9A CB 0D 18 A0   CF B8 FD 35 BF 97 66 3C  &..........5..f<
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.812 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "4F 6D 84 A2 7A 93 0B 84 C9 90 74 1C E1 75 BD BA C7 6F 51 39 70 7C 91 E6 47 C5 F8 05 0C 99 9F 98",
#     "session id"          : "15 61 28 63 ED 16 93 ED 3A 66 CF 72 9F D1 85 55 1F 2B 5B ED DE 84 C0 29 40 F8 C7 42 B9 DA 2F 57",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 66 5B 49 CF 75 10 12   D5 CE BA E0 00 8E 9B 55  .f[I.u.........U
#             0010: B3 AF 9E 96 F5 16 EB 3A   1A B7 24 E8 0E 83 F2 6E  .......:..$....n
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.813 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.813 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.814 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.815 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.815 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.817 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.818 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.818 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.818 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.827 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.829 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.830 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.833 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.833 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.833 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:24:36.834 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 20:24:36.836 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 20:25:59.219 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:25:59.265 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:25:59.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:25:59.267 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 20:25:59.267 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36674/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28337ms
ok 65 stop command for single port in 30942ms
ok 66 status detects locally running solr in 14331ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6522ms
ok 70 upconfig in 2635ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1240ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 47s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m11s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5548 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5548/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:39395/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 17:33:51.933; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 17:33:51.939; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 17:33:52.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 17:33:52.890; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22538ms
ok 61 start solr with client truststore and security manager in 25197ms
not ok 62 start solr with mTLS needed in 56832ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Mhbc0X/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39395.
#
# Started Solr server on port 39395 (pid=200784). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 39396.
#
# Started Solr server on port 39396 (pid=201206). Happy searching!
#
# INFO  - 2023-09-26 17:35:15.821; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 17:35:15.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 17:35:16.200; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 17:35:16.204; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 17:35:16.204; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:16.236 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 83 77 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:51.000 UTC",
#     "not  after"         : "2023-12-25 17:34:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 91 EC 6F 24 12 25 0C   8A 68 4D BB E9 84 13 B1  ...o$.%..hM.....
#         0010: 66 93 49 DF                                        f.I.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:16.241 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C F7 B3 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:43.000 UTC",
#     "not  after"         : "2023-12-25 17:34:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:16.255 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:16.489 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:16.491 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:16.491 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.497 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.509 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.509 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.509 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:16.511 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D7 4D 5E B6 88 F6 E5 C3 72 A9 BA 6A F5 6E 4B 8A AC D3 31 52 DF A7 0D 25 66 91 84 56 23 9D 78 69",
#   "session id"          : "DB 8D 18 D8 DE 7A AB 18 43 62 53 5D 66 D6 7C F6 9B 1D 04 6C 0E 4E F9 22 81 F4 69 70 E8 32 12 2A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 24 2E 1B B1 6D 84 E2 80   C9 3D 10 27 6E 11 DF 0B  $...m....=.'n...
#             0010: ED 2E F4 88 74 7D 43 AD   9D 5A F6 C4 7C 33 48 2C  ....t.C..Z...3H,
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.631 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C 49 FF 7A AE 3E 3A 44 1D DA FE 3D BF 53 76 C0 74 02 78 9C 56 47 71 A9 CD 2D 2A 3A 04 FD 9B C6",
#   "session id"          : "DB 8D 18 D8 DE 7A AB 18 43 62 53 5D 66 D6 7C F6 9B 1D 04 6C 0E 4E F9 22 81 F4 69 70 E8 32 12 2A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FA D3 86 5F 05 D3 60 C6   8C 40 DC 68 82 18 07 DD  ..._..`..@.h....
#           0010: 49 36 E5 E8 FE A7 B5 78   61 75 66 67 34 E8 51 12  I6.....xaufg4.Q.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.632 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.632 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.633 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.634 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.634 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.636 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.637 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.637 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.637 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.638 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.639 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.647 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.648 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.649 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.653 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.654 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.654 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.654 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.654 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.654 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.655 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.655 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.655 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.656 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.657 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.657 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.658 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.658 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.659 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.659 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.662 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 4F D2 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:48.000 UTC",
#       "not  after"         : "2023-12-25 17:34:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 BD 70 16 1E 84 77 08   94 03 3B 51 66 B4 35 0E  ..p...w...;Qf.5.
#           0010: E4 CF BD C3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.662 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:16.739 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:16.740 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:16.740 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:16.740 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.749 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.754 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9D 51 D6 43 D3 1B A2 46   B9 0E 22 EE F3 57 BC 4D  .Q.C...F.."..W.M
#     0010: 70 B1 70 1D 83 84 95 13   65 E4 EF 7B 1E 35 06 9F  p.p.....e....5..
#     0020: 7E 80 34 DB FE D4 5F 7C   67 5E 19 65 82 65 81 2D  ..4..._.g^.e.e.-
#     0030: 71 A9 3D 6C 6C 83 7D EB   1F 07 26 38 7A B1 5F 62  q.=ll.....&8z._b
#     0040: B4 35 36 FC 7A 63 EC 40   5A 0E 01 EE F5 04 3F 14  .56.zc.@Z.....?.
#     0050: EA 69 0C 68 79 E8 F7 9C   C7 F7 C5 EE BF 97 75 47  .i.hy.........uG
#     0060: 6A 8D 55 50 53 80 DA 14   A1 89 22 B3 21 50 A7 6B  j.UPS.....".!P.k
#     0070: 0B 12 C0 6D 65 C5 E0 9A   9C D1 C6 25 3C AC 2B E2  ...me......%<.+.
#     0080: 20 CE 12 AE CD D9 36 54   D6 AD D3 2F C7 DF FC 57   .....6T.../...W
#     0090: 9D 85 62 AC B9 50 8B 73   F1 01 83 B7 8B B2 02 E5  ..b..P.s........
#     00A0: 97 68 78 E6 80 4A DC 9D   AA 23 DF B1 45 FD E8 90  .hx..J...#..E...
#     00B0: 60 0B 82 0B 23 91 8E 1E   EA 2B F2 BA 09 57 88 EF  `...#....+...W..
#     00C0: 14 0E 30 08 4C 5D 74 0A   15 A9 E7 31 06 08 50 FB  ..0.L]t....1..P.
#     00D0: E0 E4 77 8B 88 46 E4 1D   E8 59 01 0C C2 62 AE 27  ..w..F...Y...b.'
#     00E0: A5 11 AB 4B 7E 09 B3 C8   DD 32 3A BE 7B 10 C8 76  ...K.....2:....v
#     00F0: 3E AD E9 AB 34 82 A4 7E   87 E2 85 A8 6C AB E7 C8  >...4.......l...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.756 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE E1 39 F2 2F 1B 25 28   F7 12 C2 4F 39 67 AE CD  ..9./.%(...O9g..
#     0010: B7 E7 83 C4 90 F3 8A 67   C6 93 C3 97 C6 08 5A E3  .......g......Z.
#     0020: 19 F6 3E 14 11 CC B0 5D   08 D8 F8 58 0A 70 5A 2E  ..>....]...X.pZ.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.758 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:16.759 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.759 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:16.759 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.759 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:16.760 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:16.760 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.760 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.763 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 83 77 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:51.000 UTC",
#       "not  after"         : "2023-12-25 17:34:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 91 EC 6F 24 12 25 0C   8A 68 4D BB E9 84 13 B1  ...o$.%..hM.....
#           0010: 66 93 49 DF                                        f.I.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 01 EE DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:45.000 UTC",
#       "not  after"         : "2023-12-25 17:34:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#           0010: FD 6A 04 91                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.787 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E F2 23 C9 A1 B9 22 06   C0 BF 91 5C 9B 31 D9 17  ..#..."....\.1..
#     0010: E3 0C 49 EC F6 BB 5E 2A   FD 8A 69 8A 4E 15 2B 19  ..I...^*..i.N.+.
#     0020: A0 F4 6C 32 7F BD AE 16   26 00 5D 03 47 2D 10 34  ..l2....&.].G-.4
#     0030: BD D6 20 2A 65 C3 93 63   5D A8 CD D6 04 28 23 C6  .. *e..c]....(#.
#     0040: 3F 92 09 84 E5 63 C0 B5   80 3D 49 41 E9 D1 DE B7  ?....c...=IA....
#     0050: CA 3B 32 BA BE 16 9C 20   DD E2 D8 F5 C4 B2 21 26  .;2.... ......!&
#     0060: 82 DE E0 AF 13 EA 11 BC   9E E1 27 AD E8 35 99 C8  ..........'..5..
#     0070: 39 77 C0 33 79 3B C8 4E   34 A9 20 86 F0 A7 79 0F  9w.3y;.N4. ...y.
#     0080: 7B CB 45 79 73 1C 52 51   D4 50 DF 7B C7 0B 98 69  ..Eys.RQ.P.....i
#     0090: 44 0C 19 33 0C D8 81 D4   94 80 C4 48 60 12 DA 76  D..3.......H`..v
#     00A0: 49 D9 03 32 40 D8 46 3B   FE 51 35 EA 7D 8B CD B4  I..2@.F;.Q5.....
#     00B0: A5 D5 B6 F4 06 A0 29 92   C3 A2 47 40 AA 84 E5 06  ......)...G@....
#     00C0: FB 7E 89 14 A1 49 1A 2E   55 1F A9 50 DF 3D 51 F9  .....I..U..P.=Q.
#     00D0: 5D 04 01 3D BA B7 A3 94   17 BB 6A 07 12 32 54 9A  ]..=......j..2T.
#     00E0: D7 7D 49 FF 01 C5 4E F8   C8 09 74 8E B4 B2 0A EC  ..I...N...t.....
#     00F0: AF 9C CC E7 F9 15 BE 48   1D C7 6D D2 39 89 1F 41  .......H..m.9..A
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.788 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 27 89 CB B7 37 0D FE 54   86 8C 73 48 DE 47 98 BF  '...7..T..sH.G..
#     0010: AC FE D5 DC 2D BA 61 AE   E8 F4 D2 D6 A0 9D 07 E7  ....-.a.........
#     0020: 8A E4 C8 B7 BF C8 51 E4   7B A8 FF D6 3C 49 7F 1C  ......Q.....<I..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.789 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:16.842 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C2 B4 3D 30 01 E0 FC 1C D9 96 D1 9B 50 E3 01 B9 38 22 DC 54 1C CB 4D 8C E1 6D C2 F6 47 08 CA 1B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 17:35:17.169 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 17:35:17.171 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 17:35:18.122; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 17:35:18.128; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 17:35:18.493; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 17:35:18.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 17:35:18.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Mhbc0X/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:18.528 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 83 77 88",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:51.000 UTC",
#     "not  after"         : "2023-12-25 17:34:51.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 91 EC 6F 24 12 25 0C   8A 68 4D BB E9 84 13 B1  ...o$.%..hM.....
#         0010: 66 93 49 DF                                        f.I.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:18.533 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C F7 B3 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:43.000 UTC",
#     "not  after"         : "2023-12-25 17:34:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:18.547 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:18.643 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:18.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:18.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:35:18.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:18.785 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.785 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:18.787 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:18.787 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.794 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.805 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.805 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.806 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:18.808 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5D C7 77 3D E9 E6 6C 55 87 C3 69 94 06 A5 F7 F3 69 A4 A7 8D 50 02 4A 4C 3B DE 40 FA 05 1E AF D9",
#   "session id"          : "9F 34 1A 73 9A 64 56 E8 DA 19 13 4B 2A 07 24 F7 D0 79 30 4C B1 79 78 1E 23 84 E1 1F B8 22 96 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 05 52 0F 25 94 84 B4 AD   6D 79 A6 00 93 33 DC 37  .R.%....my...3.7
#             0010: 24 D0 7A A5 56 ED E7 31   C3 B0 34 DA 30 BE 5C 34  $.z.V..1..4.0.\4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7B ED 82 08 34 4C 74 74 9A 52 FE 5C 24 32 25 FC CE 86 B3 F7 61 06 02 78 1B ED 7C 86 F7 A3 71 FA",
#   "session id"          : "9F 34 1A 73 9A 64 56 E8 DA 19 13 4B 2A 07 24 F7 D0 79 30 4C B1 79 78 1E 23 84 E1 1F B8 22 96 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BB BD EE C5 37 E0 D0 DC   78 3E 35 FB FF 86 F3 26  ....7...x>5....&
#           0010: 84 BA D5 EE 54 A9 F5 5C   DE 9E 76 54 C9 7F 93 51  ....T..\..vT...Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.926 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.927 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.929 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.931 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.931 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.940 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.942 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.943 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.946 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.947 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.947 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.947 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.947 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.948 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.948 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:18.948 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:18.948 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.949 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.950 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.950 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.950 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.951 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.952 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:18.952 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.954 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 4F D2 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:48.000 UTC",
#       "not  after"         : "2023-12-25 17:34:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 BD 70 16 1E 84 77 08   94 03 3B 51 66 B4 35 0E  ..p...w...;Qf.5.
#           0010: E4 CF BD C3                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:18.955 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.045 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 01 EE DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 17:34:45.000 UTC",
#     "not  after"         : "2023-12-25 17:34:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#         0010: FD 6A 04 91                                        .j..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#         0010: E7 EC 21 D5                                        ..!.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.050 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: CE A4 23 9F 3E 5F 62 2E   71 AA 96 D5 ED E1 3F 2C  ..#.>_b.q.....?,
#     0010: 7E DD 88 C9 7E 82 5A EF   CC 5F C5 B4 98 24 50 0F  ......Z.._...$P.
#     0020: 7B 68 C8 A4 B0 01 E2 DF   81 97 4E DE F9 B8 44 95  .h........N...D.
#     0030: 18 6E AA 33 D3 42 CC C2   C9 95 80 C3 7B B3 74 C7  .n.3.B........t.
#     0040: 53 5D C0 BF CB 5E 27 B3   CE 1F 17 B9 98 34 43 64  S]...^'......4Cd
#     0050: 10 5E 79 57 2E A3 0E FE   3C 0D E9 0F 1C C2 99 37  .^yW....<......7
#     0060: F7 B1 F9 5F 8D A4 86 91   02 B2 B7 8F A8 E3 BA 68  ..._...........h
#     0070: 27 7B 44 C7 39 A5 29 BF   F0 15 27 A9 43 B3 CB 9B  '.D.9.)...'.C...
#     0080: 18 0C EC 06 4C 00 A0 A5   57 CC 79 5E E5 5D 06 65  ....L...W.y^.].e
#     0090: 51 2D 0C 78 94 AD 76 AB   9B 21 5C BB 2C 63 73 A8  Q-.x..v..!\.,cs.
#     00A0: EF 70 36 DA DC D6 84 84   B4 E4 C5 95 6F D2 A5 91  .p6.........o...
#     00B0: BE 17 3A 16 51 C0 F7 E6   C5 2A D5 41 1F 50 1C 07  ..:.Q....*.A.P..
#     00C0: 03 02 50 4B 1E B7 25 70   5D 8C 91 71 6A CC 4A AA  ..PK..%p]..qj.J.
#     00D0: F2 3E 49 7C 32 16 3A EA   E7 57 AC 28 7A 82 EE 6E  .>I.2.:..W.(z..n
#     00E0: D1 60 35 56 C7 0F 97 F4   CB 7B C0 49 8B 77 A6 9E  .`5V.......I.w..
#     00F0: C2 F9 9D F6 DD 0E CB DA   B1 48 C8 84 26 99 B4 9F  .........H..&...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.052 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6E 6E 51 4C 9B 90 18 6C   1E D9 DA 27 CD AE 99 D5  nnQL...l...'....
#     0010: 58 2F 18 2A 71 63 1E 81   08 D9 7C 5E 53 13 65 4D  X/.*qc.....^S.eM
#     0020: 11 22 30 F0 0D B6 F1 DF   83 C0 0D 10 B6 AF 8E F0  ."0.............
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:19.055 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:19.055 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:19.056 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:19.056 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 17:35:19.056 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:19.056 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.057 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.059 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 83 77 88",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:51.000 UTC",
#       "not  after"         : "2023-12-25 17:34:51.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 91 EC 6F 24 12 25 0C   8A 68 4D BB E9 84 13 B1  ...o$.%..hM.....
#           0010: 66 93 49 DF                                        f.I.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 01 EE DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:45.000 UTC",
#       "not  after"         : "2023-12-25 17:34:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#           0010: FD 6A 04 91                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.084 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 DD D5 F4 1E F3 A6 92   F2 1C 4A AF A1 B3 3A 4D  c.........J...:M
#     0010: C4 09 B0 DE 5F 3C 99 90   5E 91 77 49 46 C4 9F 9F  ...._<..^.wIF...
#     0020: 5A FB 4D EE F8 03 A0 6E   46 88 66 7F C9 30 7B 66  Z.M....nF.f..0.f
#     0030: D8 00 74 66 CC 68 44 AA   2C C4 64 ED 90 C0 4D FE  ..tf.hD.,.d...M.
#     0040: 47 47 7B 46 BA 85 B4 2D   43 AC 09 50 42 56 E2 A2  GG.F...-C..PBV..
#     0050: A2 4C 10 05 E1 85 5F 42   9C 51 9A 5B 87 0A B3 B8  .L...._B.Q.[....
#     0060: 1A 2D B5 45 C7 B2 41 E7   9F 3E 87 7D 15 22 87 21  .-.E..A..>...".!
#     0070: 14 9B 60 1C 8D 1A 93 9A   43 42 97 1C 3C E9 6A A6  ..`.....CB..<.j.
#     0080: 64 63 57 84 B9 54 68 8A   0C FB D6 CA F8 E6 9C D7  dcW..Th.........
#     0090: 22 D4 BB EB E2 43 36 D4   7C 6C 45 A7 D9 83 D6 9D  "....C6..lE.....
#     00A0: EC F5 1A 99 7A 07 B2 64   57 78 A3 A1 34 D5 AD 97  ....z..dWx..4...
#     00B0: 2F B4 F2 0E E0 07 C3 81   1D D4 28 A2 A3 B1 C0 B3  /.........(.....
#     00C0: EF 5D FD F0 3D 60 EA 47   D5 7E C2 5C B5 C3 E8 BC  .]..=`.G...\....
#     00D0: D6 5B E9 2A 66 B2 4E 9A   38 03 15 4D 48 57 0D CE  .[.*f.N.8..MHW..
#     00E0: 98 C6 B6 53 37 41 3E 78   AA 03 43 15 9C 06 AE 41  ...S7A>x..C....A
#     00F0: 88 AF D5 28 00 B5 58 39   38 A5 C3 1B 49 97 A1 A4  ...(..X98...I...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.085 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 51 5A EF 80 A0 CA 27 1D   D3 8D DC FD 0F 69 66 0B  QZ....'......if.
#     0010: 8F 65 7A 07 3E A5 D0 56   5B 28 F1 82 B6 AA F9 1B  .ez.>..V[(......
#     0020: 03 4A 37 34 FA CE CE A9   28 F2 1D BD CB 45 DF A8  .J74....(....E..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.086 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:19.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D7 82 E6 A9 68 11 02 19 3F 4B B6 5A 03 FB 32 4D BD 61 59 78 BF 99 60 92 1F 82 C7 DC 4D AD 33 63",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 17:35:19.450 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 17:35:19.451 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 17:35:30.657; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:30.984 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C F7 B3 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:43.000 UTC",
#       "not  after"         : "2023-12-25 17:34:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#           0010: FD 6A 04 91                                        .j..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 01 EE DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 17:34:45.000 UTC",
#       "not  after"         : "2023-12-25 17:34:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D2 14 41 7B 99 06 83 C4   4D BC D1 64 33 4F C7 B4  ..A.....M..d3O..
#           0010: FD 6A 04 91                                        .j..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E C6 F8 79 0B E5 4D 7A   E1 41 3B A6 E5 D7 CE 02  n..y..Mz.A;.....
#           0010: E7 EC 21 D5                                        ..!.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 17:35:30.999 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:31.234 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.235 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:31.236 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 17:35:31.237 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.242 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.253 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.253 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.254 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 17:35:31.256 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5B 26 A5 95 34 DF 84 86 A7 AF 02 92 21 AD A7 C7 4B 4F E3 8B 19 71 D2 D1 2C 37 ED 53 F1 59 5A CC",
#     "session id"          : "34 7C 95 09 B4 62 DA EF 92 BE 32 C2 78 DD AD EC D0 FD B5 DE 57 F5 3D EA 4C A5 BE E3 81 F4 75 76",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 66 03 47 64 13 F9 AA 85   D4 47 C9 6D 7F 71 4B 4E  f.Gd.....G.m.qKN
#               0010: F9 A3 86 E9 A8 0E 07 56   D7 8D FB 85 98 5C 2B 34  .......V.....\+4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.274 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "44 B7 18 BB BA 39 83 6E F5 FC 2E 3F 7C 46 0E 3A B1 1F 86 D6 F5 55 D3 20 93 20 85 1D A7 2E E1 2E",
#     "session id"          : "34 7C 95 09 B4 62 DA EF 92 BE 32 C2 78 DD AD EC D0 FD B5 DE 57 F5 3D EA 4C A5 BE E3 81 F4 75 76",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 B7 AD E7 91 6C 3E ED   C8 6C 73 F4 CC A0 70 EA  p....l>..ls...p.
#             0010: 9F C1 73 88 E7 3C 3F 01   A7 66 E4 FF C2 5D 3A 2A  ..s..<?..f...]:*
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.275 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.275 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.277 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.278 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.280 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.287 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.289 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.293 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.293 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.294 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:31.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:35:31.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 17:35:31.296 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certi

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 17:36:50.719 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:36:50.761 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:36:50.761 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:36:50.761 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 17:36:50.762 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:39396/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28186ms
ok 65 stop command for single port in 31233ms
ok 66 status detects locally running solr in 14721ms
ok 67 status does not expose cli parameters to end user in 219ms
ok 68 listing out files in 2210ms
ok 69 copying files around in 6639ms
ok 70 upconfig in 2662ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
ok 73 Cleanup in 1226ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 55s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m20s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5547 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5547/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34861/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 15:36:52.968; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 15:36:52.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 15:36:53.919; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 15:36:53.963; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22649ms
ok 61 start solr with client truststore and security manager in 24982ms
not ok 62 start solr with mTLS needed in 56938ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZxhVS7/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34861.
#
# Started Solr server on port 34861 (pid=201619). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34862.
#
# Started Solr server on port 34862 (pid=202042). Happy searching!
#
# INFO  - 2023-09-26 15:38:16.695; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 15:38:16.700; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 15:38:17.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 15:38:17.065; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 15:38:17.066; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:17.097 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 32 42 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:52.000 UTC",
#     "not  after"         : "2023-12-25 15:37:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 1D 9B 0B 8E EE B7 2C   1C 49 31 39 C6 D0 3D 8F  9......,.I19..=.
#         0010: 60 57 7D DF                                        `W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:17.102 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 9F 25 ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:44.000 UTC",
#     "not  after"         : "2023-12-25 15:37:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:17.116 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:17.350 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:17.352 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:17.352 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.357 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.369 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:17.372 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 8B 07 12 56 A4 8E 95 D7 0D BD 21 46 4B 74 7B 15 23 B4 3D 50 C6 73 98 94 6B 59 8C C5 A0 2B 15",
#   "session id"          : "1B B5 E1 D5 18 2A 17 94 1B FF 04 C9 2D DB 84 83 4E A5 BC 53 6B 32 37 30 1C 17 6F 18 69 AC DC 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D0 9B 1C 93 DA B9 7F CC   A4 EC 3C C7 EF 22 5C A1  ..........<.."\.
#             0010: FF 17 67 AA 3C 8B 6D 2C   E8 D1 8E BC A9 97 11 2D  ..g.<.m,.......-
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.484 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "39 3E 63 D8 F1 FD 7E 19 8C E2 3D 9D 08 58 B3 7B CF B1 72 32 3E 1E 2A 05 A6 AD A5 01 8F 07 5D 10",
#   "session id"          : "1B B5 E1 D5 18 2A 17 94 1B FF 04 C9 2D DB 84 83 4E A5 BC 53 6B 32 37 30 1C 17 6F 18 69 AC DC 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 77 82 A2 CB 7D EB F2 2A   C2 8D 69 E8 09 20 7B D7  w......*..i.. ..
#           0010: 1C 0A 1C E2 A4 2C EE 64   4B 55 C5 BD 0A 87 4F 3E  .....,.dKU....O>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.484 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.485 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.486 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.486 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.486 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.486 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.486 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.487 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.487 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.488 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.488 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.489 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.498 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.499 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.500 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.504 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.504 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.504 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.505 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.507 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.507 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.507 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.508 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.508 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.509 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.509 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.512 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 D8 DC 6D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:48.000 UTC",
#       "not  after"         : "2023-12-25 15:37:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 36 D4 BD A3 68 35 61   48 97 77 BB E7 6D 36 9C  )6...h5aH.w..m6.
#           0010: 5D AE E8 FB                                        ]...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.512 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:17.570 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:17.571 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:17.571 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:17.571 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.597 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.600 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 0C C0 6B BE BD FB 70   95 54 52 37 DC E7 56 E5  D..k...p.TR7..V.
#     0010: 2C 63 67 7C 63 7E 4B EA   0F C1 A2 3A 84 B4 63 25  ,cg.c.K....:..c%
#     0020: 62 E9 9E 6D D7 7A 99 17   EE D9 CD C4 39 EC D6 94  b..m.z......9...
#     0030: 32 75 89 D5 6D A0 CB 0D   2E 51 02 8E 5E 8A 07 DF  2u..m....Q..^...
#     0040: 68 2C D4 B9 2C C4 D7 D0   76 21 4E 46 A1 31 C2 60  h,..,...v!NF.1.`
#     0050: 6C E5 59 8A 06 D6 5D FB   78 7B F3 97 84 21 79 84  l.Y...].x....!y.
#     0060: 89 38 E5 FE 6C 89 F0 4F   E3 25 AC E9 7A DF A7 5D  .8..l..O.%..z..]
#     0070: 38 49 99 75 DE FA C0 E8   63 BF 5C 66 D0 71 AA 5C  8I.u....c.\f.q.\
#     0080: 3B D6 D9 BD E2 82 1C 85   4A DF E2 D3 4A 95 FD 75  ;.......J...J..u
#     0090: 39 6B 0D 31 68 F9 21 BD   13 ED 8A 5B 37 B8 11 99  9k.1h.!....[7...
#     00A0: 4A 01 33 D1 AF 8C 91 FA   35 1C 40 E3 7D C2 E4 38  J.3.....5.@....8
#     00B0: 80 1E 73 0C 04 36 74 80   9A 22 6E 19 D8 4E 4B E9  ..s..6t.."n..NK.
#     00C0: 55 4E 1B D7 62 61 E4 D5   CD BC E8 8E 2E 49 DB 27  UN..ba.......I.'
#     00D0: 7E A7 CF 3D 52 A5 AC AA   70 03 6C 99 12 33 CC 47  ...=R...p.l..3.G
#     00E0: 34 05 E3 09 EE B6 A8 F4   A9 D7 B4 EF 28 C1 F9 E1  4...........(...
#     00F0: 7E 90 5A DF 41 83 4B 5B   A6 C6 D4 BE 0D 4E 5E AA  ..Z.A.K[.....N^.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.602 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E 4A F4 60 FC 61 67 8A   2D 8A 6F 6C 16 59 DE EB  .J.`.ag.-.ol.Y..
#     0010: 92 23 04 A2 8D F4 A9 C3   21 CE 6D 30 D6 53 54 49  .#......!.m0.STI
#     0020: 5E 6B EF 98 09 E3 58 46   99 84 3F 23 16 2A 2D 19  ^k....XF..?#.*-.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.604 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:17.605 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.605 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:17.606 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.606 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:17.606 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:17.607 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.607 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.610 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 32 42 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:52.000 UTC",
#       "not  after"         : "2023-12-25 15:37:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 1D 9B 0B 8E EE B7 2C   1C 49 31 39 C6 D0 3D 8F  9......,.I19..=.
#           0010: 60 57 7D DF                                        `W..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 6F DE 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:46.000 UTC",
#       "not  after"         : "2023-12-25 15:37:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#           0010: C7 74 F6 6C                                        .t.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.635 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 ED 40 39 44 11 4A 21   CC 7F BC AD 11 B1 58 D4  Q.@9D.J!......X.
#     0010: CE B0 44 33 46 1E BF FF   E1 2F D6 5B 3F 38 98 07  ..D3F..../.[?8..
#     0020: 3F DD EA 92 F9 45 6F 06   A3 79 6B B6 C8 A1 57 8E  ?....Eo..yk...W.
#     0030: 7C DF AC 5B 8B 85 61 5B   C4 B0 A8 3B D5 68 E7 BC  ...[..a[...;.h..
#     0040: C6 3A 94 2A 12 89 7A 60   B3 2B B7 26 7B D5 ED 59  .:.*..z`.+.&...Y
#     0050: AB AD AA BC B5 58 F3 BC   47 75 1A D7 8B A9 6F D9  .....X..Gu....o.
#     0060: 60 16 FB D4 CE 43 40 C3   2A 85 89 6B C2 D1 CE E7  `....C@.*..k....
#     0070: 9D 6E 5B 0D 4C 57 76 BC   63 7E 38 BC 8E 77 94 07  .n[.LWv.c.8..w..
#     0080: 1C C5 6B C6 14 D9 4D 78   D3 DC 67 87 8E B1 45 57  ..k...Mx..g...EW
#     0090: AF 29 55 3E BE 23 1C 30   98 A2 8C 6A F1 59 7E 7D  .)U>.#.0...j.Y..
#     00A0: 89 44 A5 59 ED 23 DB 65   B1 26 A5 DA AA 18 BD AF  .D.Y.#.e.&......
#     00B0: 57 BC 16 0E E4 E1 29 80   C9 26 0F 00 11 0F 69 3A  W.....)..&....i:
#     00C0: 16 72 D4 8F 1A AB FE 72   EE 4F F2 62 EE E8 E5 07  .r.....r.O.b....
#     00D0: F1 9E 7E C8 13 1A 0E 7D   D3 89 55 F7 EE 6C 05 56  ..........U..l.V
#     00E0: C0 1C 0E D5 42 FD AF C5   B4 52 3C ED 7E 01 61 FB  ....B....R<...a.
#     00F0: B3 A0 D7 0B 94 05 E2 F2   42 F9 74 39 7A E2 1F B3  ........B.t9z...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.636 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 56 D7 4F 2A A8 42 10 87   B9 C4 34 B3 3A E4 61 9C  V.O*.B....4.:.a.
#     0010: 1B 06 F7 6B 9E 4A A9 5D   37 C3 F5 C6 B0 F1 67 B1  ...k.J.]7.....g.
#     0020: BD 8E 0F 6E F8 68 78 34   9A DC 19 DC C6 28 7F 25  ...n.hx4.....(.%
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.637 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:17.687 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8B B9 BF EE 84 86 5B 25 F6 09 6E 37 5D 17 43 F7 91 A3 C3 96 66 35 14 BE 77 B2 FF ED CA BB 92 08",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 15:38:17.962 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 15:38:17.963 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 15:38:18.891; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 15:38:18.897; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 15:38:19.277; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 15:38:19.280; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 15:38:19.281; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZxhVS7/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:19.312 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 32 42 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:52.000 UTC",
#     "not  after"         : "2023-12-25 15:37:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 39 1D 9B 0B 8E EE B7 2C   1C 49 31 39 C6 D0 3D 8F  9......,.I19..=.
#         0010: 60 57 7D DF                                        `W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:19.316 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2C 9F 25 ED",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:44.000 UTC",
#     "not  after"         : "2023-12-25 15:37:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:19.331 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:19.422 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:19.422 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:19.422 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:19.423 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:19.561 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:19.563 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:19.563 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.568 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.580 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:19.582 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5A B9 20 55 68 8E F9 7E 84 64 A9 23 AC A1 08 73 86 1F 06 05 86 CB 84 ED 1B 7C 8E 5C CF CB 99 E8",
#   "session id"          : "5F F7 51 8A BE AD DD 3F B1 F0 C9 15 BB 06 1D 2B 1B 86 73 29 8E 7A E7 86 B4 76 D3 48 83 E3 51 90",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 38 86 94 FB 9A 99 4E 5B   8B 11 32 D7 FE AE 79 41  8.....N[..2...yA
#             0010: 51 92 71 FA EB D8 9A 91   BA 08 FB D1 67 9A 16 62  Q.q.........g..b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.692 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 7C 5D 09 EC BF CD 09 17 EF DF 87 A5 A1 A4 6F 4D E9 5C 53 16 59 CC C6 0D CF 2F 31 FD 4D 7B 85",
#   "session id"          : "5F F7 51 8A BE AD DD 3F B1 F0 C9 15 BB 06 1D 2B 1B 86 73 29 8E 7A E7 86 B4 76 D3 48 83 E3 51 90",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E5 7F 59 04 D6 86 99 BA   00 4F 50 7A 21 1B 07 A5  ..Y......OPz!...
#           0010: 18 AF 8F A3 35 BC A0 54   E9 92 5C 79 23 AC 28 4E  ....5..T..\y#.(N
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.693 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.693 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.695 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.695 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.697 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.697 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.697 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.698 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.707 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.708 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.712 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.712 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.712 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.712 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.713 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.713 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.713 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.713 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.715 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.715 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.715 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.715 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.716 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.717 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.717 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.720 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 D8 DC 6D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:48.000 UTC",
#       "not  after"         : "2023-12-25 15:37:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 29 36 D4 BD A3 68 35 61   48 97 77 BB E7 6D 36 9C  )6...h5aH.w..m6.
#           0010: 5D AE E8 FB                                        ]...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.721 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.806 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "20 6F DE 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 15:37:46.000 UTC",
#     "not  after"         : "2023-12-25 15:37:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#         0010: C7 74 F6 6C                                        .t.l
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#         0010: 90 69 12 0A                                        .i..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.810 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 28 3F 27 FB D2 4A 42 BE   47 D3 77 A6 2B 56 78 88  (?'..JB.G.w.+Vx.
#     0010: 0D F6 DD 8D 9F 66 B3 4C   81 AB 8A 64 B6 AD 98 CC  .....f.L...d....
#     0020: 50 FE C6 B8 88 C8 84 DD   43 5F 22 59 FF 6D B5 80  P.......C_"Y.m..
#     0030: 4D AB 53 3B A0 DE C7 46   28 03 4F BF 09 08 75 37  M.S;...F(.O...u7
#     0040: 0B 21 DE 23 83 A3 47 06   31 73 7C 1A 53 9D 0C E1  .!.#..G.1s..S...
#     0050: DB F2 69 BD 0E BE 4E CE   BA 64 E4 4F 2A 0B 92 62  ..i...N..d.O*..b
#     0060: 60 EB 8C F2 60 80 FE 5A   B5 90 31 AF A1 E2 E9 EC  `...`..Z..1.....
#     0070: 88 8D 0F 1E FC 31 07 16   10 04 AC D0 5D D3 EE 34  .....1......]..4
#     0080: F0 EB 7E 73 5B 06 50 13   02 8D C6 BC 40 DD 24 70  ...s[.P.....@.$p
#     0090: 14 80 69 FF 50 8B CE E8   24 A6 BC 39 02 7E C5 CB  ..i.P...$..9....
#     00A0: 48 1B A8 49 5F 82 FB 68   0B 02 8C 4F E2 19 A6 1E  H..I_..h...O....
#     00B0: 2D 82 BF B1 A9 10 05 9D   FE 71 01 9F 43 6F 59 C8  -........q..CoY.
#     00C0: 72 1D B8 CF 26 80 FA FA   68 1F DF BA A0 0D 62 44  r...&...h.....bD
#     00D0: 33 67 5A 52 53 DD C0 E3   CF 09 F1 C6 20 B5 E7 63  3gZRS....... ..c
#     00E0: 39 C2 4F E8 A4 5D 4D 50   DC FF 89 45 99 6E 62 1D  9.O..]MP...E.nb.
#     00F0: CE C5 86 33 66 95 52 51   18 E5 EB 28 C0 AF 24 0C  ...3f.RQ...(..$.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.812 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 96 1C 21 90 B2 F8 0D   DE A3 E9 40 8D B1 CE 38  ...!.......@...8
#     0010: D6 B0 64 6B A5 55 6C 11   1A 9E 08 E6 4E E9 32 1E  ..dk.Ul.....N.2.
#     0020: CD 12 B5 04 E3 37 93 8E   57 9E 85 DE BE 2A 0D C5  .....7..W....*..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.814 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:19.815 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.816 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:19.816 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.816 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 15:38:19.816 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:19.817 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.817 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.820 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 32 42 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:52.000 UTC",
#       "not  after"         : "2023-12-25 15:37:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 39 1D 9B 0B 8E EE B7 2C   1C 49 31 39 C6 D0 3D 8F  9......,.I19..=.
#           0010: 60 57 7D DF                                        `W..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 6F DE 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:46.000 UTC",
#       "not  after"         : "2023-12-25 15:37:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#           0010: C7 74 F6 6C                                        .t.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.846 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 C1 AD 56 0E 79 5E 25   77 78 BA 83 66 1B 1E B9  r..V.y^%wx..f...
#     0010: 6A B9 89 59 06 40 DA 89   DE 79 FE 52 E8 43 43 65  j..Y.@...y.R.CCe
#     0020: 6E 7D 7A 51 85 D4 D0 4D   37 A1 EA 64 E7 24 95 A3  n.zQ...M7..d.$..
#     0030: AD E7 DD BA 72 D8 C8 42   52 DB 28 9B 6E F2 24 12  ....r..BR.(.n.$.
#     0040: 22 47 48 E8 9C F1 11 3A   4B AA 50 9A 79 76 E6 7B  "GH....:K.P.yv..
#     0050: 1F 9C 38 FB 88 D9 C8 F3   BD 6C DC 15 B3 1E B0 E6  ..8......l......
#     0060: 9A 30 81 46 8B 81 2C 23   D9 B9 3D 24 6C B5 73 81  .0.F..,#..=$l.s.
#     0070: 16 C8 DA D6 4B 1B 5E 35   9E B4 0D 60 30 1A 90 37  ....K.^5...`0..7
#     0080: 90 C0 87 8E 10 DF 8E 38   CD 1C 8B 0C 66 B3 EA 37  .......8....f..7
#     0090: F5 4C 3B CA 69 73 89 D0   17 0A 9C 75 5E 5A 63 D2  .L;.is.....u^Zc.
#     00A0: 9D 00 29 F6 BF E4 57 6B   E9 32 FA 6A 1C FF EE 40  ..)...Wk.2.j...@
#     00B0: 6F 7F C7 EB 74 F7 4D 4E   D4 D2 E7 20 24 EE 6C B0  o...t.MN... $.l.
#     00C0: 9B 2C 0E EE 3F 32 5F 7F   BD 27 A0 D3 88 08 E4 C7  .,..?2_..'......
#     00D0: AB 97 47 CC 75 D0 DB C1   B9 02 9D 8F A2 2B 4F AA  ..G.u........+O.
#     00E0: F0 29 D3 A8 EC 20 3B 24   FF EF CB F8 FC C8 3F F6  .)... ;$......?.
#     00F0: 21 6B 49 EA C7 5E E2 EB   D0 94 62 BC E4 8A 84 37  !kI..^....b....7
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.848 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 07 E7 30 AE 3C BB 8A D7   D6 B1 D2 FE 20 43 8F 6E  ..0.<....... C.n
#     0010: 3F F3 F0 85 0E 0E 8B 13   10 D1 DE C1 F9 AA 7D 3E  ?..............>
#     0020: C5 76 55 40 8D DD 4D B0   EF 5C C7 79 3E 0B 6E CE  .vU@..M..\.y>.n.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.849 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:19.902 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "11 F1 F4 F6 FE 70 98 77 21 9B A1 F1 88 28 F2 72 40 47 04 60 97 17 99 CD 08 83 A7 3B 79 07 C1 57",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 15:38:20.167 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 15:38:20.169 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 15:38:31.451; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:31.807 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 6F DE 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:46.000 UTC",
#       "not  after"         : "2023-12-25 15:37:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#           0010: C7 74 F6 6C                                        .t.l
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA F6 FD 00 4B A4 D1 C1   5D CD 59 A7 B5 1F BA B3  ....K...].Y.....
#           0010: 90 69 12 0A                                        .i..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C 9F 25 ED",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 15:37:44.000 UTC",
#       "not  after"         : "2023-12-25 15:37:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 4E C8 D4 39 67 B0 9B   FB 45 AE E7 DC C5 2C 2E  6N..9g...E....,.
#           0010: C7 74 F6 6C                                        .t.l
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 15:38:31.825 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:32.265 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:32.277 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:32.277 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:38:32.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:32.350 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:32.352 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 15:38:32.352 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.359 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.373 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.373 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.373 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 15:38:32.376 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "53 07 E4 7D 37 30 97 22 09 15 CC AE 08 ED 43 09 97 6B FD 82 A3 3B 8E 71 23 FF 17 D4 8F E0 C7 14",
#     "session id"          : "23 ED 4B 09 77 AE C8 75 21 CC 38 83 24 E1 42 5A D2 60 17 26 90 37 FD 0F D6 D2 C8 C6 93 2A 8E 48",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 63 99 1A 40 0A 6C B6 DD   D0 8A CC D7 9B 5C 8C CF  c..@.l.......\..
#               0010: 1A 7B EB 34 55 71 CB FD   7F 6F 8E 66 AE F3 F0 53  ...4Uq...o.f...S
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.398 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "52 1A 4B 62 5C 5D 17 57 82 CA 31 1C 6B 3E 20 C8 7A C5 50 B2 4B 03 79 88 B7 83 11 61 BF 0E 3E B7",
#     "session id"          : "23 ED 4B 09 77 AE C8 75 21 CC 38 83 24 E1 42 5A D2 60 17 26 90 37 FD 0F D6 D2 C8 C6 93 2A 8E 48",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 38 E8 ED 36 ED 2F F1 74   AE FD 73 05 C7 A2 75 30  8..6./.t..s...u0
#             0010: 49 86 FA EB C2 38 AD FE   61 0C 3E 9C 23 88 A3 45  I....8..a.>.#..E
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.398 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.399 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.400 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.401 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.401 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.404 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.404 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.404 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.405 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:32.406 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:32.406 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.415 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.417 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.418 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.422 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.422 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.422 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.422 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.423 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:32.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:38:32.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 15:38:32.425 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 15:39:51.141 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:39:51.189 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:39:51.190 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:39:51.190 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 15:39:51.190 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34862/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28438ms
ok 65 stop command for single port in 31172ms
ok 66 status detects locally running solr in 14347ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2198ms
ok 69 copying files around in 6602ms
ok 70 upconfig in 2655ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1227ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 47s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m11s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5546 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5546/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:38009/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 13:21:12.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 13:21:12.962; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 13:21:13.911; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 13:21:13.953; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23644ms
ok 61 start solr with client truststore and security manager in 26164ms
not ok 62 start solr with mTLS needed in 57447ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-1eaw9F/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38009.
#
# Started Solr server on port 38009 (pid=198990). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 38010.
#
# Started Solr server on port 38010 (pid=199416). Happy searching!
#
# INFO  - 2023-09-26 13:22:39.067; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 13:22:39.073; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 13:22:39.463; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 13:22:39.466; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 13:22:39.466; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:39.499 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 0E A7 06",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:15.000 UTC",
#     "not  after"         : "2023-12-25 13:22:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 A4 5E 7D 83 DD 18 B1   D1 40 BF DA F2 8B 20 36  g.^......@.... 6
#         0010: 08 46 56 76                                        .FVv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:39.504 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 12 15 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:06.000 UTC",
#     "not  after"         : "2023-12-25 13:22:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:39.519 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:39.633 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:39.634 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:39.634 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:39.634 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:39.757 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.757 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:39.759 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:39.760 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.765 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.777 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.778 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:39.780 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "51 13 5B AB 9F 94 A4 2F C3 05 DD EE 73 57 E0 F3 13 CE DC 5B DE 09 0E BA 13 85 D9 DB 7C 03 99 C7",
#   "session id"          : "4D 73 5C 58 E0 CB 08 61 A6 A6 0B 58 86 5C A6 68 3B B2 95 08 EF A8 A2 D9 30 8F D3 A0 84 28 B5 3B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9A 9F D6 5D 4D 6F 88 E4   42 B2 49 4D 52 C3 A1 27  ...]Mo..B.IMR..'
#             0010: 0C 8A D1 52 0A A0 BC B2   5D EB B7 68 03 F7 85 25  ...R....]..h...%
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.900 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4D 30 26 3D 76 5E 1B C5 CF E9 0B BD 62 80 87 66 19 F7 DB 5E 53 3F D5 16 63 F0 0F B0 D8 1D 3F F1",
#   "session id"          : "4D 73 5C 58 E0 CB 08 61 A6 A6 0B 58 86 5C A6 68 3B B2 95 08 EF A8 A2 D9 30 8F D3 A0 84 28 B5 3B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3B 46 C7 88 F7 24 9B B1   90 EE 67 75 AE EB 7B 3C  ;F...$....gu...<
#           0010: 62 CE 20 C0 FD C7 DA EE   FE 54 89 36 03 4A AE 00  b. ......T.6.J..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.900 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.901 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.902 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.903 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.905 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.905 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.905 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.905 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.905 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.906 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.907 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.914 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.916 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.917 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.921 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.922 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:39.922 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:39.922 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.923 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.924 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.924 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.924 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.925 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.926 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:39.926 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.929 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A FD E8 F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:11.000 UTC",
#       "not  after"         : "2023-12-25 13:22:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 45 B9 7F D0 51 07 2F   AE 4F 71 D0 69 C4 4D 10  .E...Q./.Oq.i.M.
#           0010: 15 E5 62 64                                        ..bd
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:39.929 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.026 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.030 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 57 E7 ED FF 41 1F CD   AD 99 EE 57 88 50 E6 BD  oW...A.....W.P..
#     0010: AE 43 6B 1B F0 A9 9A FD   ED 4B 93 05 D6 3A D8 4C  .Ck......K...:.L
#     0020: 07 25 DF 61 F3 8A 90 34   BD AD 6B F4 9C 1D 8D AB  .%.a...4..k.....
#     0030: D0 8A 6F B1 11 2A 54 65   11 B5 8F FE 65 A6 25 58  ..o..*Te....e.%X
#     0040: DE 98 C2 B2 68 12 C0 93   1E 63 A4 48 CB 40 C3 43  ....h....c.H.@.C
#     0050: 65 6B 60 DF 4B 1B 63 C0   AF E5 8C DD CA EC 3C 74  ek`.K.c.......<t
#     0060: 19 A0 90 36 DA 97 4D CF   89 A3 16 F8 3A A4 23 4B  ...6..M.....:.#K
#     0070: 15 DC 01 67 DD 01 CF 51   F5 2E C3 26 27 16 50 00  ...g...Q...&'.P.
#     0080: D1 5B 4C AE 86 47 E5 AE   E4 2F BB E4 24 11 2E C3  .[L..G.../..$...
#     0090: F6 88 6C AB 5A F2 14 3B   8D 58 75 30 33 E6 D2 BE  ..l.Z..;.Xu03...
#     00A0: 56 59 14 A8 B0 58 69 D6   64 5A 9A C1 AE 40 2A DB  VY...Xi.dZ...@*.
#     00B0: 0E A4 55 01 42 B1 66 39   44 53 DD 5B 72 41 35 3F  ..U.B.f9DS.[rA5?
#     00C0: 51 B4 A1 85 9C 08 DB 0E   88 7C 95 B1 A3 2D 2F DE  Q............-/.
#     00D0: 99 19 C4 72 52 47 31 75   57 3E 07 E5 C9 81 9E 0A  ...rRG1uW>......
#     00E0: 0B 09 48 5E A6 49 11 41   6F 75 E9 C6 4F B3 61 00  ..H^.I.Aou..O.a.
#     00F0: 52 FD 90 58 5E 24 15 F6   A7 50 5E 43 F0 D8 DD 0C  R..X^$...P^C....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.032 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 35 F4 83 DA F1 9F F1   45 86 64 AA 36 C7 9F B9  .5......E.d.6...
#     0010: 77 7E 97 DF 75 C9 51 3D   87 44 6D 70 73 59 16 F1  w...u.Q=.DmpsY..
#     0020: C7 E4 6F 4A 82 21 C5 11   2E 77 F9 AC A4 2D 0A 9F  ..oJ.!...w...-..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.035 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:40.036 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:40.036 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:40.036 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:40.036 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:40.037 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:40.037 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.037 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.040 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 0E A7 06",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:15.000 UTC",
#       "not  after"         : "2023-12-25 13:22:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 A4 5E 7D 83 DD 18 B1   D1 40 BF DA F2 8B 20 36  g.^......@.... 6
#           0010: 08 46 56 76                                        .FVv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 A3 5A 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:08.000 UTC",
#       "not  after"         : "2023-12-25 13:22:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#           0010: 47 69 53 38                                        GiS8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.064 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 47 D7 AD 0F 98 19 41 58   3D BD CB 92 59 8A 31 F4  G.....AX=...Y.1.
#     0010: 34 33 A5 A1 54 25 15 AC   3E 11 EB A0 7E EE 7E AC  43..T%..>.......
#     0020: 29 5F 6F F3 E7 06 7D 57   2D 76 44 90 7D 38 91 BB  )_o....W-vD..8..
#     0030: F6 0B D5 73 F5 1C A9 09   86 8E 05 64 1A A8 BC FD  ...s.......d....
#     0040: A5 5C EF D8 5D 15 CB D5   74 A8 F1 D8 F2 D5 1C 4E  .\..]...t......N
#     0050: E6 BE AC 41 F9 46 20 F3   85 39 4C 42 4C 28 4F 5C  ...A.F ..9LBL(O\
#     0060: 93 9A AF 72 29 8A 0A 0F   97 3A C3 DD A6 BF 6E 8B  ...r)....:....n.
#     0070: 24 AE 7F 64 60 84 49 4A   AC D0 F9 3B 99 0E 22 85  $..d`.IJ...;..".
#     0080: 2B 4A B0 B2 46 22 96 D9   D9 C2 8F 5B 2B 91 72 04  +J..F".....[+.r.
#     0090: C2 3A BA 06 E7 10 8A C1   A1 E6 E8 85 0F 05 65 5A  .:............eZ
#     00A0: 51 E3 A2 C6 BC 91 3E 1F   AF 74 44 A0 38 2D 3A 36  Q.....>..tD.8-:6
#     00B0: BA 3A BF 5E 2A DE C1 27   D5 37 33 C1 83 4A AA 15  .:.^*..'.73..J..
#     00C0: 99 E2 81 2A 33 3D A4 20   68 D2 8C D3 78 73 F3 46  ...*3=. h...xs.F
#     00D0: E8 67 8A AE 43 8D E9 7D   C1 E2 07 39 3F 9F F1 44  .g..C......9?..D
#     00E0: D6 AA F1 31 0C 57 52 4B   75 FB 96 EE B4 27 A5 3F  ...1.WRKu....'.?
#     00F0: 7D 60 74 27 C0 BF FB 0B   A1 66 38 CA 2E 1F D0 B6  .`t'.....f8.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.066 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B 52 F1 C3 18 AC 91 2B   0D 35 78 C6 6A 3C AF 78  +R.....+.5x.j<.x
#     0010: E6 30 0A 37 5F 3E 08 93   73 BA 43 27 C1 BC 63 A2  .0.7_>..s.C'..c.
#     0020: 81 DB C2 F5 DE 6C 75 0B   D6 C2 4D BC AA 81 5F 61  .....lu...M..._a
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.066 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:40.115 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA 9C CC 73 9F A3 85 5E 66 B0 74 48 79 48 78 53 95 FF 19 72 F7 16 B3 07 6F 93 A2 B5 58 17 8F DD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 13:22:40.406 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 13:22:40.407 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 13:22:41.385; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 13:22:41.390; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 13:22:41.757; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 13:22:41.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 13:22:41.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-1eaw9F/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:41.793 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "45 0E A7 06",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:15.000 UTC",
#     "not  after"         : "2023-12-25 13:22:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 A4 5E 7D 83 DD 18 B1   D1 40 BF DA F2 8B 20 36  g.^......@.... 6
#         0010: 08 46 56 76                                        .FVv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:41.797 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 12 15 43",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:06.000 UTC",
#     "not  after"         : "2023-12-25 13:22:06.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:41.812 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:41.901 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:41.902 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:41.902 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:41.902 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:42.046 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:42.048 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:42.048 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.054 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.066 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.066 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.067 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:42.069 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 FB 54 C8 01 EF B4 78 7D 13 70 8E 6F 0A 8E EB 05 66 97 C0 D0 E3 01 B9 A7 9A 67 28 48 87 8C D1",
#   "session id"          : "73 24 B7 1A 78 CF 4E 84 D0 10 63 40 B8 5E E6 DC 74 FB AC 16 B8 71 F4 50 FF 60 7F AE 03 60 7C 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F1 F8 18 FE FB 35 F7 99   DF 32 5D F9 75 7C 35 0F  .....5...2].u.5.
#             0010: 42 4A 7C 91 B8 73 0D FC   75 0E 4D A4 2F CE D9 62  BJ...s..u.M./..b
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.183 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "75 2E B5 CD DF 51 95 92 BE B7 03 86 A6 BD A6 1E 15 5C 50 E8 46 09 BA 71 62 DF 99 48 26 46 88 C4",
#   "session id"          : "73 24 B7 1A 78 CF 4E 84 D0 10 63 40 B8 5E E6 DC 74 FB AC 16 B8 71 F4 50 FF 60 7F AE 03 60 7C 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7F 4C 30 32 40 58 AE 23   A3 A7 39 68 1B BB 47 3C  .L02@X.#..9h..G<
#           0010: 2C C1 FC AA C8 95 FA CE   D4 8C 97 52 2A 70 51 5D  ,..........R*pQ]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.183 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.183 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.185 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.187 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.188 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.188 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.197 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.198 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.199 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.203 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.203 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.203 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.203 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.204 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.204 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.206 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.206 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.206 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.207 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.207 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.208 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.208 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.211 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A FD E8 F7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:11.000 UTC",
#       "not  after"         : "2023-12-25 13:22:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 82 45 B9 7F D0 51 07 2F   AE 4F 71 D0 69 C4 4D 10  .E...Q./.Oq.i.M.
#           0010: 15 E5 62 64                                        ..bd
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.296 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 A3 5A 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 13:22:08.000 UTC",
#     "not  after"         : "2023-12-25 13:22:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#         0010: 47 69 53 38                                        GiS8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#         0010: C6 5D 08 15                                        .]..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.300 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 59 CC 29 6B 44 56 8D C8   C4 B4 5E A1 E7 70 D8 CF  Y.)kDV....^..p..
#     0010: F7 8E 9F E8 B7 73 D2 CA   1E B5 41 20 A7 49 B9 67  .....s....A .I.g
#     0020: D9 B4 E4 03 D6 58 AC B6   25 DE EA CC 8D C0 6A 2A  .....X..%.....j*
#     0030: BD C9 07 26 48 49 05 A7   47 8C 30 28 3D CC 2D 9D  ...&HI..G.0(=.-.
#     0040: EB B0 13 6C 5D 89 53 16   38 00 B0 A3 D6 03 2D 96  ...l].S.8.....-.
#     0050: 4F EB 99 0B B8 69 00 0E   83 9C 9F D0 AE 5A 84 85  O....i.......Z..
#     0060: 75 F2 8E 87 FC 00 EC A7   40 CD 9E DA 1B 35 57 0F  u.......@....5W.
#     0070: F8 1A 15 62 F7 FE 0D B4   EA B2 C7 56 82 C3 EA BB  ...b.......V....
#     0080: 5F 73 83 AA 58 48 93 F1   CB A7 1B F8 79 42 E9 B6  _s..XH......yB..
#     0090: B9 A5 95 37 56 50 2C 17   FA 30 8C 0D A3 8A E5 79  ...7VP,..0.....y
#     00A0: 81 80 C3 AA DB ED D8 42   C6 A5 A6 0F 1C 23 83 44  .......B.....#.D
#     00B0: 5B B5 69 5C 4B 03 19 CD   43 66 BE 90 ED 68 24 3F  [.i\K...Cf...h$?
#     00C0: 56 54 E8 4E A3 FB 9B F8   2C 92 F3 CA A5 8E 75 A6  VT.N....,.....u.
#     00D0: 9E D9 80 9C 71 8B 66 EC   87 0B 07 BE CE 81 CA 38  ....q.f........8
#     00E0: 77 1F FB 0D 11 93 6E 14   B7 61 BB E1 FC 52 FF 23  w.....n..a...R.#
#     00F0: 34 9B 97 F7 65 0D 1F E3   E6 08 8F B8 43 2F D0 31  4...e.......C/.1
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.301 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 03 F5 D1 68 49 11 1F   A5 BE 80 AA 19 68 DD 96  ....hI.......h..
#     0010: 22 1D 82 47 6E 57 5E 93   83 BF 37 9E 3B F6 C2 18  "..GnW^...7.;...
#     0020: 51 A8 08 C3 BF 38 1C 88   97 4E A8 0A 05 5A A9 5C  Q....8...N...Z.\
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.304 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:42.305 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.305 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:42.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 13:22:42.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:42.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.307 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.309 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 0E A7 06",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:15.000 UTC",
#       "not  after"         : "2023-12-25 13:22:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 A4 5E 7D 83 DD 18 B1   D1 40 BF DA F2 8B 20 36  g.^......@.... 6
#           0010: 08 46 56 76                                        .FVv
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 A3 5A 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:08.000 UTC",
#       "not  after"         : "2023-12-25 13:22:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#           0010: 47 69 53 38                                        GiS8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.336 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 85 37 71 2A B9 9A 97 E9   4F D8 F3 9A EF F7 CD 1E  .7q*....O.......
#     0010: 3C 1F D5 56 E1 ED A0 5F   2F B7 F6 84 A7 D1 55 AC  <..V..._/.....U.
#     0020: EE 91 E4 81 E0 65 8B E4   B8 2B E2 74 03 3F 7C 37  .....e...+.t.?.7
#     0030: D7 25 AE E6 8D 16 BF 18   F9 67 5D 6E 4A 75 7E 6A  .%.......g]nJu.j
#     0040: C3 1D 72 85 13 B5 CA 3A   1B 31 CD 95 EB 12 28 F9  ..r....:.1....(.
#     0050: 65 15 D2 AE AF CF A1 45   8A 2C 8F B5 40 80 64 F1  e......E.,..@.d.
#     0060: AF 09 76 43 D6 5C 33 D5   4D 5C 56 8D A6 47 91 59  ..vC.\3.M\V..G.Y
#     0070: B9 7D EF 55 16 99 1A F9   D9 15 37 66 BD EE 17 F1  ...U......7f....
#     0080: 95 F2 63 17 37 BE 31 C3   33 7B E5 E3 70 96 4C D7  ..c.7.1.3...p.L.
#     0090: 2E 63 C2 D8 CB 3A 40 FE   81 1C FA D3 27 1C 1C 4E  .c...:@.....'..N
#     00A0: 03 65 A2 DC 74 6E 7C D9   32 D3 B5 6C C5 49 41 65  .e..tn..2..l.IAe
#     00B0: 81 8C 16 B3 DC 71 4E A1   DD E0 E9 FD 63 C0 C4 EB  .....qN.....c...
#     00C0: 29 E2 F8 4D 45 F9 C3 60   68 21 A3 62 DD E3 44 95  )..ME..`h!.b..D.
#     00D0: C4 7B 95 49 D7 F2 2C 4E   C6 DF 95 8A B9 01 D8 07  ...I..,N........
#     00E0: B3 BD 32 7C 5F F8 5E 43   8B D8 3A B2 10 CE D8 EC  ..2._.^C..:.....
#     00F0: 1D AF 24 1B F8 7E D0 34   31 68 EB 7D C5 4C 6B 38  ..$....41h...Lk8
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.337 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 7F 36 F3 73 24 CD 34   7C FC 91 7C A8 4F A7 38  ..6.s$.4.....O.8
#     0010: FE 18 33 EA 07 8C 52 1F   9C B0 3D C2 D8 DA 6D 7E  ..3...R...=...m.
#     0020: B5 02 87 AB B0 30 35 D1   BA 4C EA 5E 53 B7 B5 D4  .....05..L.^S...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.338 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:42.388 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 AB EC 51 5D AA E5 38 BD 54 37 2C 05 49 94 A6 68 0D 37 40 49 CF BC C0 F6 AA BD 24 9C 0C F8 C1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 13:22:42.701 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 13:22:42.703 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 13:22:54.279; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:54.605 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 A3 5A 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:08.000 UTC",
#       "not  after"         : "2023-12-25 13:22:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#           0010: 47 69 53 38                                        GiS8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 A7 22 BF 53 25 D1 FE   19 82 A4 EA A5 49 05 20  ..".S%.......I.
#           0010: C6 5D 08 15                                        .]..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 12 15 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 13:22:06.000 UTC",
#       "not  after"         : "2023-12-25 13:22:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 1A 02 3E CE 46 A9 CA   3F 5C 2F 59 29 C2 36 43  ...>.F..?\/Y).6C
#           0010: 47 69 53 38                                        GiS8
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 13:22:54.621 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:54.791 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:54.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:54.794 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:22:54.794 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:54.854 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:54.856 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 13:22:54.856 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.861 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.873 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.873 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 13:22:54.876 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "77 37 88 BA 32 89 34 F7 7C 09 11 F2 84 9F 01 D9 24 2C CC 23 BE 64 39 E5 48 43 33 34 3E 76 94 20",
#     "session id"          : "7A AB F2 EC 9A AA 19 49 FC 39 51 DB 26 79 7B A3 9D 50 59 01 3E B2 E2 89 36 5F AC EA 88 5F 55 8C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D9 C1 73 81 33 2C AE D3   76 18 04 01 0C 24 A9 D7  ..s.3,..v....$..
#               0010: 87 FF 7A DB 4B 10 EF B5   EE CA 1E 92 A0 A8 9A 2D  ..z.K..........-
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.902 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "75 F3 E6 FF 38 02 2A E8 D1 41 B2 5D 31 3A BE 8C B1 99 2F 3E DB D1 B8 29 72 4B C7 3C 35 E9 0F E8",
#     "session id"          : "7A AB F2 EC 9A AA 19 49 FC 39 51 DB 26 79 7B A3 9D 50 59 01 3E B2 E2 89 36 5F AC EA 88 5F 55 8C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 74 E8 83 BA FB AC DC 46   7B 64 95 68 DB 1C 93 00  t......F.d.h....
#             0010: 83 78 C2 7D CF 86 FE 4B   77 F6 42 3C C0 D0 29 72  .x.....Kw.B<..)r
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.903 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.903 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.904 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.904 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.904 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.904 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.905 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.905 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.905 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.905 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.907 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.907 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.907 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.909 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.909 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:54.909 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:54.910 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.910 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.920 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.922 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.924 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:54.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:22:54.929 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 13:22:54.930 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sh

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 13:24:14.278 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:24:14.321 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:24:14.322 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:24:14.323 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 13:24:14.323 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:38010/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28428ms
ok 65 stop command for single port in 31007ms
ok 66 status detects locally running solr in 14469ms
ok 67 status does not expose cli parameters to end user in 222ms
ok 68 listing out files in 2210ms
ok 69 copying files around in 6751ms
ok 70 upconfig in 2703ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1237ms
ok 73 Cleanup in 1231ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 21s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m43s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5545 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5545/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34337/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 11:49:31.124; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 11:49:31.130; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 11:49:32.066; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 11:49:32.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22239ms
ok 61 start solr with client truststore and security manager in 25066ms
not ok 62 start solr with mTLS needed in 58883ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-g4EGUQ/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34337.
#
# Started Solr server on port 34337 (pid=201799). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34338.
#
# Started Solr server on port 34338 (pid=202226). Happy searching!
#
# INFO  - 2023-09-26 11:50:54.292; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 11:50:54.297; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 11:50:54.663; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 11:50:54.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 11:50:54.666; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:54.698 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 29 A1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:30.000 UTC",
#     "not  after"         : "2023-12-25 11:50:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 68 5A 09 EE 61 CC EA   C7 06 44 30 34 97 05 2D  .hZ..a....D04..-
#         0010: AB 19 AF C2                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:54.703 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A CA DC F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:22.000 UTC",
#     "not  after"         : "2023-12-25 11:50:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:54.717 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:54.952 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.953 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:54.954 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:54.955 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.960 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.972 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:54.974 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0A D0 61 18 D3 6D 12 05 30 B6 16 35 45 1F B5 FF F6 C2 6E CD BF 40 50 65 72 42 BE E7 E6 D6 FB BA",
#   "session id"          : "C1 C7 34 39 FA 10 D1 80 34 4A 06 40 89 91 83 4E 96 94 88 D7 14 D6 BE 90 62 1F 66 83 E0 71 54 D2",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A1 43 7F 5A 26 ED AC DA   8D EE 03 1F FF 2B C2 2F  .C.Z&........+./
#             0010: 54 33 C5 9D C1 CB FC CB   D1 EC D3 12 C1 DF AD 3C  T3.............<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.088 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "14 B4 FE BC C3 C0 2F 06 35 4D 7D 00 70 1F F0 26 8B 9A AE 3C 02 51 CD 24 7C D0 A5 4E 9F E5 FC ED",
#   "session id"          : "C1 C7 34 39 FA 10 D1 80 34 4A 06 40 89 91 83 4E 96 94 88 D7 14 D6 BE 90 62 1F 66 83 E0 71 54 D2",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 F8 A7 E5 3D 2A 5E 6F   31 98 A4 31 40 9B 87 DA  ....=*^o1..1@...
#           0010: 7F 9F 83 98 F2 45 4C 3B   7D A7 E7 66 C0 D6 53 75  .....EL;...f..Su
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.088 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.089 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.091 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.092 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.093 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.093 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.093 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.094 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.102 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.103 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.104 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.108 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.108 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.108 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.108 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.109 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.109 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.109 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.110 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.111 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.111 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.111 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.112 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.113 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.113 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.115 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 3F F8 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:26.000 UTC",
#       "not  after"         : "2023-12-25 11:50:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B0 C2 6D 20 36 40 50   7A 6B 67 12 CF 51 9B 97  ...m 6@Pzkg..Q..
#           0010: 0B 4E E8 8E                                        .N..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:55.179 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:55.179 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:55.180 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:55.180 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.201 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 20 60 01 74 51 E7 F5   7D 3E F3 3D 07 8E 4F 0F  . `.tQ...>.=..O.
#     0010: 22 AE E4 42 24 5B 9B 24   5D 3B 8F DC F7 38 AA 87  "..B$[.$];...8..
#     0020: 5B 37 C4 06 E0 79 D2 CB   2F F8 04 D0 1D 3D BE 08  [7...y../....=..
#     0030: 73 F9 BB 79 78 51 86 F6   92 FE B5 45 86 BE FA 6F  s..yxQ.....E...o
#     0040: C5 47 C5 2D 5A A2 F7 ED   D6 65 5E CB 66 AF 77 30  .G.-Z....e^.f.w0
#     0050: C6 29 08 40 D5 8E 75 2B   84 AB C6 80 D1 C4 E7 53  .).@..u+.......S
#     0060: 74 73 F7 BF B9 12 CD 44   02 53 55 A4 93 97 21 9D  ts.....D.SU...!.
#     0070: 0C C1 5B 59 E8 77 3B D6   B2 3E 95 CF 04 A2 F2 EE  ..[Y.w;..>......
#     0080: 12 F2 CF F6 19 50 3C 69   CC 38 70 C4 27 42 2F 12  .....P<i.8p.'B/.
#     0090: F1 B3 BA 84 39 C7 8D 5D   CB 9C 09 9C 17 39 8F 13  ....9..].....9..
#     00A0: FF B2 9B 6A 91 37 02 90   1A 6B 73 C9 22 EC 79 B5  ...j.7...ks.".y.
#     00B0: BF 5B BD 47 59 5E 24 E5   55 51 95 FC E1 17 E0 B6  .[.GY^$.UQ......
#     00C0: 4E 43 57 73 0E EE 3C 64   A4 A4 4D E1 27 10 3F 52  NCWs..<d..M.'.?R
#     00D0: 8E F9 A0 9A 3B 7D 8B 7B   39 CC D6 C5 5E 0A 62 6A  ....;...9...^.bj
#     00E0: C4 37 D1 AF C0 8E DC 12   4E 9E BD 6F 89 64 F5 4D  .7......N..o.d.M
#     00F0: E3 F3 63 9C 62 89 99 45   F8 6F F4 1A E2 2D 93 D6  ..c.b..E.o...-..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.207 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A9 33 58 06 60 67 B4 F5   41 3B 40 AB 59 4D C0 3A  .3X.`g..A;@.YM.:
#     0010: 45 7E 60 D4 09 83 AF B7   07 FA 02 C9 F0 73 6B E4  E.`..........sk.
#     0020: 90 D1 61 EB F8 ED 52 ED   57 EB A2 0D 06 D2 0B 5E  ..a...R.W......^
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.209 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:55.210 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.211 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:55.211 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.211 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:55.212 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:55.212 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.212 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.215 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 29 A1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:30.000 UTC",
#       "not  after"         : "2023-12-25 11:50:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 68 5A 09 EE 61 CC EA   C7 06 44 30 34 97 05 2D  .hZ..a....D04..-
#           0010: AB 19 AF C2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 9A F0 C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:24.000 UTC",
#       "not  after"         : "2023-12-25 11:50:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#           0010: 39 E2 53 4E                                        9.SN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.240 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 16 1F 28 1D D3 80 3A 5F   F8 45 F1 71 28 40 CF 97  ..(...:_.E.q(@..
#     0010: B8 5E BF FE 58 B6 60 06   0E 63 FC 76 7E B6 8D FE  .^..X.`..c.v....
#     0020: E0 54 37 EA 14 C9 29 8A   D3 73 BE 2A B5 68 98 D3  .T7...)..s.*.h..
#     0030: C8 32 9E 34 13 EF 7B 5A   F3 82 DA C9 1C 53 CA 1F  .2.4...Z.....S..
#     0040: 9D 2E 76 AB 95 DE D4 7A   59 7A 97 A4 5C E6 B0 D6  ..v....zYz..\...
#     0050: 6E 56 88 65 B5 BA 4F 51   14 F4 46 CD A6 58 3A 00  nV.e..OQ..F..X:.
#     0060: E2 95 CB 62 0F 15 26 E8   7A 64 C9 D3 1E 31 4E 8D  ...b..&.zd...1N.
#     0070: 54 5B 37 71 DE 71 A7 5C   6E BA 07 70 23 4A 69 9E  T[7q.q.\n..p#Ji.
#     0080: 72 8C D2 AC 36 FF 47 C0   D7 6D A9 D4 58 E2 F6 9D  r...6.G..m..X...
#     0090: 9D 29 11 24 D7 2C 6D 0F   FB 17 36 A8 49 BE 34 AC  .).$.,m...6.I.4.
#     00A0: 9E E0 CC 5B 6A D9 97 32   BF AC 0B B0 F0 81 21 0E  ...[j..2......!.
#     00B0: DD 22 1A 52 5D E0 91 2C   C8 94 BB 0F 97 C4 0B B8  .".R]..,........
#     00C0: 51 EA 10 D0 29 6D 5D 8E   3F 42 AD 11 F9 FC 99 62  Q...)m].?B.....b
#     00D0: BA A2 A8 B6 67 05 66 40   19 4E DD F7 3D CB F9 36  ....g.f@.N..=..6
#     00E0: 5E B8 3C 2B 57 90 D1 EB   AC DA 92 0E DB 0A AC 03  ^.<+W...........
#     00F0: 03 FB D1 55 CE 50 9F 0C   2F 25 E8 E3 59 D8 0F 89  ...U.P../%..Y...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.241 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D3 89 B0 C3 2F 9A 09 7D   64 AD 97 07 0F 9A 8E 7A  ..../...d......z
#     0010: CE 71 DF 4C BB EF 1A 6D   0B 14 BF D7 FB 3D 57 7A  .q.L...m.....=Wz
#     0020: 43 38 BE 2C 3D 12 F0 38   23 68 E6 3C 55 B7 44 C0  C8.,=..8#h.<U.D.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.242 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:55.292 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "57 15 5B 49 DF DA CF 07 37 F8 D8 AC E8 1A 12 55 E1 9D 69 2D 1B 2E 23 CA 20 A6 EE F6 9B F5 A3 DF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 11:50:55.578 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 11:50:55.579 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 11:50:56.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 11:50:56.545; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 11:50:56.934; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 11:50:56.937; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 11:50:56.938; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-g4EGUQ/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:56.972 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 29 A1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:30.000 UTC",
#     "not  after"         : "2023-12-25 11:50:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 68 5A 09 EE 61 CC EA   C7 06 44 30 34 97 05 2D  .hZ..a....D04..-
#         0010: AB 19 AF C2                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:56.976 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A CA DC F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:22.000 UTC",
#     "not  after"         : "2023-12-25 11:50:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 11:50:56.992 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:57.327 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:57.333 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:57.333 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:50:57.333 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:57.487 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:57.489 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:50:57.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.508 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.508 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:50:57.510 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FF 80 09 4B 85 33 AF E9 E6 75 99 F1 1D F4 92 7B 62 10 A9 45 69 4E B0 FE 6D A3 8A F7 41 BD 78 36",
#   "session id"          : "32 17 2C 4F 59 61 6A 4C 74 33 29 6B 37 73 64 7D 34 EA 7A 18 BE 66 C5 4F 82 3E DC 23 EA A5 F0 0A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E3 2A 7E 91 FE 72 1E C5   F7 1B 88 70 C6 0C FF 1C  .*...r.....p....
#             0010: 67 73 F4 CE 85 45 73 1D   9B B8 87 D5 5F 42 FB 47  gs...Es....._B.G
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.617 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A9 03 94 59 C7 15 E3 15 12 9E B8 65 D7 86 40 E8 4E CF 33 8C 9B D2 43 AD 5B 93 AB 70 E2 42 B1 DB",
#   "session id"          : "32 17 2C 4F 59 61 6A 4C 74 33 29 6B 37 73 64 7D 34 EA 7A 18 BE 66 C5 4F 82 3E DC 23 EA A5 F0 0A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FC 32 85 22 77 A3 B4 C5   09 12 D7 79 E6 55 17 8E  .2."w......y.U..
#           0010: C8 07 24 5C E6 37 E5 C5   39 79 FB 4C 74 EF 46 41  ..$\.7..9y.Lt.FA
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.618 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.619 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.619 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.621 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.621 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.623 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.623 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.623 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.625 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.633 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.635 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.636 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.640 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.640 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.640 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.641 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.641 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.641 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.641 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.642 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.643 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.644 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.644 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.645 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.646 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.647 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.650 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 3F F8 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:26.000 UTC",
#       "not  after"         : "2023-12-25 11:50:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 B0 C2 6D 20 36 40 50   7A 6B 67 12 CF 51 9B 97  ...m 6@Pzkg..Q..
#           0010: 0B 4E E8 8E                                        .N..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.651 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.757 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 9A F0 C8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 11:50:24.000 UTC",
#     "not  after"         : "2023-12-25 11:50:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#         0010: 39 E2 53 4E                                        9.SN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#         0010: D9 73 98 23                                        .s.#
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.761 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: CF 87 44 97 13 18 E1 41   4B 63 F0 67 40 50 59 7B  ..D....AKc.g@PY.
#     0010: 82 75 69 13 F0 9C 93 08   4D 42 05 64 0D 30 24 E1  .ui.....MB.d.0$.
#     0020: C9 D5 71 A9 4D 88 14 56   45 18 3A FA 63 B6 B5 A0  ..q.M..VE.:.c...
#     0030: EA FD CC D9 E5 C9 1F BD   1A 71 95 8B 0F E2 B8 D7  .........q......
#     0040: 14 DF 5D 5F E3 04 E8 AB   04 BB 95 61 05 32 4B CC  ..]_.......a.2K.
#     0050: A8 49 0D 62 02 2F 45 C6   05 A0 88 9F 99 C0 5E BB  .I.b./E.......^.
#     0060: EA 54 DD 3F 38 C8 D1 4E   0C FC 2E 5D 60 24 EE 33  .T.?8..N...]`$.3
#     0070: A7 1B 8F D3 12 0F B3 A9   DB 07 B6 A5 B0 C6 C8 17  ................
#     0080: 67 58 27 9D B1 DE 17 BF   ED E4 72 7F E4 85 28 A6  gX'.......r...(.
#     0090: B5 E5 1C 09 32 84 A6 1F   E0 11 11 48 03 12 A3 75  ....2......H...u
#     00A0: C1 37 F4 DF 0B B7 FD 84   BB 89 51 08 14 6C A3 4C  .7........Q..l.L
#     00B0: D1 87 9C D8 CE 00 D8 E4   D8 0F BE 78 04 85 E4 93  ...........x....
#     00C0: AD B0 79 02 82 60 6B F4   7C 3E 01 6D D8 EC EF A4  ..y..`k..>.m....
#     00D0: C1 4C AE B8 00 FA A5 7B   70 A0 CE DA 3B 98 1C 14  .L......p...;...
#     00E0: 19 06 71 C0 74 6D BD 69   DE 21 0B B0 CE 82 E8 DE  ..q.tm.i.!......
#     00F0: 8E A1 F8 D6 50 70 30 2C   30 4C 16 F6 24 5C AE 5F  ....Pp0,0L..$\._
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.763 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3F 4C BB F3 FF EC 6F 14   3D 92 C1 14 BA A3 33 9E  ?L....o.=.....3.
#     0010: D4 35 13 87 E6 43 EA 01   BD 51 B4 C9 8C A9 C6 5C  .5...C...Q.....\
#     0020: FF EF 5C A7 C6 24 D5 1B   EF CD 43 22 9E 93 2D 36  ..\..$....C"..-6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.766 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:57.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:57.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 11:50:57.768 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:50:57.768 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.768 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.771 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 29 A1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:30.000 UTC",
#       "not  after"         : "2023-12-25 11:50:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 68 5A 09 EE 61 CC EA   C7 06 44 30 34 97 05 2D  .hZ..a....D04..-
#           0010: AB 19 AF C2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 9A F0 C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:24.000 UTC",
#       "not  after"         : "2023-12-25 11:50:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#           0010: 39 E2 53 4E                                        9.SN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.795 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 F8 D0 F9 84 D0 1D E3   AA 3A 2B D7 4B B6 88 37  v........:+.K..7
#     0010: 60 90 5B 08 1E 42 22 F6   6E 95 7F 1B 14 5F E0 98  `.[..B".n...._..
#     0020: 3A 44 F3 77 49 FE 89 07   76 36 19 B1 6B 78 8F 35  :D.wI...v6..kx.5
#     0030: C7 98 CD 71 AE 5A B7 47   E6 1D BF 80 37 6A 15 EE  ...q.Z.G....7j..
#     0040: 67 35 C4 6F 28 A4 74 09   C5 1C B7 B5 B1 6B DD 89  g5.o(.t......k..
#     0050: 11 FD E9 A4 B6 2B B8 62   CC 5A 05 37 A9 DF 81 69  .....+.b.Z.7...i
#     0060: 92 76 4E D2 2F 6F AF 91   7E CE F9 24 7F 8E 69 57  .vN./o.....$..iW
#     0070: 47 DA 68 77 E8 70 FB B8   6D 60 30 03 05 1E 4F B6  G.hw.p..m`0...O.
#     0080: B1 1B B6 70 41 64 D3 08   31 2A CC 98 95 21 D8 17  ...pAd..1*...!..
#     0090: 07 DA D3 08 F4 26 17 1C   50 63 DD FD 63 55 18 C5  .....&..Pc..cU..
#     00A0: F5 8E 31 87 11 60 FD CC   A1 21 51 81 A4 A2 04 F2  ..1..`...!Q.....
#     00B0: 26 51 ED E7 EE D3 31 9E   0B 1D 74 96 7F 9E A7 81  &Q....1...t.....
#     00C0: 63 04 B8 7F 04 76 18 98   0A DD 6D 34 B2 EE 35 9A  c....v....m4..5.
#     00D0: B4 D0 00 3A 96 C9 4F 1D   63 04 CE A3 A1 DF CE 0E  ...:..O.c.......
#     00E0: 40 88 7E 35 3B F3 D1 59   04 D2 05 3F EA F2 E3 B2  @..5;..Y...?....
#     00F0: 63 AE 93 9A A9 44 E0 1B   B3 79 BA A8 2A 97 4A DA  c....D...y..*.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.797 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C5 F6 71 3E 71 1B 5D 40   55 E1 91 C6 FC F4 0A 53  ..q>q.]@U......S
#     0010: 32 A4 6E 29 DD BF CE A5   F3 95 E5 96 8B EC 57 F0  2.n)..........W.
#     0020: E1 22 3D 98 7C A3 D2 B2   E9 70 CF F5 66 C8 60 89  ."=......p..f.`.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.797 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:50:57.851 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9C 88 5A 08 F6 8F 94 AD 2E 99 70 BF 57 2C 6D A8 7E AB 69 6A 72 7F A5 8A 25 6D 30 A6 77 25 27 98",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 11:50:58.132 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 11:50:58.133 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 11:51:09.511; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 11:51:09.850 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A CA DC F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:22.000 UTC",
#       "not  after"         : "2023-12-25 11:50:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#           0010: 39 E2 53 4E                                        9.SN
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 9A F0 C8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 11:50:24.000 UTC",
#       "not  after"         : "2023-12-25 11:50:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 34 40 43 A3 EC A1 92   CD 73 BE 79 F3 94 68 15  .4@C.....s.y..h.
#           0010: 39 E2 53 4E                                        9.SN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 E0 5B B4 12 07 1C 8D   CF D3 A0 FD 1F 64 71 D1  q.[..........dq.
#           0010: D9 73 98 23                                        .s.#
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 11:51:09.866 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:51:10.103 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.104 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:51:10.105 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 11:51:10.106 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.111 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.124 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 11:51:10.127 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "93 6E F6 5D 48 15 FE 55 AC C8 A0 67 FD 96 78 51 3F 6D 6A 9B B8 D7 64 A0 67 65 A1 5C 6C FC 8A 36",
#     "session id"          : "11 02 29 1F B2 FE 55 C4 41 E4 43 F5 6B B3 D1 8B FD 11 D0 B1 CE 92 77 C9 E6 1D 9D 3F 0A 9F EF 7F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4C BC 9B ED 31 33 F9 35   61 16 90 19 D5 B1 CE EC  L...13.5a.......
#               0010: 11 77 D0 F2 76 4F 05 E1   1F 12 86 F2 FB 34 49 78  .w..vO.......4Ix
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.145 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F7 D1 46 B8 B4 DA 2C FF B3 11 A1 A0 E4 DE E3 22 6E 69 3B 59 F2 CE A4 D8 15 29 80 52 8E A5 95 44",
#     "session id"          : "11 02 29 1F B2 FE 55 C4 41 E4 43 F5 6B B3 D1 8B FD 11 D0 B1 CE 92 77 C9 E6 1D 9D 3F 0A 9F EF 7F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A5 80 EB EA AF 53 45 EE   ED 14 E8 14 CF D7 8A 3C  .....SE........<
#             0010: 2D 45 CE 71 C4 C2 91 D0   C1 A8 16 B8 61 BC CD 47  -E.q........a..G
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.146 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.146 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.147 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.150 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.150 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:51:10.151 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:51:10.152 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.152 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.159 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.160 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.162 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.165 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.165 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.166 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.166 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:51:10.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:51:10.166 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 11:51:10.167 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_author

[...truncated too long message...]

edEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 11:52:31.343 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:52:31.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:52:31.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:52:31.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 11:52:31.389 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34338/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28393ms
ok 65 stop command for single port in 31352ms
ok 66 status detects locally running solr in 14364ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2208ms
ok 69 copying files around in 6572ms
ok 70 upconfig in 2617ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1235ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 7s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m30s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5544 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5544/

All tests passed

Build Log:
[...truncated 1323 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43319/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 09:52:18.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 09:52:18.024; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 09:52:19.227; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 09:52:19.269; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22230ms
ok 61 start solr with client truststore and security manager in 24716ms
not ok 62 start solr with mTLS needed in 57129ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-j1X75L/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43319.
#
# Started Solr server on port 43319 (pid=199584). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43320.
#
# Started Solr server on port 43320 (pid=200004). Happy searching!
#
# INFO  - 2023-09-26 09:53:41.341; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 09:53:41.347; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 09:53:41.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 09:53:41.711; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 09:53:41.712; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:41.744 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A B5 D6 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:17.000 UTC",
#     "not  after"         : "2023-12-25 09:53:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 D6 89 33 06 D2 9A 1A   3E 71 BF 23 D1 A3 56 C4  X..3....>q.#..V.
#         0010: 77 D8 42 ED                                        w.B.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:41.748 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 A1 08 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:09.000 UTC",
#     "not  after"         : "2023-12-25 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:41.763 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:41.997 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:41.997 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:41.999 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:41.999 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:42.005 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:42.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:42.017 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:42.017 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:42.020 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DD BA D3 61 A4 5D 11 CD 2B 2C 9F CA E0 37 9B 67 53 DB BC 02 FC 5E 85 0D 46 86 18 47 87 24 D2 E6",
#   "session id"          : "9B 63 A6 F9 47 15 34 79 FD 35 92 0D 20 4D 4B F5 37 F3 99 DF DF 29 7D 82 CC F0 CE 2B CE 67 6E DB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8B 27 82 03 21 13 0E D9   71 B6 7C 95 3A E2 48 2E  .'..!...q...:.H.
#             0010: 71 3B C9 4A 8C 68 D3 0A   B4 A5 55 D0 A9 70 02 2F  q;.J.h....U..p./
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.133 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E5 14 E3 73 15 36 0E B8 42 48 E8 69 03 A3 61 6B 5A 87 F6 B5 5F DE B5 E8 1E D2 4F C2 4A F0 20 C8",
#   "session id"          : "9B 63 A6 F9 47 15 34 79 FD 35 92 0D 20 4D 4B F5 37 F3 99 DF DF 29 7D 82 CC F0 CE 2B CE 67 6E DB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5A 02 C8 F2 B3 3D BD 26   ED EF C8 96 A1 AE DE FC  Z....=.&........
#           0010: E0 16 6F 42 38 BC 6D DE   18 F0 93 7C AB A8 B2 51  ..oB8.m........Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.133 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.133 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.134 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.135 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.135 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.137 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.137 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.138 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.139 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.139 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.139 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.146 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.147 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.149 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.152 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.152 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.153 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.155 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.155 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.156 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.156 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.157 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.157 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.157 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.160 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 AE 2C 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:13.000 UTC",
#       "not  after"         : "2023-12-25 09:53:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 7A D9 54 1D 02 80 9F   C8 28 B9 E8 0C AF 2C AC  .z.T.....(....,.
#           0010: BC E7 61 65                                        ..ae
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.160 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:42.208 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:42.208 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:42.209 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:42.209 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.237 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.241 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4F A5 0E 54 5E DA E8 1A   D4 6D D2 B9 61 DD 71 72  O..T^....m..a.qr
#     0010: 6C 78 D1 1D 2E E5 97 09   DA 05 30 8E 10 14 E2 CB  lx........0.....
#     0020: 2D 97 C9 20 AF 0A BA 20   66 79 02 F5 83 E1 63 30  -.. ... fy....c0
#     0030: A8 DF 48 5B 32 83 EB 25   FA 12 0E A2 9D 8F F1 B8  ..H[2..%........
#     0040: 38 68 AC 2F 5C B7 39 00   14 55 DA 7A 1F B6 96 92  8h./\.9..U.z....
#     0050: BA A4 B1 6C AC A2 09 89   06 73 2A 16 DE 8F 43 F1  ...l.....s*...C.
#     0060: 06 A5 77 E8 07 15 1A C6   9C 2C 6A B4 A9 EF 21 02  ..w......,j...!.
#     0070: F2 04 5F 2A 9C 7E 56 51   4B 6D 78 B1 64 9E 3C D5  .._*..VQKmx.d.<.
#     0080: 78 8B 20 84 A3 E5 59 C0   A7 E6 4B B3 FA 4D 9E 14  x. ...Y...K..M..
#     0090: 4A 06 BE 9D 75 48 2B 97   3F 4B D0 11 21 61 99 37  J...uH+.?K..!a.7
#     00A0: 57 E3 50 F9 7E FA 37 65   B9 26 D1 EC C8 46 88 5A  W.P...7e.&...F.Z
#     00B0: 13 1D 80 B7 52 7D CB 7D   9C A6 5E 36 AF C9 EC CC  ....R.....^6....
#     00C0: 0F 0B CA D8 5B 93 90 53   1B 1D 02 22 02 5A A0 4B  ....[..S...".Z.K
#     00D0: 39 B0 95 CD 28 D6 BD 2D   DA 20 54 5D 93 B9 4A 26  9...(..-. T]..J&
#     00E0: 95 0A 98 61 C9 EF A5 38   88 7B 65 AA EA 6B 88 9D  ...a...8..e..k..
#     00F0: 67 E6 B7 5D FD 3E 24 25   86 0C 73 0D 17 8A 84 FA  g..].>$%..s.....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.243 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E7 EE 92 08 9D 80 69 48   CF 0D 0F 8C 81 85 77 F2  ......iH......w.
#     0010: 27 2D 55 B1 23 4F C8 BC   84 40 76 52 71 5F E5 E5  '-U.#O...@vRq_..
#     0020: 48 44 DD 4B 04 97 FA 4D   67 C5 05 F0 06 6F AC 35  HD.K...Mg....o.5
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.246 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:42.246 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.247 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:42.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.247 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:42.247 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:42.248 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.248 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.251 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A B5 D6 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:17.000 UTC",
#       "not  after"         : "2023-12-25 09:53:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 D6 89 33 06 D2 9A 1A   3E 71 BF 23 D1 A3 56 C4  X..3....>q.#..V.
#           0010: 77 D8 42 ED                                        w.B.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 8D 00 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:11.000 UTC",
#       "not  after"         : "2023-12-25 09:53:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#           0010: 2C CF 4D 27                                        ,.M'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.276 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A1 90 E7 D0 77 C1 75 79   D8 40 EC 08 18 58 3A DD  ....w.uy.@...X:.
#     0010: 07 AE 8A 0A 85 78 70 34   E4 87 97 D9 50 52 CC 02  .....xp4....PR..
#     0020: 14 B0 2E 5A 75 93 6F 37   B7 BE 73 1C 83 53 BC 89  ...Zu.o7..s..S..
#     0030: E1 CA 48 7F 93 D2 0F A5   62 20 B4 4C F7 4B B7 7D  ..H.....b .L.K..
#     0040: AF 22 94 61 54 F9 3A EA   47 24 4A 1A 9B 82 5E 68  .".aT.:.G$J...^h
#     0050: 9C 6E E6 26 D7 30 DB 71   32 67 EC 2E FB 55 5F 61  .n.&.0.q2g...U_a
#     0060: 6C EF 8E E7 3F AA C9 9E   15 AF 39 32 10 97 78 55  l...?.....92..xU
#     0070: DC E1 57 26 3E 5D 7D 68   04 5A 0C 26 91 E6 7F 2A  ..W&>].h.Z.&...*
#     0080: 4D E5 5E 4A C1 C8 65 0E   CF 4C 76 05 85 52 33 CB  M.^J..e..Lv..R3.
#     0090: FB A5 88 0D 77 0A BB 78   CD 41 9A CB 0B 2E C8 8F  ....w..x.A......
#     00A0: 42 BB 85 6B EC E4 D9 1B   EC D2 2D CF 8C 01 37 18  B..k......-...7.
#     00B0: 8F 95 CC 84 63 B7 F6 A5   0B 41 2D E3 C0 07 D2 37  ....c....A-....7
#     00C0: 22 A6 87 B6 F7 9B A9 B1   F8 32 27 62 54 18 75 53  "........2'bT.uS
#     00D0: 2F 0E 24 E1 70 8F C9 A1   1F 6A DE 30 F2 9B 2C 1F  /.$.p....j.0..,.
#     00E0: 73 5C E1 B2 6F 80 8C 6F   16 F3 FE 15 86 20 73 E6  s\..o..o..... s.
#     00F0: BC 7F 82 02 8A D7 A4 6A   51 D1 30 9E 69 9D 04 71  .......jQ.0.i..q
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.278 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3E E3 F6 14 9A 15 83 46   24 AA A7 56 2F 17 4E 14  >......F$..V/.N.
#     0010: C0 A7 F3 D1 57 99 80 75   5C 27 E4 94 71 94 38 4E  ....W..u\'..q.8N
#     0020: C0 00 88 1A 68 34 F4 D7   1A AC 64 3A 09 26 00 41  ....h4....d:.&.A
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.278 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:42.327 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4B 05 8D DD 60 F3 58 F9 4A 7A DA 95 92 66 F1 1D 15 C6 43 D5 57 4E 9D C1 D2 DF 17 C4 C3 AD E6 EF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 09:53:42.609 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 09:53:42.610 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 09:53:43.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 09:53:43.545; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 09:53:43.914; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604c5de8(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 09:53:43.917; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 09:53:43.917; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(ca,h=[localhost],a=[],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-j1X75L/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:43.949 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5A B5 D6 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:17.000 UTC",
#     "not  after"         : "2023-12-25 09:53:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 D6 89 33 06 D2 9A 1A   3E 71 BF 23 D1 A3 56 C4  X..3....>q.#..V.
#         0010: 77 D8 42 ED                                        w.B.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:43.954 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 A1 08 E1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:09.000 UTC",
#     "not  after"         : "2023-12-25 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:43.969 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:44.196 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.196 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:44.198 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:44.198 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.204 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.216 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.216 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.217 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:44.219 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6A FD E3 01 66 CB 50 E0 28 60 C2 B3 5E 31 A5 89 30 D9 AF EA 6D 9D 85 E9 70 C2 B0 08 17 9E 9A 4A",
#   "session id"          : "91 E1 5B 4D 3A A0 81 0E 42 DA B5 70 CF 08 94 E7 6E 95 E8 91 D3 C2 07 E1 00 5C CD 62 D8 57 E4 EE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 97 43 98 64 E1 AA 14 3A   88 50 08 3E 07 B5 D5 59  .C.d...:.P.>...Y
#             0010: 36 65 2D B3 64 F4 29 CF   FA 14 FB CF E5 3C BE 7C  6e-.d.)......<..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.324 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "77 36 98 42 D4 36 D8 D5 69 3F DE D9 30 E0 AC DC 3D 74 32 C6 5D 03 E6 F3 F4 95 97 E3 D0 FB B1 DB",
#   "session id"          : "91 E1 5B 4D 3A A0 81 0E 42 DA B5 70 CF 08 94 E7 6E 95 E8 91 D3 C2 07 E1 00 5C CD 62 D8 57 E4 EE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 01 A3 B7 67 9A 54 AF FF   A3 0A 0E 3A EB 0A 43 3A  ...g.T.....:..C:
#           0010: C2 B3 DE B6 BC 0B CE D6   A5 C2 5A FB 15 24 A4 2C  ..........Z..$.,
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.325 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.325 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.326 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.326 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.326 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.327 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.327 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.327 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.327 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.327 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.329 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.330 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.330 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.332 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.332 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.340 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.341 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.343 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.347 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.347 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.347 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.347 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.347 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.348 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.348 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.348 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.348 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.349 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.350 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.351 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.352 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.355 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "40 AE 2C 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:13.000 UTC",
#       "not  after"         : "2023-12-25 09:53:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 7A D9 54 1D 02 80 9F   C8 28 B9 E8 0C AF 2C AC  .z.T.....(....,.
#           0010: BC E7 61 65                                        ..ae
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.355 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:44.427 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:44.428 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:44.428 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:44.428 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 8D 00 B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 09:53:11.000 UTC",
#     "not  after"         : "2023-12-25 09:53:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#         0010: 2C CF 4D 27                                        ,.M'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#         0010: D7 14 F2 B9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.458 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F CC F5 C4 83 0C 26 97   29 7E FD 9A 8E 17 0B 82  /.....&.).......
#     0010: 72 36 7E 0C 6D E5 3A 6C   1D D6 84 A7 DB D2 E6 00  r6..m.:l........
#     0020: B3 2D EB E7 6F D1 6E 41   9F 82 9A 53 2A F6 EA EE  .-..o.nA...S*...
#     0030: 22 5F DD E6 58 E2 15 09   A7 BF 99 86 CB B1 0E FD  "_..X...........
#     0040: FF 68 C4 A1 D8 11 1D DF   00 E6 4C 5D B2 94 F8 03  .h........L]....
#     0050: E4 E7 1D 8F DE 5C CA 84   10 AE 4E 0B 8A 5A C2 97  .....\....N..Z..
#     0060: 2E 6F E1 AC FE 7C C1 8C   20 B8 3F 2E D3 E5 A3 9C  .o...... .?.....
#     0070: 6F EE CC FE E2 26 AC 33   36 BE 3E 16 02 FB A2 7F  o....&.36.>.....
#     0080: 2E F4 56 9B FB 8F FF 27   AA A2 1D 8C DD 21 3D F3  ..V....'.....!=.
#     0090: E8 6A E4 A7 99 22 BA 17   92 D6 39 3B 8D DA F9 01  .j..."....9;....
#     00A0: A3 92 81 CD 06 1F 89 9E   D8 20 6C 22 DD CF 0E BE  ......... l"....
#     00B0: 80 E1 90 1D 98 F9 31 C9   B2 13 74 0C E7 1A 30 43  ......1...t...0C
#     00C0: FF DD 5C E9 BB 38 1D 42   F0 F9 4C AD F7 07 E3 41  ..\..8.B..L....A
#     00D0: 25 25 65 9D C2 4A 86 0C   38 ED 5C AF 14 75 A5 8A  %%e..J..8.\..u..
#     00E0: 78 AC 5D B1 1C 3B 20 0E   E1 12 6E E3 2A 3B 67 64  x.]..; ...n.*;gd
#     00F0: 13 D6 A0 9F B3 1F A1 93   60 2C 65 0A 86 6B 77 4B  ........`,e..kwK
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.460 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 E4 DC 05 6C 64 35 2F   14 B4 E6 88 0F 8F 92 F4  C...ld5/........
#     0010: F3 B5 F2 98 A4 A4 12 18   9F 9B EC 0C 99 39 58 3E  .............9X>
#     0020: F9 D2 ED 28 C7 B4 51 A4   8E CC BD 1E D6 FE 29 00  ...(..Q.......).
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:44.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:44.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 09:53:44.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:44.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.466 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.469 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A B5 D6 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:17.000 UTC",
#       "not  after"         : "2023-12-25 09:53:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 D6 89 33 06 D2 9A 1A   3E 71 BF 23 D1 A3 56 C4  X..3....>q.#..V.
#           0010: 77 D8 42 ED                                        w.B.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 8D 00 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:11.000 UTC",
#       "not  after"         : "2023-12-25 09:53:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#           0010: 2C CF 4D 27                                        ,.M'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.498 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 58 B8 11 85 32 CB 2D   81 D6 9F 2C 1A DD 0A 32  fX...2.-...,...2
#     0010: 94 AB EA ED 11 3A F2 1B   3B 89 25 BD 21 9C 78 01  .....:..;.%.!.x.
#     0020: 0C 03 0E 3F FA A0 92 A9   19 28 CF 49 7B C0 46 C0  ...?.....(.I..F.
#     0030: 4B 3E 5C 1F E2 B5 75 EC   D4 D9 59 5C 1E 77 AD 5E  K>\...u...Y\.w.^
#     0040: A2 DC F6 B0 E5 90 7B 65   CC A5 B5 65 FB C0 0D C6  .......e...e....
#     0050: C4 DA 8A CC 83 61 34 08   47 50 C7 49 E4 9C 55 49  .....a4.GP.I..UI
#     0060: 4E E5 1C 3A 6F 3B 2D FF   BE 59 E7 23 E7 45 B7 0E  N..:o;-..Y.#.E..
#     0070: 9E D0 B9 ED F2 3E 22 37   A3 21 44 56 C6 AD B3 48  .....>"7.!DV...H
#     0080: 06 3C 62 9B 6A 0E 5E 01   40 4E 52 2C 9B 35 D7 29  .<b.j.^.@NR,.5.)
#     0090: DC 0B 5D 88 EE 30 E2 66   54 DE 1D 0F FB 06 8C CF  ..]..0.fT.......
#     00A0: 75 4C 4E 4C 97 79 64 ED   AF E2 40 46 CF 37 BC 62  uLNL.yd...@F.7.b
#     00B0: 66 08 78 A0 09 57 18 4E   E2 98 D1 1B 01 CF FD 05  f.x..W.N........
#     00C0: B5 C7 59 CD 53 A6 39 92   14 1A 12 BA C5 69 DD 4D  ..Y.S.9......i.M
#     00D0: AA CA 36 4B 1A E5 D6 7B   9E 03 58 CE A2 26 48 A4  ..6K......X..&H.
#     00E0: 6A B4 D2 02 5F B4 A0 98   04 B7 C2 B6 24 15 F5 CA  j..._.......$...
#     00F0: 72 E6 32 D1 D5 7B 7C 15   4C 33 07 DA 7B 86 36 FB  r.2.....L3....6.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.499 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A A1 E3 9F D9 84 EE 13   30 66 8C E1 73 E8 11 79  Z.......0f..s..y
#     0010: 46 4F F7 05 D2 2A 58 19   5C 34 46 06 0E AC 15 1C  FO...*X.\4F.....
#     0020: B0 0D FB 27 C0 7B 2B 75   06 6B BF C0 95 3E 1E 71  ...'..+u.k...>.q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.500 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:44.549 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "25 44 70 46 61 8C 4E 04 A2 86 C0 13 89 DB 78 7B D4 AD 50 AF BB 60 30 8C E3 E6 A3 EC EC 01 81 2A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 09:53:44.824 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 09:53:44.825 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 09:53:55.987; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:56.320 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 A1 08 E1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:09.000 UTC",
#       "not  after"         : "2023-12-25 09:53:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#           0010: 2C CF 4D 27                                        ,.M'
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 8D 00 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 09:53:11.000 UTC",
#       "not  after"         : "2023-12-25 09:53:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 97 10 60 E0 64 9F C1 6F   43 4D 7F 6B 99 41 04 60  ..`.d..oCM.k.A.`
#           0010: 2C CF 4D 27                                        ,.M'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 0B 31 B4 EE D1 26 9C   9F EC 86 EF 0E BE CE A1  ..1...&.........
#           0010: D7 14 F2 B9                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 09:53:56.337 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:56.739 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:56.739 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:56.739 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:53:56.739 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:56.840 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.840 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:56.842 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 09:53:56.843 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.849 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.861 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.862 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.862 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 09:53:56.865 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "71 6D B3 EC 90 0F 29 F4 74 57 93 4B B5 F8 78 70 15 52 66 9E A7 B4 88 BA 4C F8 AA 42 28 96 0C E5",
#     "session id"          : "A6 26 13 67 33 22 73 38 78 67 F3 00 25 5E 55 78 65 BC 31 D5 B7 C5 9F 59 4D 6C 4D 50 8A C1 8C CD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 43 4A C5 BE D2 51 B9 34   90 F6 F9 3B CD DF F7 EA  CJ...Q.4...;....
#               0010: 1E EF 38 2A 1D 03 7E 54   49 F3 6A B6 7D 6D E5 32  ..8*...TI.j..m.2
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.886 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "01 E1 17 57 45 07 F7 D8 FD 57 4F FE 15 2F EB AA B1 A7 A2 28 85 2C 02 B0 0A 88 02 1A 98 09 66 A1",
#     "session id"          : "A6 26 13 67 33 22 73 38 78 67 F3 00 25 5E 55 78 65 BC 31 D5 B7 C5 9F 59 4D 6C 4D 50 8A C1 8C CD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1F B9 CF B0 AB 49 66 2C   03 3F 81 DB DC 28 82 38  .....If,.?...(.8
#             0010: E2 5E 65 F3 D4 E7 79 C2   6D 62 52 33 B5 A4 C7 52  .^e...y.mbR3...R
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.886 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.886 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.888 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.889 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.891 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.891 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.891 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.891 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:56.892 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:56.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.900 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.902 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.903 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.907 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.907 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.907 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.907 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.908 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:56.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:53:56.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 09:53:56.909 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, 

[...truncated too long message...]

ndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 09:55:16.398 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:55:16.443 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:55:16.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:55:16.444 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 09:55:16.444 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43320/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28361ms
ok 65 stop command for single port in 30698ms
ok 66 status detects locally running solr in 14348ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2148ms
ok 69 copying files around in 6520ms
ok 70 upconfig in 2599ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 35s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 20m57.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5543 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5543/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46677/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 07:59:16.209; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 07:59:16.215; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 07:59:17.139; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 07:59:17.182; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22392ms
ok 61 start solr with client truststore and security manager in 24569ms
not ok 62 start solr with mTLS needed in 56994ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-YL9lbM/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46677.
#
# Started Solr server on port 46677 (pid=198046). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 46678.
#
# Started Solr server on port 46678 (pid=198470). Happy searching!
#
# INFO  - 2023-09-26 08:00:39.360; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 08:00:39.365; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 08:00:39.775; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 08:00:39.778; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 08:00:39.779; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:39.812 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 8C 63 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:15.000 UTC",
#     "not  after"         : "2023-12-25 08:00:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 AB 45 40 FD 0F 4A BC   3A 13 A4 0B 8C 02 B7 85  ..E@..J.:.......
#         0010: DD 84 88 E6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:39.816 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 2A DC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:07.000 UTC",
#     "not  after"         : "2023-12-25 08:00:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:39.831 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:40.188 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:40.189 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:40.189 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:40.189 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:40.337 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.337 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:40.339 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:40.339 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.345 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.356 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.356 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.356 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:40.359 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E2 F8 AB 3E DD 4A C8 83 3D 4C 58 71 73 F6 E1 4D 02 A3 BF 6A 14 6C 89 EF 86 6F CC 3D 32 99 04 56",
#   "session id"          : "C3 78 75 29 F6 44 2C 21 C8 4F 36 D8 29 9A BB 77 1A DF 6A F6 20 9E 4D 76 EE 36 EE 50 AF 49 11 69",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4E 7B 87 62 84 6F 4E 8C   C8 CD 56 98 1C 12 74 3A  N..b.oN...V...t:
#             0010: 6E 68 2F 5B 9E 3B F1 F2   D5 68 E3 D8 80 8E 0B 71  nh/[.;...h.....q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.471 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E1 40 28 C2 1C 1B 6A 1B B5 F3 DA 43 4D 4E 5D F6 C8 7B 75 FE 47 5B 6D 28 77 43 CD 4B C1 72 39 31",
#   "session id"          : "C3 78 75 29 F6 44 2C 21 C8 4F 36 D8 29 9A BB 77 1A DF 6A F6 20 9E 4D 76 EE 36 EE 50 AF 49 11 69",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 01 F8 33 8D 34 02 44 56   1A 4C B4 98 06 5D 17 5D  ..3.4.DV.L...].]
#           0010: 3D 56 09 FC EB 1D 0E 7A   CF 59 C4 3A 98 6D A2 31  =V.....z.Y.:.m.1
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.472 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.472 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.473 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.474 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.474 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.474 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.474 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.474 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.475 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.477 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.477 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.477 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.488 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.490 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.491 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.495 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.495 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.495 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.496 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.498 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.499 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.499 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.499 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.501 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.502 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.506 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 41 65 A3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:11.000 UTC",
#       "not  after"         : "2023-12-25 08:00:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 2D C1 9C DE 55 49 8B   0F F7 7E C8 EC 34 FE 86  .-...UI......4..
#           0010: 83 39 A7 EE                                        .9..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.506 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.593 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.597 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 73 0E E7 42 5B 29 96 3A   3D 89 D1 48 E6 D4 BC FC  s..B[).:=..H....
#     0010: 50 C0 51 EC 2D 65 67 DB   41 5E 20 31 20 73 DD 58  P.Q.-eg.A^ 1 s.X
#     0020: 23 B1 C7 E1 54 6A C3 C0   0B 79 CB C8 EB F6 A5 D5  #...Tj...y......
#     0030: BC B7 EA 7A 72 3C 27 D1   59 54 1A 44 2C D8 42 38  ...zr<'.YT.D,.B8
#     0040: 31 2C D1 36 84 FA E1 00   C8 67 D9 27 44 C5 D5 29  1,.6.....g.'D..)
#     0050: BE 99 14 5B AD 40 47 3F   F1 52 FC 20 9D 30 5E B9  ...[.@G?.R. .0^.
#     0060: 7B 0B 8E 99 B9 8E E4 00   52 A5 4F 93 55 73 25 17  ........R.O.Us%.
#     0070: BB D6 41 E0 A7 7B D1 DF   2D EF BC D5 31 52 C9 39  ..A.....-...1R.9
#     0080: 0A 21 B6 53 19 CF 37 6E   45 B1 27 8B C1 90 E4 8F  .!.S..7nE.'.....
#     0090: D4 DE 4A 5D 32 2B 25 8C   66 CA 4E 5C EC DF F4 C2  ..J]2+%.f.N\....
#     00A0: BE 0F C0 78 A1 BF 95 16   FE 2D 4A AC B0 B4 F9 B6  ...x.....-J.....
#     00B0: E0 E5 69 0E B9 D7 DF 81   5F E1 0C 4D C1 AC BE 2D  ..i....._..M...-
#     00C0: 61 4A EA 77 4F FA 65 22   68 82 2A 5A 5C 51 72 C3  aJ.wO.e"h.*Z\Qr.
#     00D0: 03 5B C2 F0 CB F2 63 1E   C1 4F D9 E8 8B 09 7E 81  .[....c..O......
#     00E0: 90 F4 F2 A7 79 6C 79 39   B1 7C A0 36 A4 8A 9F B1  ....yly9...6....
#     00F0: 2F B1 89 71 2F 62 68 43   96 AB 8B E6 FD EA EE D3  /..q/bhC........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.599 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6E B1 76 DB C9 1F 27 7C   27 91 43 70 62 9C 33 DE  n.v...'.'.Cpb.3.
#     0010: 6D 3E 0D B0 19 07 1A CA   08 EA 97 07 23 06 C6 77  m>..........#..w
#     0020: A6 8F F3 24 A5 5C 36 1D   49 CD 8F E2 A9 C2 F8 8C  ...$.\6.I.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.601 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:40.602 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.602 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:40.603 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.603 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:40.603 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:40.603 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.604 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.606 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 8C 63 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:15.000 UTC",
#       "not  after"         : "2023-12-25 08:00:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 AB 45 40 FD 0F 4A BC   3A 13 A4 0B 8C 02 B7 85  ..E@..J.:.......
#           0010: DD 84 88 E6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 C2 77 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:09.000 UTC",
#       "not  after"         : "2023-12-25 08:00:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#           0010: E8 48 6B 7B                                        .Hk.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.630 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 43 84 27 98 39 61 08 A1   AC 18 74 D3 DB A4 9E BE  C.'.9a....t.....
#     0010: A6 78 E4 A0 89 24 AB DB   4F D3 8B 6B 36 94 FC BE  .x...$..O..k6...
#     0020: AB A3 84 78 C8 64 26 FB   4C 63 97 EB A0 46 9D 6A  ...x.d&.Lc...F.j
#     0030: B5 9C 3A 4E 01 B8 B9 24   76 90 9A F0 D2 46 2E 68  ..:N...$v....F.h
#     0040: 01 12 25 FB 38 80 0D 5E   48 C5 7E 1F BC 2E CF 16  ..%.8..^H.......
#     0050: 1E 47 6F 95 73 FC 3E EA   EB EF 2D 89 1D 9C D5 C6  .Go.s.>...-.....
#     0060: FA B2 1C E1 BA A6 9B 12   16 6D 57 05 5C 2F B0 05  .........mW.\/..
#     0070: 2B 9C B4 4A BB DB CC 94   01 C1 6B F9 B5 A2 7F 59  +..J......k....Y
#     0080: EB 5F F9 19 EC D6 89 C4   88 97 74 95 BB D8 76 B8  ._........t...v.
#     0090: 25 46 CD 01 CD 87 34 1C   12 3F 6E 2E 17 B5 38 3C  %F....4..?n...8<
#     00A0: BA CC F6 18 47 6F EB FA   5F 00 90 6E 3D 38 D0 A4  ....Go.._..n=8..
#     00B0: 1F 18 E7 B7 5B FE E3 6F   DA A6 16 FF B5 2B BD 89  ....[..o.....+..
#     00C0: EB 6A FB 84 7E C0 85 F1   2D A7 21 CF 40 25 3C 93  .j......-.!.@%<.
#     00D0: 91 45 83 EE BB 1A 51 7C   A2 2C FD 68 B0 E6 22 90  .E....Q..,.h..".
#     00E0: 56 AF E9 22 64 6B 33 C5   35 40 F8 05 CE F1 18 B7  V.."dk3.5@......
#     00F0: D9 56 5F B5 E9 FA 55 64   F9 F9 CE 90 9B 10 50 35  .V_...Ud......P5
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.632 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 24 16 50 CA CE 6C 12 9A   3A 5F C0 27 5F AC 4B 70  $.P..l..:_.'_.Kp
#     0010: 0A EF BE B0 C6 F2 65 8E   4E 28 E8 F3 E9 41 BC E1  ......e.N(...A..
#     0020: 85 13 6F A1 2C 05 20 3A   F9 16 6B 59 26 41 61 8E  ..o.,. :..kY&Aa.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.632 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:40.683 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A5 55 50 EB BF A6 F9 B2 9C D6 CC 1C 60 04 C1 FD A4 59 E9 89 27 29 F3 F5 3A F3 6F 2A 8A 2B C7 F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 08:00:40.960 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 08:00:40.962 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 08:00:41.876; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 08:00:41.881; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 08:00:42.264; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 08:00:42.267; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 08:00:42.268; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YL9lbM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:42.299 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 8C 63 FD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:15.000 UTC",
#     "not  after"         : "2023-12-25 08:00:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F1 AB 45 40 FD 0F 4A BC   3A 13 A4 0B 8C 02 B7 85  ..E@..J.:.......
#         0010: DD 84 88 E6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:42.304 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 2A DC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:07.000 UTC",
#     "not  after"         : "2023-12-25 08:00:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:42.318 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:42.542 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:42.544 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:42.544 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.549 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.561 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:42.563 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "21 40 72 BB 93 B8 E6 47 3E A6 FE 59 91 49 58 87 67 A0 37 72 10 B1 EE 8A FC 9C FF 28 E6 E6 F9 48",
#   "session id"          : "B6 6F 9D B1 00 15 D2 38 AD F7 45 7C D3 AB B7 59 E3 3B C5 AD C8 F8 B4 1C 35 72 BA BD E2 99 A6 15",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C 21 07 A7 C7 BA A5 3F   46 99 E3 11 50 2B 30 8F  \!.....?F...P+0.
#             0010: AD 09 C9 48 2B A2 12 27   BA C7 2A 6E ED 50 C2 06  ...H+..'..*n.P..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.678 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "46 6E A6 C2 87 9D 3B 62 E7 49 18 AF A1 43 17 26 BB C0 D0 B1 F7 7E 03 DD 95 39 77 45 39 75 E2 62",
#   "session id"          : "B6 6F 9D B1 00 15 D2 38 AD F7 45 7C D3 AB B7 59 E3 3B C5 AD C8 F8 B4 1C 35 72 BA BD E2 99 A6 15",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 31 72 EC 66 B7 CD 87 BE   27 7D 7D BE 64 77 02 52  1r.f....'...dw.R
#           0010: D1 33 FC 87 64 22 06 7E   2F 59 DC 0B D2 EA 54 7B  .3..d"../Y....T.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.678 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.679 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.680 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.681 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.681 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.681 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.682 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.683 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.683 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.684 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.685 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.691 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.693 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.694 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.698 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.698 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.698 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.699 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.699 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.699 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.700 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.701 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.701 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.701 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.702 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.703 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.703 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.705 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 41 65 A3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:11.000 UTC",
#       "not  after"         : "2023-12-25 08:00:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C 2D C1 9C DE 55 49 8B   0F F7 7E C8 EC 34 FE 86  .-...UI......4..
#           0010: 83 39 A7 EE                                        .9..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:42.766 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:42.766 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:42.767 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:00:42.767 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.794 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 C2 77 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 08:00:09.000 UTC",
#     "not  after"         : "2023-12-25 08:00:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#         0010: E8 48 6B 7B                                        .Hk.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#         0010: CA 50 22 08                                        .P".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.798 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 95 4D 8A CB 68 3B 81   E8 8E D5 F0 EC 25 0F 8E  D.M..h;......%..
#     0010: 09 96 D6 42 C8 34 AA 72   2D 9E F8 33 09 A0 E3 26  ...B.4.r-..3...&
#     0020: 03 C7 51 98 30 FF D2 AB   C2 34 3B 08 B6 DA 6E 82  ..Q.0....4;...n.
#     0030: 92 D4 48 E3 F8 06 71 66   DD 47 67 26 A7 99 2D 23  ..H...qf.Gg&..-#
#     0040: 6B D6 F3 36 36 C1 3C 02   F2 2A 1F 6F B1 68 4A 6C  k..66.<..*.o.hJl
#     0050: E9 49 3F F8 23 E4 87 4F   0A 9B 1A 62 6A 80 6C F0  .I?.#..O...bj.l.
#     0060: 20 09 9A 26 2D E5 A1 B9   F3 95 1E DB 87 2C 5C BD   ..&-........,\.
#     0070: 0A 70 70 26 FD 39 0D F2   38 3F 9B 7A FB 94 90 AB  .pp&.9..8?.z....
#     0080: 26 0E 2E 72 30 F0 51 B4   5D 47 7F A6 9E 2B DA FF  &..r0.Q.]G...+..
#     0090: C4 E2 F6 CB FC FA 77 03   8A 6C 89 59 C4 D9 58 7E  ......w..l.Y..X.
#     00A0: A4 D5 05 C5 DC 01 D2 B2   73 62 6B 0D 5D 90 16 F9  ........sbk.]...
#     00B0: 70 3A 34 E9 0B 50 73 EA   D4 39 25 14 8E 66 FA AF  p:4..Ps..9%..f..
#     00C0: 3E 92 E9 66 71 A9 8C AF   1F 95 9A 9B AA DD 8B AD  >..fq...........
#     00D0: B4 A1 AD F5 3F DC 48 F0   FE 81 EB 50 FB D5 D9 8C  ....?.H....P....
#     00E0: BE 7C 84 5E 91 57 FC 88   55 C8 66 89 5E AE 4C B8  ...^.W..U.f.^.L.
#     00F0: 00 3B 6E B0 B5 15 80 E0   6A 92 96 2D 42 E3 43 B0  .;n.....j..-B.C.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.799 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 97 DB 36 1D 42 3A D7   05 F6 68 DD 46 82 07 69  ...6.B:...h.F..i
#     0010: 80 96 92 3B 10 22 63 0B   50 7B 7A 0D 0F 0A 83 E6  ...;."c.P.z.....
#     0020: 1E 74 3F 21 26 83 8F E7   DC F4 F8 2C 55 F3 16 01  .t?!&......,U...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.802 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:42.803 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.803 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:42.803 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.803 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 08:00:42.804 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:42.804 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.804 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.807 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 8C 63 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:15.000 UTC",
#       "not  after"         : "2023-12-25 08:00:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 AB 45 40 FD 0F 4A BC   3A 13 A4 0B 8C 02 B7 85  ..E@..J.:.......
#           0010: DD 84 88 E6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 C2 77 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:09.000 UTC",
#       "not  after"         : "2023-12-25 08:00:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#           0010: E8 48 6B 7B                                        .Hk.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.832 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A A3 3E 0B 63 14 D2 19   04 CE A2 67 C4 95 1A A2  J.>.c......g....
#     0010: 7A F4 A8 29 AF C1 0D BA   1A 58 EC B1 A6 AC 4A 99  z..).....X....J.
#     0020: C7 A9 B5 5D E2 08 9B 8D   D6 AD F4 29 B1 98 C8 E2  ...].......)....
#     0030: 51 DB 9A 86 61 BD 4C 2E   72 B0 BD F5 98 55 B1 10  Q...a.L.r....U..
#     0040: 5A E9 96 3D AA 14 68 05   6C 26 DA F7 6F 67 BD 85  Z..=..h.l&..og..
#     0050: EE 2E 2D CB E1 C0 11 BD   4F 66 1F 2C 36 0D 01 B6  ..-.....Of.,6...
#     0060: 78 76 A4 15 66 C7 FF D0   68 45 3E 6C C8 B1 D0 9A  xv..f...hE>l....
#     0070: 5B 58 2A 88 22 91 0A 1C   1D 17 0D BB 28 B8 19 0E  [X*.".......(...
#     0080: 1F 23 47 B0 F5 01 85 CB   9C 20 C8 04 62 E6 23 5C  .#G...... ..b.#\
#     0090: 70 02 44 7F 55 82 91 70   2A 87 AB D6 F2 B7 2D 2C  p.D.U..p*.....-,
#     00A0: A7 AB 1E 41 B3 F6 1E 5C   67 54 01 31 5C 0C 1B 45  ...A...\gT.1\..E
#     00B0: 19 EB E9 22 93 0F 3E C9   C3 14 4A A8 0E 40 7C 5C  ..."..>...J..@.\
#     00C0: 08 E4 0F 74 67 70 1B 7E   F8 4C 80 21 25 A9 6C B1  ...tgp...L.!%.l.
#     00D0: 1D 64 5E D8 6A 01 F5 3F   CC A4 05 B6 28 77 86 73  .d^.j..?....(w.s
#     00E0: 1F 49 2B DC 0D 0D 8C E2   28 29 96 C5 72 66 E1 80  .I+.....()..rf..
#     00F0: 43 88 D1 13 67 A4 85 0F   FA 33 8E E5 C8 86 EB D3  C...g....3......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.833 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 90 09 D3 94 E4 BA 24   26 0F D3 D1 DA 55 0D 72  .......$&....U.r
#     0010: 16 C2 D9 E7 8B E3 D0 79   FC 93 B0 C7 52 FB D8 A6  .......y....R...
#     0020: B6 79 14 18 4A 94 18 07   38 39 60 1F 71 E4 A5 00  .y..J...89`.q...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.834 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:42.880 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1A 38 31 19 B1 E8 15 1D 57 A4 AF D9 1A FA E8 2C 50 80 D7 0D 1E 9A 58 C6 7F 66 0C 4F 64 9A C9 05",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 08:00:43.156 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 08:00:43.157 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 08:00:53.995; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:54.319 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 2A DC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:07.000 UTC",
#       "not  after"         : "2023-12-25 08:00:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#           0010: E8 48 6B 7B                                        .Hk.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 C2 77 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 08:00:09.000 UTC",
#       "not  after"         : "2023-12-25 08:00:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 B8 16 CE BB 5F 92 D1   98 4A A9 BD DF 22 02 D1  g...._...J..."..
#           0010: E8 48 6B 7B                                        .Hk.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FE 22 10 71 C3 6B 2E 28   4C 22 0D BA C8 8A 6F D8  .".q.k.(L"....o.
#           0010: CA 50 22 08                                        .P".
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 08:00:54.335 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:54.579 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:54.582 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 08:00:54.582 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.588 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.600 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.601 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.601 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 08:00:54.604 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "98 19 BC 0E 46 6C 9D 1A A9 06 5E FA D2 0A B4 85 35 D7 43 0F 93 A4 A2 96 1A 2C C4 B5 86 E1 C5 D3",
#     "session id"          : "EC 8A 5F 12 5B 24 FF 27 A2 C1 CB 63 CE 7B 88 25 8D 2D B5 95 E8 CE 3A 54 7A 47 EC 8B 0F 0A 2C A2",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 05 9A 3E 9B 22 14 B1 FE   5E 3C 60 45 27 74 32 54  ..>."...^<`E't2T
#               0010: 59 C9 69 5F 43 07 3C 32   20 18 86 59 DC AA E9 2F  Y.i_C.<2 ..Y.../
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.625 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "25 28 BA 7B CE 65 C8 3D 18 7B 88 0A 2D 14 11 5D 1D 10 09 35 59 C4 E5 34 D5 5F 79 C7 05 CE FF 0B",
#     "session id"          : "EC 8A 5F 12 5B 24 FF 27 A2 C1 CB 63 CE 7B 88 25 8D 2D B5 95 E8 CE 3A 54 7A 47 EC 8B 0F 0A 2C A2",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C9 84 0E 31 8B 23 A1 27   08 E9 09 FB EE CA A0 69  ...1.#.'.......i
#             0010: 36 E9 6B BF 4E F5 4C 2F   81 D4 73 0A 9E C5 EA 4E  6.k.N.L/..s....N
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.625 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.625 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.627 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.630 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.630 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.630 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.632 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.640 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.641 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.642 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.646 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.646 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.647 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:54.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:00:54.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 08:00:54.648 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certif

[...truncated too long message...]

dEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 08:02:13.849 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:02:13.895 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:02:13.895 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:02:13.896 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 08:02:13.897 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:46678/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28353ms
ok 65 stop command for single port in 30963ms
ok 66 status detects locally running solr in 14304ms
ok 67 status does not expose cli parameters to end user in 208ms
ok 68 listing out files in 2155ms
ok 69 copying files around in 6559ms
ok 70 upconfig in 2624ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
ok 73 Cleanup in 1220ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 51s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m14s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5542 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5542/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35385/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 06:17:10.345; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 06:17:10.350; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 06:17:11.585; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 06:17:11.629; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22890ms
ok 61 start solr with client truststore and security manager in 25214ms
not ok 62 start solr with mTLS needed in 57249ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-3zKq0F/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35385.
#
# Started Solr server on port 35385 (pid=201434). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35386.
#
# Started Solr server on port 35386 (pid=201859). Happy searching!
#
# INFO  - 2023-09-26 06:18:35.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 06:18:35.066; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 06:18:35.472; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 06:18:35.475; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 06:18:35.476; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:35.510 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 1C F1 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:11.000 UTC",
#     "not  after"         : "2023-12-25 06:18:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 B3 6C 76 B3 61 22 5E   8F 65 09 B2 4A 87 B5 81  q.lv.a"^.e..J...
#         0010: 52 AE 4E 23                                        R.N#
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:35.514 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E 3F 2D 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:02.000 UTC",
#     "not  after"         : "2023-12-25 06:18:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:35.529 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:35.934 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:35.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:35.935 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:35.935 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:36.089 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:36.092 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:36.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.098 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.110 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:36.113 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E7 A8 5C C5 74 41 AF E3 69 F9 5B 03 B1 EA 93 4E 44 DD D4 22 03 E0 6B 1C D2 87 94 CA 2D 11 C9 59",
#   "session id"          : "D5 3B 7D 95 F7 DA 87 6A 11 FA B1 F4 74 0E 55 96 6A 3F F3 35 AF 88 55 F0 26 56 7A 96 DB 88 C7 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 90 69 84 FF 42 72 C8   2D 32 9E EA A8 20 CD 6F  ..i..Br.-2... .o
#             0010: 1C 9F B8 49 DE 8C 5F A3   EF 39 F3 BF CF 54 C6 41  ...I.._..9...T.A
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.224 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "88 AD 80 7A 09 26 D9 6F CF 3C 6F 7C E5 9E AF 31 12 8A 54 49 35 E7 BD A6 59 AB 0F 4C 27 D3 15 74",
#   "session id"          : "D5 3B 7D 95 F7 DA 87 6A 11 FA B1 F4 74 0E 55 96 6A 3F F3 35 AF 88 55 F0 26 56 7A 96 DB 88 C7 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 02 99 83 2E C0 25 DB 66   CB 48 DD E1 B5 08 0C 3F  .....%.f.H.....?
#           0010: 9B 63 29 80 AC BB E1 B7   40 10 48 79 63 A5 98 72  .c).....@.Hyc..r
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.224 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.225 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.227 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.227 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.227 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.229 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.229 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.230 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.231 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.239 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.241 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.242 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.246 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.247 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.247 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.247 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.247 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.248 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.248 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.250 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.250 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.250 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.251 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.252 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.253 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.257 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 E1 F2 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:07.000 UTC",
#       "not  after"         : "2023-12-25 06:18:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 08 94 90 C8 FF 71 5A   EF 53 65 E3 3B 82 91 AE  ......qZ.Se.;...
#           0010: 17 E8 0A 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.258 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.359 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.364 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3D FA BA 21 46 34 4C B7   0B B2 3D D2 81 B1 D3 A3  =..!F4L...=.....
#     0010: DC 19 91 9D D4 09 A8 B4   83 F4 D1 E1 34 77 FB 03  ............4w..
#     0020: A1 E5 0B 30 4E E7 6F 88   CA 06 6C 8B 8D 50 FB 96  ...0N.o...l..P..
#     0030: 56 A0 EF 97 30 BF 7F 2B   50 FE FD FB DC B3 5A C4  V...0..+P.....Z.
#     0040: F5 FC 15 F3 9E 32 D6 E9   A0 F9 5E A0 8E 20 3A 9E  .....2....^.. :.
#     0050: D2 2C 8A 18 09 AE A1 CE   49 49 38 24 51 CD 13 86  .,......II8$Q...
#     0060: 4C F5 0A EE A0 EC CA 65   B6 8A 6A DC D7 27 C2 91  L......e..j..'..
#     0070: DB 7F 16 8D B0 21 9E DC   42 6F 17 3D 01 3F 02 89  .....!..Bo.=.?..
#     0080: 79 94 20 D8 D1 74 97 B9   74 58 B3 39 9C AA 27 32  y. ..t..tX.9..'2
#     0090: D4 13 34 2C 33 22 43 B6   8E B4 E7 7F 88 76 FB A1  ..4,3"C......v..
#     00A0: 4E 0A 11 D2 D5 55 F5 1F   A0 AC 44 72 0A 1A 64 A2  N....U....Dr..d.
#     00B0: EB C1 41 9A A9 5E A0 53   E2 8D F5 07 72 9A 11 F0  ..A..^.S....r...
#     00C0: 49 96 8B 3E 87 E9 9E ED   B2 25 01 52 34 03 3F 4F  I..>.....%.R4.?O
#     00D0: 1A 2D 24 20 EF E3 E1 3B   3C 71 DC DA 0C 7E EC 13  .-$ ...;<q......
#     00E0: 8F 4A 80 C5 31 8A 03 F4   0B F1 8E CD DF FC CD 73  .J..1..........s
#     00F0: 14 2A D2 14 81 46 B1 0B   2A 03 65 E5 D9 55 D9 11  .*...F..*.e..U..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.366 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9C C7 3C 7D E0 6F D8 12   B1 C4 A0 56 D4 0B EF CA  ..<..o.....V....
#     0010: 75 95 48 77 6A F3 E2 B7   10 93 90 63 C4 CB 13 6F  u.Hwj......c...o
#     0020: 8E 7F BF 9F 78 1C 8D 26   A9 25 0D E3 4A 2D 0F 51  ....x..&.%..J-.Q
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.368 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:36.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.369 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:36.370 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:36.370 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:36.371 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.371 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.374 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 1C F1 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:11.000 UTC",
#       "not  after"         : "2023-12-25 06:18:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 B3 6C 76 B3 61 22 5E   8F 65 09 B2 4A 87 B5 81  q.lv.a"^.e..J...
#           0010: 52 AE 4E 23                                        R.N#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 02 B6 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:04.000 UTC",
#       "not  after"         : "2023-12-25 06:18:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#           0010: 54 19 CE 7F                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.400 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 27 CB 18 5C 73 E3 30 C3   E6 15 27 F6 C8 8A E7 5C  '..\s.0...'....\
#     0010: 7B 6C 48 35 64 71 5F 66   BD 78 3B FD A0 AD 16 95  .lH5dq_f.x;.....
#     0020: 38 46 CE 61 07 84 75 E6   B8 CA B1 A4 19 0D 96 E9  8F.a..u.........
#     0030: 8C 4B 64 A8 DB C4 91 84   45 1B C0 B2 75 DD 36 98  .Kd.....E...u.6.
#     0040: 37 23 57 C8 5C 8C 87 1B   71 0C D6 80 A0 F6 A6 FC  7#W.\...q.......
#     0050: 3C CC 47 2F 8C F2 4C FA   34 31 24 36 A9 8E 23 5F  <.G/..L.41$6..#_
#     0060: 41 F5 94 21 FE 08 69 EA   17 36 5A 2A BB 31 FB 8A  A..!..i..6Z*.1..
#     0070: CE C9 23 7C D6 87 84 C2   FB 0F 52 49 EC 3C E7 4F  ..#.......RI.<.O
#     0080: A9 53 3C 4D 6C A7 3F 8F   FE E5 07 DE 2A 22 D9 D7  .S<Ml.?.....*"..
#     0090: F9 06 3B 29 1A B2 6E BF   B0 07 A3 EE 2A 4E 23 34  ..;)..n.....*N#4
#     00A0: 8D 54 A8 AE 4F 0B 53 C3   B7 BB 3C 51 5C 47 82 A9  .T..O.S...<Q\G..
#     00B0: 30 95 C8 80 CC E6 2E CF   29 A1 27 0D 7C 18 2F 61  0.......).'.../a
#     00C0: 9A A8 89 C8 BE 8A B5 36   CB B9 0C AC 8D FB 71 2D  .......6......q-
#     00D0: 31 7A 17 AD E1 8D FE 5B   5D A8 1E 9F C8 4C DA 81  1z.....[]....L..
#     00E0: C8 6D A3 55 0E 81 4E F4   8C F5 C0 C1 EF 3E E1 F5  .m.U..N......>..
#     00F0: 21 30 80 64 DA 77 BB F2   17 D1 9E E3 EE 1F 2B D9  !0.d.w........+.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.401 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC CC 0D 34 1A 5D 4C DA   87 8E 80 EC 4F 9A 4F C7  ...4.]L.....O.O.
#     0010: 05 B2 66 EA 20 44 9F BD   DF A3 85 0B BE 05 94 81  ..f. D..........
#     0020: 01 04 27 FE 3C 01 D5 BC   29 52 05 52 7F B6 6C FD  ..'.<...)R.R..l.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.402 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:36.457 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0B 3F 2B B5 D2 46 E9 00 91 0A 3E CB EB 22 AE 8A 18 6D F1 6F A1 BB DD 3B E9 A8 B7 8A 85 DE B6 16",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 06:18:36.731 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 06:18:36.732 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 06:18:37.690; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 06:18:37.696; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 06:18:38.067; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 06:18:38.070; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 06:18:38.070; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-3zKq0F/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:38.102 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 1C F1 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:11.000 UTC",
#     "not  after"         : "2023-12-25 06:18:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 B3 6C 76 B3 61 22 5E   8F 65 09 B2 4A 87 B5 81  q.lv.a"^.e..J...
#         0010: 52 AE 4E 23                                        R.N#
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:38.107 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7E 3F 2D 1A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:02.000 UTC",
#     "not  after"         : "2023-12-25 06:18:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:38.121 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:38.207 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:38.214 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:38.214 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:18:38.214 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:38.357 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.357 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:38.359 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:38.359 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.365 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.377 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:38.379 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 A1 47 70 F1 EA D9 C5 9A 7F 07 CA CA 97 FC 50 CA DC 8A 35 5D 0C 69 FC 97 39 FF A1 26 EE 95 EF",
#   "session id"          : "A1 31 7F D3 4E 6F AC EC DD 69 21 84 A7 9E F5 20 12 B1 73 4B 31 7A 9C 8E 39 E6 0F 92 2D 03 3A 22",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C 3D D3 22 B0 42 BB 96   06 36 BB 7B 9B 66 B1 8D  ,=.".B...6...f..
#             0010: A6 32 90 9A 20 AC 9F 96   4A 33 70 DD CC 2D 00 37  .2.. ...J3p..-.7
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.494 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "82 15 3C 51 7E 20 0B 1C 9A 6B 50 48 A7 20 57 49 E7 E6 79 2C D4 7A 65 4B 10 D0 E3 44 98 DE F1 B6",
#   "session id"          : "A1 31 7F D3 4E 6F AC EC DD 69 21 84 A7 9E F5 20 12 B1 73 4B 31 7A 9C 8E 39 E6 0F 92 2D 03 3A 22",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AE 63 3E 64 9E 2C F7 30   D2 A7 C3 3A 53 1D 1F E6  .c>d.,.0...:S...
#           0010: 28 74 EB CB 70 79 E7 B4   E0 25 B4 71 01 07 36 1E  (t..py...%.q..6.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.494 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.495 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.495 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.496 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.497 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.497 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.498 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.498 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.499 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.500 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.507 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.509 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.510 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.513 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.514 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.515 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.516 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.516 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.517 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.517 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.518 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.518 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.518 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.521 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 E1 F2 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:07.000 UTC",
#       "not  after"         : "2023-12-25 06:18:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 08 94 90 C8 FF 71 5A   EF 53 65 E3 3B 82 91 AE  ......qZ.Se.;...
#           0010: 17 E8 0A 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.521 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.600 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 02 B6 54",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 06:18:04.000 UTC",
#     "not  after"         : "2023-12-25 06:18:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#         0010: 54 19 CE 7F                                        T...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#         0010: 0C FA 10 71                                        ...q
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.604 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 81 54 26 F0 87 4B 8B   05 7D 87 43 58 23 A5 75  ..T&..K....CX#.u
#     0010: 8F 81 C8 57 8F D6 74 E7   95 08 09 8C D9 00 CE 1D  ...W..t.........
#     0020: 50 95 E4 7F 7A 75 F9 82   7D 75 7D 68 42 50 6C EF  P...zu...u.hBPl.
#     0030: 96 65 3E 4C B6 0F F2 22   41 A3 E7 E7 92 F5 97 DC  .e>L..."A.......
#     0040: 36 27 D3 51 62 24 4C 39   C5 3A 12 E0 9C B9 67 25  6'.Qb$L9.:....g%
#     0050: 53 B9 CD AF EF F6 A5 10   59 D7 D9 BC FD 1A 74 5A  S.......Y.....tZ
#     0060: F1 ED 48 27 FA 9F C9 B5   80 AD AB A9 0D 36 22 AE  ..H'.........6".
#     0070: EC 85 68 ED 43 A3 D7 73   92 4F 85 AA A9 51 D4 36  ..h.C..s.O...Q.6
#     0080: 29 4E F6 60 B5 31 D8 FB   56 6B 37 9B 4E 3D 46 E7  )N.`.1..Vk7.N=F.
#     0090: D5 F7 0B DC 2C 9C 42 DE   67 4E CF 12 FC C7 0B D4  ....,.B.gN......
#     00A0: 59 D3 6D 2C C2 BD 7E 94   61 BF EC B8 09 33 9D ED  Y.m,....a....3..
#     00B0: 3C E5 27 6B 12 FC 53 42   CE EA AA 83 B2 0B 0B 4B  <.'k..SB.......K
#     00C0: B6 02 2E 9E 42 26 E6 97   EE D1 90 47 46 3B 05 E5  ....B&.....GF;..
#     00D0: CD E4 73 B3 38 A7 41 EF   AF 06 09 B4 B2 B0 7C A8  ..s.8.A.........
#     00E0: 42 80 44 96 63 75 5C 66   93 F2 68 DC AB 6F 5B C7  B.D.cu\f..h..o[.
#     00F0: C2 F9 D4 47 E6 E4 85 E5   AC FC FB BF A2 CF 6D 1B  ...G..........m.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.605 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 21 09 78 7F ED 74 7B D7   EA 76 AE FA 93 D3 02 A5  !.x..t...v......
#     0010: 1A 19 EC 0F B3 57 DE 35   3A 92 2A B7 DE C3 9A 74  .....W.5:.*....t
#     0020: CB F7 07 F0 41 57 F6 AE   92 38 00 53 A9 6E D4 0F  ....AW...8.S.n..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.608 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:38.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.609 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:38.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.609 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 06:18:38.609 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:38.610 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.610 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.613 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 1C F1 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:11.000 UTC",
#       "not  after"         : "2023-12-25 06:18:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 B3 6C 76 B3 61 22 5E   8F 65 09 B2 4A 87 B5 81  q.lv.a"^.e..J...
#           0010: 52 AE 4E 23                                        R.N#
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 02 B6 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:04.000 UTC",
#       "not  after"         : "2023-12-25 06:18:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#           0010: 54 19 CE 7F                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.639 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 08 52 A0 54 3F 84 AF 6F   85 29 9B B7 F2 40 BA BD  .R.T?..o.)...@..
#     0010: B8 CF 3E BA C9 81 44 7C   DB 04 32 B9 BF 8A DF 65  ..>...D...2....e
#     0020: B7 9B 80 69 69 A3 21 CF   DF 3E A2 A7 56 06 87 33  ...ii.!..>..V..3
#     0030: DD 78 AF AB 00 30 12 0B   16 19 8A C5 43 41 90 0A  .x...0......CA..
#     0040: D7 D1 19 CA 38 8B 6B B4   EB 07 49 46 18 2E DB 32  ....8.k...IF...2
#     0050: 1F FE 8E D3 66 79 B9 9E   CA B0 63 EC CA 10 87 A3  ....fy....c.....
#     0060: 1B 84 D3 2A 4C 09 F7 D3   A8 C9 45 70 AA CF 3D 29  ...*L.....Ep..=)
#     0070: DC C4 E4 3E 37 1D 0B DF   4B DF 6C DD 49 08 A7 BA  ...>7...K.l.I...
#     0080: 0A 51 C2 E5 EB 01 66 C4   63 8E 3B 2E 3C 5B DC 7A  .Q....f.c.;.<[.z
#     0090: 03 D7 0D B6 D7 2C 3E 60   95 85 71 36 24 B5 48 9A  .....,>`..q6$.H.
#     00A0: D0 9F D9 88 61 BA 5F 4C   E4 E8 B8 1C D1 F4 2B 12  ....a._L......+.
#     00B0: 35 D8 90 6C F4 BB 3C 3D   11 88 8D 32 FC 43 EE 59  5..l..<=...2.C.Y
#     00C0: 97 99 3C 1F 87 0D 4C 35   08 78 FF 09 D5 77 64 B0  ..<...L5.x...wd.
#     00D0: CE CF 6D 41 AB 13 2A 7D   02 2A D5 89 DE 9D 3D 98  ..mA..*..*....=.
#     00E0: F6 B4 C5 5E AB E0 9E 24   6A 3F 48 2E E8 0A 13 24  ...^...$j?H....$
#     00F0: BE C5 D2 BA 02 9F F9 42   B5 0D 2F AD 89 08 21 27  .......B../...!'
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.640 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE 51 7C C5 98 28 E0 CD   93 55 83 52 08 6E E3 0F  .Q...(...U.R.n..
#     0010: 29 38 F6 DB D4 BF C5 B3   A9 21 7C C1 4E 4D E4 14  )8.......!..NM..
#     0020: BB 86 66 71 65 20 B8 62   9D E6 F0 FC A1 DB 86 B3  ..fqe .b........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.641 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:38.689 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "71 F2 44 B7 4B 86 46 B7 F1 B6 BC AC 18 20 AB 78 87 DE 48 90 16 1B 7A E7 09 6B 60 8A 03 19 AF 63",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 06:18:38.979 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 06:18:38.981 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 06:18:50.207; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:50.545 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E 3F 2D 1A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:02.000 UTC",
#       "not  after"         : "2023-12-25 06:18:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#           0010: 54 19 CE 7F                                        T...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 02 B6 54",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 06:18:04.000 UTC",
#       "not  after"         : "2023-12-25 06:18:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9D FA 77 30 F2 83 C6 E0   FC 9D F7 04 B1 33 92 8A  ..w0.........3..
#           0010: 54 19 CE 7F                                        T...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 5B A6 2F 36 A6 00 FC   4B F1 DC 99 2C 26 69 F8  -[./6...K...,&i.
#           0010: 0C FA 10 71                                        ...q
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 06:18:50.560 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:50.797 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.797 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:50.799 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 06:18:50.799 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.805 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.818 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.818 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.818 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 06:18:50.821 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C0 68 8F F0 C7 96 6D 67 68 58 5E 4E 41 D1 91 1D 34 69 E6 9D DD 6A 3A 32 D6 97 97 DB 59 1E DE 31",
#     "session id"          : "97 49 3D A3 97 C9 74 D7 75 51 59 21 DF A3 DC 8E 7E 1B F7 99 86 1D 4F 71 47 3B 42 30 A8 7B 46 53",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2E D2 72 BB 49 90 29 38   85 25 53 97 44 DF 64 BA  ..r.I.)8.%S.D.d.
#               0010: F9 BA 27 30 63 3B 50 67   D8 7D 39 6B A9 A5 CF 65  ..'0c;Pg..9k...e
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.840 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B6 33 F8 80 6D 50 53 91 32 82 14 B7 FD C1 DF E3 E6 DF 04 B7 F0 BC A1 87 D4 51 F8 40 76 D0 9D A7",
#     "session id"          : "97 49 3D A3 97 C9 74 D7 75 51 59 21 DF A3 DC 8E 7E 1B F7 99 86 1D 4F 71 47 3B 42 30 A8 7B 46 53",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 04 5A 2E 12 64 F4 B0 A9   48 A5 B7 C4 63 EE 0D 79  .Z..d...H...c..y
#             0010: 7E 2C 4D FF 01 1A B2 A1   45 AB 30 CE FC BC 5F 71  .,M.....E.0..._q
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.840 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.840 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.842 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.842 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.842 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.842 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.842 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.854 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.855 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.856 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.860 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.860 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.860 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.860 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.861 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.861 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:50.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:18:50.861 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 06:18:50.862 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certifi

[...truncated too long message...]

.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 06:20:09.905 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:20:09.949 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:20:09.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:20:09.950 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 06:20:09.950 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35386/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28460ms
ok 65 stop command for single port in 31188ms
ok 66 status detects locally running solr in 14379ms
ok 67 status does not expose cli parameters to end user in 214ms
ok 68 listing out files in 2167ms
ok 69 copying files around in 6526ms
ok 70 upconfig in 2618ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1229ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1229ms
ok 73 Cleanup in 1227ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 23s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m46s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5541 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5541/

All tests passed

Build Log:
[...truncated 1325 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41107/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-26 02:29:30.472; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 02:29:30.477; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-26 02:29:31.386; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-26 02:29:31.425; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22947ms
ok 61 start solr with client truststore and security manager in 25119ms
not ok 62 start solr with mTLS needed in 58450ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-NEqTjp/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41107.
#
# Started Solr server on port 41107 (pid=200849). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41108.
#
# Started Solr server on port 41108 (pid=201273). Happy searching!
#
# INFO  - 2023-09-26 02:30:54.849; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 02:30:54.854; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 02:30:55.204; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 02:30:55.206; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 02:30:55.207; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:55.239 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 91 81 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:31.000 UTC",
#     "not  after"         : "2023-12-25 02:30:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 6E CB 00 A6 A2 FF 73   04 EF 34 8E DD A8 8D F1  .n.....s..4.....
#         0010: 24 B0 40 2D                                        $.@-
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:55.243 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B FA 86 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:22.000 UTC",
#     "not  after"         : "2023-12-25 02:30:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:55.256 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:55.483 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.483 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:55.485 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:55.485 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.490 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.502 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:55.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C7 74 6F B7 CB 85 2B 37 2C ED 2E F5 AB 13 1C 8E 89 04 0C 7D 7A 7E 7C BC 61 20 D6 97 E7 4C 42 CA",
#   "session id"          : "41 38 0B F5 FD E8 91 FF F7 4E E9 FC D4 CB 1B 36 DE 4D 31 2F EF 22 D3 2D A4 00 8D F5 01 60 20 79",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A1 24 23 45 80 EE D3 11   BD 30 A2 A4 AC CC 75 C9  .$#E.....0....u.
#             0010: A7 4B 6F 06 D3 37 E8 0B   70 AA 6C 9F 0A AE 17 07  .Ko..7..p.l.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.614 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "63 FC C7 F4 81 E9 A4 C8 E0 95 7C ED 51 76 F3 D3 07 2C 8D 4C 04 50 5F DE 89 3F 87 C3 B8 8A A3 26",
#   "session id"          : "41 38 0B F5 FD E8 91 FF F7 4E E9 FC D4 CB 1B 36 DE 4D 31 2F EF 22 D3 2D A4 00 8D F5 01 60 20 79",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CF 37 17 47 CF A8 8B 5E   6C 33 19 37 A7 AF C6 73  .7.G...^l3.7...s
#           0010: E6 2F CF EB E5 35 C4 51   06 88 C1 9F A6 C9 EB 48  ./...5.Q.......H
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.614 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.614 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.615 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.616 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.618 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.618 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.618 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.619 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.620 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.620 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.627 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.629 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.630 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.633 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.633 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.634 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.636 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.636 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.636 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.637 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.637 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.638 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.638 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.641 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 28 94 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:27.000 UTC",
#       "not  after"         : "2023-12-25 02:30:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB DE D2 62 03 B8 6A F1   18 5E 3D AC D0 6A 39 A4  ...b..j..^=..j9.
#           0010: 3D 43 9E 5F                                        =C._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:55.697 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:55.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:55.698 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:55.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.727 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.731 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 02 9B 22 8B 80 F7 93   AE B8 0B F8 6C 66 AE 36  ..."........lf.6
#     0010: 41 DA 46 B1 D6 F6 15 8A   73 1C 41 56 95 2F 77 D5  A.F.....s.AV./w.
#     0020: 7D 9F EC C5 CA 95 34 8E   0E AB 64 69 54 C3 B8 B4  ......4...diT...
#     0030: F5 35 8C C8 44 A8 63 8E   5C 71 59 00 91 06 92 6C  .5..D.c.\qY....l
#     0040: C2 36 43 46 60 54 8F 62   23 58 17 4E 57 85 0E 30  .6CF`T.b#X.NW..0
#     0050: 01 B3 80 C5 0E A4 AA 7A   20 6C 1C CD 8B 98 47 3B  .......z l....G;
#     0060: 98 32 99 14 59 96 BD A3   81 DD 13 9B A7 10 69 6F  .2..Y.........io
#     0070: 90 A0 66 3B 75 E7 56 45   29 0D 4F F7 7D BB DE B1  ..f;u.VE).O.....
#     0080: 5A 26 47 2D 0F 17 BF 04   0F 66 F1 FB FF 8F E3 37  Z&G-.....f.....7
#     0090: BC A4 4E 00 86 0A 76 63   FD BB 8B 58 95 06 4A 15  ..N...vc...X..J.
#     00A0: E6 9D FD AA E1 95 3B 26   47 E3 AC 68 3B 68 A4 40  ......;&G..h;h.@
#     00B0: 1F 85 55 BD 32 4E 6A 31   46 A2 5B 29 AF 8F 3E 29  ..U.2Nj1F.[)..>)
#     00C0: 02 AB 5D 71 70 3D F5 10   B5 97 25 2D 7B 30 55 BB  ..]qp=....%-.0U.
#     00D0: 61 4B 97 3B 39 4F 93 AA   3F 1A 23 9B 98 17 C9 68  aK.;9O..?.#....h
#     00E0: 75 DB BF B5 34 58 3D F7   13 F8 5F 1D 3D 72 47 E7  u...4X=..._.=rG.
#     00F0: B7 07 E9 90 58 11 30 8E   50 05 6B 5B 01 FE 70 54  ....X.0.P.k[..pT
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.733 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7D 8A A2 43 6A F7 F9 D0   8E 58 6D 27 45 25 B6 D4  ...Cj....Xm'E%..
#     0010: 38 49 D1 8E 88 46 54 82   17 8B 42 83 36 85 2A 98  8I...FT...B.6.*.
#     0020: 90 35 6D C3 D5 35 38 08   4F C0 CA 7F 35 FB 74 33  .5m..58.O...5.t3
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.735 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:55.736 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.736 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:55.736 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.736 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:55.737 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:55.737 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.737 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.740 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 91 81 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:31.000 UTC",
#       "not  after"         : "2023-12-25 02:30:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 6E CB 00 A6 A2 FF 73   04 EF 34 8E DD A8 8D F1  .n.....s..4.....
#           0010: 24 B0 40 2D                                        $.@-
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 22 1E F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:24.000 UTC",
#       "not  after"         : "2023-12-25 02:30:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#           0010: 5D 09 A7 1F                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.764 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 66 43 08 76 16 CA 6B   2D 80 CF FF A7 D7 31 6C  .fC.v..k-.....1l
#     0010: 19 EF 84 05 9C 46 3B A9   FE DD E3 6A AE 41 CB CF  .....F;....j.A..
#     0020: CE F4 13 87 EC 3C 2A 14   2D 44 0D 98 56 C8 2B 97  .....<*.-D..V.+.
#     0030: F6 34 32 0E 71 CA 0F 27   91 5D 4A D8 B5 01 B5 25  .42.q..'.]J....%
#     0040: 85 9B 22 54 05 C4 A3 12   2C E2 DD 72 AA 06 A2 E0  .."T....,..r....
#     0050: 7F 2D 3C 12 68 3C CB 14   83 D4 CD F0 A9 26 C5 FB  .-<.h<.......&..
#     0060: 0D AD 6D 99 09 B4 01 23   20 79 ED AD 56 7E 0C D5  ..m....# y..V...
#     0070: 02 24 1A A5 4E B7 9E 33   AA EF E6 3E 3B 46 20 3B  .$..N..3...>;F ;
#     0080: B5 6D 78 D4 8B 66 CC CC   F9 39 49 18 AB 20 80 00  .mx..f...9I.. ..
#     0090: C3 D5 E5 2D AA 75 3C 76   EB F3 2B 1D 47 E8 9C C8  ...-.u<v..+.G...
#     00A0: 73 F6 75 2E 09 88 D8 0B   67 EA 67 08 15 8C D1 B9  s.u.....g.g.....
#     00B0: 51 36 F0 C6 9F 42 59 34   8C A6 74 DE CF E2 15 2F  Q6...BY4..t..../
#     00C0: 04 67 7A 5B 40 19 41 BC   38 98 78 33 56 2A 7F B2  .gz[@.A.8.x3V*..
#     00D0: AA A9 7A 10 9E 2A 35 A3   BF 74 C1 FF 41 20 86 87  ..z..*5..t..A ..
#     00E0: 50 41 76 FC AE 4E 13 F5   3E B1 01 EA 81 3E 0D 38  PAv..N..>....>.8
#     00F0: 27 48 D3 6B 82 76 2A 9D   60 93 62 61 04 71 87 DD  'H.k.v*.`.ba.q..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.765 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 25 0F DE B7 C6 DF 0E 8F   63 BF C9 8C A4 92 DC 66  %.......c......f
#     0010: 60 13 50 FD 06 67 DB 41   BA AE 88 99 AE 7D 4F 92  `.P..g.A......O.
#     0020: 39 D5 5D 16 57 4C 3E 06   3A EE BE BD 13 63 F6 C8  9.].WL>.:....c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.766 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:55.814 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "86 06 5C CB 49 39 B5 95 D8 34 DF 5A 2C D2 61 6E 21 EA C6 89 09 34 99 93 1C 99 A1 87 96 3C 0A 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 02:30:56.085 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 02:30:56.086 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-26 02:30:57.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-26 02:30:57.024; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-26 02:30:57.408; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 02:30:57.411; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-26 02:30:57.411; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-NEqTjp/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:57.444 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F 91 81 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:31.000 UTC",
#     "not  after"         : "2023-12-25 02:30:31.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 6E CB 00 A6 A2 FF 73   04 EF 34 8E DD A8 8D F1  .n.....s..4.....
#         0010: 24 B0 40 2D                                        $.@-
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:57.448 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B FA 86 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:22.000 UTC",
#     "not  after"         : "2023-12-25 02:30:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-26 02:30:57.463 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:57.847 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:57.848 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:57.849 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:30:57.849 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:57.945 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.945 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:57.947 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:30:57.948 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.954 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.966 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.967 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:30:57.969 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 F5 55 22 4D 1E F4 F8 E3 8A E1 0D 92 61 06 67 8F EA 22 CD AF E9 DB 98 2D 67 48 CC 1A 67 C1 88",
#   "session id"          : "A9 BA F6 0D 53 40 99 98 95 15 8D 79 6F 8D AD 91 5E 10 9D 7E 7E C6 5E AC 12 D2 2D 02 1C 9E 87 85",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 39 43 1F E2 E5 89 E5   CF 3E 1B 88 E3 6F 90 43  .9C......>...o.C
#             0010: C5 A0 B6 B7 42 3B A8 0E   F4 23 B5 2A 46 78 B3 35  ....B;...#.*Fx.5
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.084 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CA 23 E8 3A 13 A5 4A 96 3C F5 1D 04 7D 76 EF 20 0F 18 B2 DE 87 B1 75 BB 59 8C 89 B1 E8 D3 A3 4C",
#   "session id"          : "A9 BA F6 0D 53 40 99 98 95 15 8D 79 6F 8D AD 91 5E 10 9D 7E 7E C6 5E AC 12 D2 2D 02 1C 9E 87 85",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 66 8A 73 A6 11 42 C6 B1   DA FC 71 C6 BC 1D 56 1C  f.s..B....q...V.
#           0010: 33 A1 8D EC CC F2 AB B4   0E CD A2 E8 AC 8B DB 3A  3..............:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.084 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.086 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.087 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.089 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.090 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.091 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.099 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.101 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.102 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.105 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.107 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.108 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.109 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.109 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.109 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.110 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.111 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.111 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.114 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 28 94 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:27.000 UTC",
#       "not  after"         : "2023-12-25 02:30:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB DE D2 62 03 B8 6A F1   18 5E 3D AC D0 6A 39 A4  ...b..j..^=..j9.
#           0010: 3D 43 9E 5F                                        =C._
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.115 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.201 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6D 22 1E F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-26 02:30:24.000 UTC",
#     "not  after"         : "2023-12-25 02:30:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#         0010: 5D 09 A7 1F                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#         0010: 8E B7 C5 A4                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 26 DD E9 D2 8D F0 5D 74   58 65 4E B3 0C D7 93 E3  &.....]tXeN.....
#     0010: 1D 19 39 12 42 46 94 2E   32 0F 27 45 ED 2B BE 0B  ..9.BF..2.'E.+..
#     0020: 13 72 18 96 A8 08 C7 C8   E4 A2 F1 28 D4 25 44 11  .r.........(.%D.
#     0030: E4 86 BF 63 7B 22 8B 20   17 F0 9A F2 0A E6 B3 BA  ...c.". ........
#     0040: 36 53 F3 2F 2E 9E B1 7C   61 F1 60 92 4B 8A 98 3D  6S./....a.`.K..=
#     0050: 77 96 08 B0 BB 7A 32 FA   C5 82 A3 2E 0B B5 68 E2  w....z2.......h.
#     0060: 7D E1 50 5E 25 C8 D5 F5   FD 6C 8A D3 86 2F B1 12  ..P^%....l.../..
#     0070: D2 E9 CF 6E 86 16 11 5D   09 5C 73 79 81 DA F1 1F  ...n...].\sy....
#     0080: 98 8A 7E 26 E2 5C 12 1E   74 64 38 C6 D3 39 58 04  ...&.\..td8..9X.
#     0090: AE 37 09 B3 15 D6 87 4C   22 CA 30 14 E1 AE A3 DA  .7.....L".0.....
#     00A0: A7 73 20 7A 86 19 F8 41   71 FE 2F F0 DE 4B 62 2F  .s z...Aq./..Kb/
#     00B0: C0 3F B2 2A F2 82 3D 49   11 5B AF E9 37 D6 5C E3  .?.*..=I.[..7.\.
#     00C0: FE F4 6E 89 B5 89 B0 59   E5 14 72 04 2B 5A B6 64  ..n....Y..r.+Z.d
#     00D0: 2D E4 45 61 64 26 A1 BA   B8 D1 F5 F7 9A 21 07 F7  -.Ead&.......!..
#     00E0: 2E EF CA 69 C2 4F 91 C1   2B E0 5C C2 C8 16 69 32  ...i.O..+.\...i2
#     00F0: 5D 6C F6 5A F0 0F 0A B4   19 19 40 30 54 71 38 65  ]l.Z......@0Tq8e
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.207 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EA 7B 63 D6 B3 02 0C 6C   5A 10 BC 7E B7 32 9D C5  ..c....lZ....2..
#     0010: 57 D2 A9 43 C3 EB 46 3F   34 9D E7 19 57 EC 69 1C  W..C..F?4...W.i.
#     0020: DA 4B 76 7E B8 52 6F 85   55 FC 35 6D 58 F2 BB 6D  .Kv..Ro.U.5mX..m
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.210 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:58.211 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.211 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:58.212 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.212 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-26 02:30:58.212 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:30:58.212 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.213 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.216 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F 91 81 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:31.000 UTC",
#       "not  after"         : "2023-12-25 02:30:31.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 6E CB 00 A6 A2 FF 73   04 EF 34 8E DD A8 8D F1  .n.....s..4.....
#           0010: 24 B0 40 2D                                        $.@-
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 22 1E F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:24.000 UTC",
#       "not  after"         : "2023-12-25 02:30:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#           0010: 5D 09 A7 1F                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.242 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 B6 09 A2 1E EA 2E 3C   50 99 95 48 23 52 AA E4  .......<P..H#R..
#     0010: C1 01 90 79 D2 AA 89 79   BA 01 32 D1 08 53 D3 82  ...y...y..2..S..
#     0020: 14 71 BD 9D 7A C9 0A A9   42 28 1D 22 B6 B5 04 B5  .q..z...B(."....
#     0030: DF A7 61 3C D3 10 35 EC   F7 B7 F5 7C 55 7D B2 DA  ..a<..5.....U...
#     0040: E9 B2 71 C8 A1 FE A9 FC   A1 7F FC 40 93 77 8E 13  ..q........@.w..
#     0050: 16 48 51 DB A8 2C 7A 5B   AA D1 D1 72 5F CB 91 B7  .HQ..,z[...r_...
#     0060: F5 E2 6A 88 E1 70 8E EA   4F 09 C8 84 55 D6 74 A5  ..j..p..O...U.t.
#     0070: 00 C3 D6 8C 0B E9 5F D2   EE 77 0F D9 A4 16 6B 15  ......_..w....k.
#     0080: B6 32 E5 59 E4 71 13 06   CA D3 1B 34 51 0B 33 9F  .2.Y.q.....4Q.3.
#     0090: FF 57 38 81 09 D6 05 86   F8 9E 82 3F FF F3 F3 2E  .W8........?....
#     00A0: 00 F4 57 54 BD 3D 66 7C   47 18 AA 77 37 83 89 8F  ..WT.=f.G..w7...
#     00B0: 4A 4D D9 86 CE 67 30 70   78 AB 27 CB 98 DB 75 71  JM...g0px.'...uq
#     00C0: 8A 14 4F EC 7B 52 32 FF   03 1B D8 CC FC 48 1F 8D  ..O..R2......H..
#     00D0: B4 3B 15 1A 9E C8 B2 65   8D 36 50 54 73 7D 1F EE  .;.....e.6PTs...
#     00E0: 28 91 31 EC 59 DD 1C BB   8D 8E 07 07 AC F2 AA 75  (.1.Y..........u
#     00F0: 3A D8 96 5C D9 DF B5 A6   26 4C F3 20 26 79 FC B6  :..\....&L. &y..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.244 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 74 1C BA 35 EA 41 FD   E7 FF 70 8D 55 49 7F D4  .t..5.A...p.UI..
#     0010: 75 C2 A2 FC B5 5A 2B 91   46 31 37 C8 0F 91 6A EB  u....Z+.F17...j.
#     0020: BF DB 14 2C 85 36 75 4D   18 89 F5 BA 7D D4 75 0F  ...,.6uM......u.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:30:58.303 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F2 E9 48 14 7C 95 03 AB B2 49 37 86 E7 DF 45 54 17 00 4F DD B3 AE 8A 30 F2 50 9D 2D 8E 3C 9C F6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-26 02:30:58.572 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-26 02:30:58.573 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-26 02:31:09.261; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-26 02:31:09.579 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B FA 86 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:22.000 UTC",
#       "not  after"         : "2023-12-25 02:30:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#           0010: 5D 09 A7 1F                                        ]...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6D 22 1E F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-26 02:30:24.000 UTC",
#       "not  after"         : "2023-12-25 02:30:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 EC 5B 66 D9 F0 EC 92   21 65 F5 BA 72 04 4C 78  ..[f....!e..r.Lx
#           0010: 5D 09 A7 1F                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA EA 11 77 80 B7 3F A5   E5 6C E0 8B 7A 9E C4 45  ...w..?..l..z..E
#           0010: 8E B7 C5 A4                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-26 02:31:09.594 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:31:09.824 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.825 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:31:09.826 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-26 02:31:09.827 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.832 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.845 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.845 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.845 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-26 02:31:09.848 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "8C F8 2A B6 C7 05 13 56 BA 11 B7 20 95 99 FC 11 39 A7 80 19 62 1C D3 CE AB 27 FF 0A 94 92 36 B6",
#     "session id"          : "02 01 23 B8 A1 C0 79 FD AC E6 D4 8D DD 01 4D 85 D5 9A E1 80 B6 DF D8 11 A6 89 98 17 53 CB 38 46",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 59 60 04 A0 9B C0 83 C7   3D DE 35 0F 36 B5 06 D8  Y`......=.5.6...
#               0010: 31 82 26 2C 7C B7 BE B5   F3 3B 7C B2 A1 16 A1 45  1.&,.....;.....E
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.866 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8E C0 CC 31 12 6F AA 6E B5 80 1B EB 4E 9C 6C D6 4B DC 18 43 03 E9 48 F2 44 28 EE 54 D6 25 1F FC",
#     "session id"          : "02 01 23 B8 A1 C0 79 FD AC E6 D4 8D DD 01 4D 85 D5 9A E1 80 B6 DF D8 11 A6 89 98 17 53 CB 38 46",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 74 AD DA 36 27 45 7D 0F   F4 9D 93 FD E5 45 C1 E2  t..6'E.......E..
#             0010: 88 8C D1 78 BB C2 87 B8   31 7D 09 92 11 76 5A 16  ...x....1....vZ.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.867 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.867 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.868 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:31:09.872 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.879 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.881 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.882 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:31:09.886 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:31:09.887 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-26 02:31:09.888 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certif

[...truncated too long message...]

nFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-26 02:32:30.161 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:32:30.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:32:30.203 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:32:30.203 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-26 02:32:30.204 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41108/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28049ms
ok 65 stop command for single port in 31230ms
ok 66 status detects locally running solr in 14342ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2172ms
ok 69 copying files around in 6554ms
ok 70 upconfig in 2620ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 12s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m35.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5540 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5540/

2 tests failed.
FAILED:  org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection

Error Message:
java.lang.Exception: Test abandoned because suite timeout was reached.

Stack Trace:
java.lang.Exception: Test abandoned because suite timeout was reached.
	at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)


FAILED:  org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)




Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43519/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 22:32:13.739; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 22:32:13.744; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 22:32:14.656; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 22:32:14.694; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22662ms
ok 61 start solr with client truststore and security manager in 24579ms
not ok 62 start solr with mTLS needed in 57362ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rsbToy/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43519.
#
# Started Solr server on port 43519 (pid=199220). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 43520.
#
# Started Solr server on port 43520 (pid=199641). Happy searching!
#
# INFO  - 2023-09-25 22:33:37.282; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 22:33:37.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 22:33:37.657; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 22:33:37.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 22:33:37.661; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.694 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 05 95 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:13.000 UTC",
#     "not  after"         : "2023-12-24 22:33:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 58 4B A5 AE 12 72 1B   92 32 1E 6C 74 10 1B F4  .XK...r..2.lt...
#         0010: 79 B7 D2 26                                        y..&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.699 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 3D 88 1F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:05.000 UTC",
#     "not  after"         : "2023-12-24 22:33:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:37.715 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.049 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.050 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.051 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:38.051 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.204 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.204 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.206 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:38.206 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.212 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.224 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.225 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.225 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:38.228 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "26 BE 46 1C E8 59 BB 5C 14 CE 92 87 F5 17 9A 28 1C AF A9 2D E6 04 56 26 EE 45 CF DD 87 62 94 54",
#   "session id"          : "19 27 E6 F0 A2 22 C7 C9 17 43 5C 89 9A 33 C7 D9 14 79 C4 7D 41 B5 A4 12 D9 1F 77 FD 18 A7 82 DC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 A5 D3 C1 DC CE 6C 7D   E0 01 3F 68 26 80 FC 71  ......l...?h&..q
#             0010: 17 37 1A 08 2D D2 13 99   F1 1B C9 CA A8 37 B7 6E  .7..-........7.n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0E 34 CF 30 6E 9B 53 15 E2 D2 6A AF 75 B4 20 35 05 18 EF 6A 8C A8 2F 0A 74 CD A1 CE 01 F1 B7 05",
#   "session id"          : "19 27 E6 F0 A2 22 C7 C9 17 43 5C 89 9A 33 C7 D9 14 79 C4 7D 41 B5 A4 12 D9 1F 77 FD 18 A7 82 DC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A8 A0 7E E9 EE 1E 67 4D   F1 6D 78 C0 4A E2 8F D8  ......gM.mx.J...
#           0010: 0E CF E1 D4 70 94 B2 ED   7A 12 8D 8B 37 26 8B 2A  ....p...z...7&.*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.336 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.338 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.339 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.339 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.341 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.342 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.343 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.343 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.343 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.351 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.353 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.354 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.358 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.359 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.361 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.362 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.363 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.364 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.365 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.369 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 91 87 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:09.000 UTC",
#       "not  after"         : "2023-12-24 22:33:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA DE B9 8F 0F 52 C7 CE   81 63 AD 6B 50 18 A9 A0  .....R...c.kP...
#           0010: 4D 5A 3F 08                                        MZ?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.369 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.456 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.460 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 93 89 C7 A5 4F B6 44   42 25 F6 9B 09 CD CB 43  .....O.DB%.....C
#     0010: C5 B3 33 06 83 0A 78 07   41 B0 FA DE 40 2D F2 B2  ..3...x.A...@-..
#     0020: 62 DF 9B C2 CC 63 15 B3   CD EE D4 9C AB 10 74 EE  b....c........t.
#     0030: F6 15 38 42 93 6F 9F 43   33 2B 3F C3 4B 32 01 9A  ..8B.o.C3+?.K2..
#     0040: FF E3 39 D6 1D EB 0C DC   FC 04 D2 09 C4 AC E2 D2  ..9.............
#     0050: 93 4A 3E 58 D4 2B C9 F3   C1 5A 02 76 AB 57 37 9C  .J>X.+...Z.v.W7.
#     0060: 10 86 D9 9E 17 C1 59 3E   B8 9D 42 C6 FC 1A 52 0E  ......Y>..B...R.
#     0070: 94 73 BC 54 4F FF 9B 26   CF 02 FD 6A 10 43 55 C2  .s.TO..&...j.CU.
#     0080: 39 3E 7E FE FF 59 1F 5B   96 7E 83 05 6F DF E7 55  9>...Y.[....o..U
#     0090: 7C D4 A1 93 26 2F 89 5E   DB B8 B9 23 BF EE 20 D9  ....&/.^...#.. .
#     00A0: 46 07 B5 3C 5D 67 5C A3   FF AB 88 64 05 79 BB 0F  F..<]g\....d.y..
#     00B0: 6C C5 B0 83 F9 4F E9 D3   60 FF 8B 34 31 ED 17 A3  l....O..`..41...
#     00C0: A7 85 4E 5A 91 BB FE 51   AF D2 86 02 C2 9E 5A 91  ..NZ...Q......Z.
#     00D0: B6 E2 BB BE 84 0E 8A 7D   AE 61 FF 99 4C DA AE D3  .........a..L...
#     00E0: 96 E0 E8 F7 7C 7A DC 99   1F 69 79 61 BB 1A AB B7  .....z...iya....
#     00F0: C9 13 23 50 AF E7 C9 4F   CB 84 18 22 81 7A 46 6F  ..#P...O...".zFo
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.462 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C4 A6 30 10 64 41 F2 33   5A 02 57 97 92 3F 3D E4  ..0.dA.3Z.W..?=.
#     0010: 24 78 7C 94 32 D1 44 63   06 F4 9D E9 05 49 30 8B  $x..2.Dc.....I0.
#     0020: BD E4 B1 F7 1E 52 6E 8A   78 B1 9D F6 35 84 A3 1E  .....Rn.x...5...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.465 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.466 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.466 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.467 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.467 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:38.467 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:38.468 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.468 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.471 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 05 95 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:13.000 UTC",
#       "not  after"         : "2023-12-24 22:33:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 58 4B A5 AE 12 72 1B   92 32 1E 6C 74 10 1B F4  .XK...r..2.lt...
#           0010: 79 B7 D2 26                                        y..&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 13 C9 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:07.000 UTC",
#       "not  after"         : "2023-12-24 22:33:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#           0010: BD F0 40 57                                        ..@W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.496 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AA 2C 47 76 EE 4A 30 F8   37 13 82 0F 7E 99 BA 5A  .,Gv.J0.7......Z
#     0010: 27 48 0C 3C E5 23 34 21   DE 9B 0D 6C 29 9C D9 65  'H.<.#4!...l)..e
#     0020: 96 8F 98 C0 80 06 52 84   57 B3 A9 C0 86 6D F4 3F  ......R.W....m.?
#     0030: 39 CB F6 C6 0F 0B B1 A7   29 E5 7B 6E 8C DD B7 1B  9.......)..n....
#     0040: 9F 1A CE 3C 64 7B 08 51   06 63 EC 95 47 AF 41 C3  ...<d..Q.c..G.A.
#     0050: 6A 6A 82 F2 92 42 4F 5B   64 41 3D FC FC C6 C9 2E  jj...BO[dA=.....
#     0060: 79 FB 81 0C 30 4D 84 F9   38 55 A7 59 54 56 71 8C  y...0M..8U.YTVq.
#     0070: C9 0B 25 77 09 60 81 B7   98 F6 15 7C 20 0F 76 51  ..%w.`...... .vQ
#     0080: 32 6D 9D 99 25 E0 82 6D   5A 79 44 D8 1C BC 8E AF  2m..%..mZyD.....
#     0090: 95 93 00 52 B0 9F 49 59   3A 7E 79 CC CC C1 7C 4C  ...R..IY:.y....L
#     00A0: 4B 1F 1F A3 5B 4D AE 57   33 F9 E2 6D 69 A7 74 04  K...[M.W3..mi.t.
#     00B0: 74 A8 87 07 15 44 E0 5F   4F CA D7 0D 2A 93 0C 5E  t....D._O...*..^
#     00C0: 2E 9A 37 5A 33 72 79 65   C4 C7 6F DB 5A 85 E1 DC  ..7Z3rye..o.Z...
#     00D0: 55 DB 20 C3 28 C4 6C 1F   6E C1 AD B4 98 4F 14 0C  U. .(.l.n....O..
#     00E0: FF 57 13 80 96 A0 B2 34   F2 BC E7 28 B9 D1 21 3B  .W.....4...(..!;
#     00F0: BB 71 90 65 11 49 6D E3   BB 19 2D 71 84 E4 AE CE  .q.e.Im...-q....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.497 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 35 BE 29 AD F0 BF 1A A3   69 5A FC 43 5A DD 48 94  5.).....iZ.CZ.H.
#     0010: 00 E6 DC 42 61 5B C3 B0   BA 25 22 04 99 E7 B8 B7  ...Ba[...%".....
#     0020: 84 C6 03 DB 8D C0 CD 38   95 87 A4 43 8A 62 60 0E  .......8...C.b`.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.498 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:38.548 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 CA E9 49 E3 74 EE 9F 4E 5D DA 10 7E 50 92 FA 7E EF AE 4B ED F7 86 87 F6 94 DD 81 8F 1C B2 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 22:33:38.819 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 22:33:38.821 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 22:33:39.765; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 22:33:39.770; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 22:33:40.135; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 22:33:40.138; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 22:33:40.138; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rsbToy/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.170 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 05 95 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:13.000 UTC",
#     "not  after"         : "2023-12-24 22:33:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 58 4B A5 AE 12 72 1B   92 32 1E 6C 74 10 1B F4  .XK...r..2.lt...
#         0010: 79 B7 D2 26                                        y..&
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.174 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "14 3D 88 1F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:05.000 UTC",
#     "not  after"         : "2023-12-24 22:33:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:40.189 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.422 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.423 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.424 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:40.425 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.430 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.441 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.442 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.442 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:40.444 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6E CA 45 4C 4E 4C 77 2D 6D 80 C0 88 A0 54 1D D9 A5 20 6A E1 68 60 1E CA B8 78 1D A6 69 4D FE 7F",
#   "session id"          : "66 B8 54 23 45 06 0A BE 05 68 6A 40 E2 69 13 52 00 FB D1 30 CB B0 27 45 7B 95 73 BB 4C E6 50 7E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 34 62 7D E0 8D 24 7B AD   2B C3 58 9F AF 4C D5 06  4b...$..+.X..L..
#             0010: 15 E5 1F B0 62 15 8C F2   FA E4 E4 81 D9 74 0D 24  ....b........t.$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F7 7A CD B1 1C A3 3D 4F 75 C3 12 B2 A4 7E 10 C3 2D 16 74 54 7B B4 E5 D6 56 26 2A 5D 2B 16 33 81",
#   "session id"          : "66 B8 54 23 45 06 0A BE 05 68 6A 40 E2 69 13 52 00 FB D1 30 CB B0 27 45 7B 95 73 BB 4C E6 50 7E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D4 DC 13 61 A5 EB F1 23   8F D9 53 6C 60 B2 C9 78  ...a...#..Sl`..x
#           0010: D9 82 30 BC 2C A8 64 47   78 CF 33 33 0C F8 66 54  ..0.,.dGx.33..fT
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.555 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.556 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.557 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.559 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.559 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.560 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.561 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.561 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.568 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.569 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.570 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.574 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.575 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.575 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.575 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.576 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.577 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.578 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.579 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.579 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.582 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 91 87 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:09.000 UTC",
#       "not  after"         : "2023-12-24 22:33:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA DE B9 8F 0F 52 C7 CE   81 63 AD 6B 50 18 A9 A0  .....R...c.kP...
#           0010: 4D 5A 3F 08                                        MZ?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.582 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.635 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.635 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.636 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:40.636 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.658 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "50 13 C9 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 22:33:07.000 UTC",
#     "not  after"         : "2023-12-24 22:33:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#         0010: BD F0 40 57                                        ..@W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#         0010: 9B FC 1B 6A                                        ...j
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.662 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 A3 AF 0D 54 C9 05 B9   B0 99 90 5C 2A 71 AA 39  X...T......\*q.9
#     0010: 73 7D F3 3E 51 80 B0 1B   9C 76 84 A8 99 67 B7 99  s..>Q....v...g..
#     0020: 5F 0C 42 44 9B 52 27 C2   F8 8D A0 4A 2A 93 4F 69  _.BD.R'....J*.Oi
#     0030: 15 B4 57 2E A9 3C FF DB   DA EC E0 CF AD 62 1A 2B  ..W..<.......b.+
#     0040: FA F0 44 16 FB 0B 17 1B   65 E0 38 BB 58 7C 4D A0  ..D.....e.8.X.M.
#     0050: 55 5E 12 8B FC 0D FC C6   C7 F8 A1 29 01 37 12 F3  U^.........).7..
#     0060: 69 A9 D3 D4 25 3E 97 44   99 1D 8F B3 7F DE 6F 1D  i...%>.D......o.
#     0070: 12 2F AC 99 B6 D9 7C B5   9F 40 32 BA 3E EC E0 2D  ./.......@2.>..-
#     0080: 77 F5 C6 71 32 71 AF 5C   23 21 E8 3B 86 9A 2C 77  w..q2q.\#!.;..,w
#     0090: D3 F0 9C 07 E5 1F DC F5   9B 91 17 07 50 64 1E 1B  ............Pd..
#     00A0: 88 46 7A 23 7E 42 E0 2C   29 76 6A 32 C9 D4 4E 36  .Fz#.B.,)vj2..N6
#     00B0: A6 3F 0F ED 6E 48 0E 6D   13 09 2D EE C3 0D 27 E1  .?..nH.m..-...'.
#     00C0: 3E 64 99 45 54 A2 98 6C   C8 55 A0 68 4D 73 78 2C  >d.ET..l.U.hMsx,
#     00D0: 0E 39 79 F4 BC 77 3A E9   B5 24 F5 3D AD 4C 22 15  .9y..w:..$.=.L".
#     00E0: FA AA 7B A2 F1 D3 0B 68   9C 5E 4D 5B 3C 80 52 C9  .......h.^M[<.R.
#     00F0: DA DA 0B E8 37 1F 5D A4   73 81 0D 1F F0 27 80 A8  ....7.].s....'..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.664 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 24 8A A8 D3 69 7B FD   8B 60 41 60 BD 49 4A 4F  A$...i...`A`.IJO
#     0010: 5A A0 6C 5B 6C D7 86 93   48 90 B5 36 39 A7 BF D6  Z.l[l...H..69...
#     0020: AF 2E 71 E5 C4 73 96 6A   22 6B F8 05 51 08 8C F5  ..q..s.j"k..Q...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.666 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.667 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.668 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.668 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 22:33:40.668 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:40.669 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.669 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.671 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 05 95 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:13.000 UTC",
#       "not  after"         : "2023-12-24 22:33:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 58 4B A5 AE 12 72 1B   92 32 1E 6C 74 10 1B F4  .XK...r..2.lt...
#           0010: 79 B7 D2 26                                        y..&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 13 C9 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:07.000 UTC",
#       "not  after"         : "2023-12-24 22:33:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#           0010: BD F0 40 57                                        ..@W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.698 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 FD 04 CB 09 50 8B 88   99 6D C0 31 F7 37 5B D0  .....P...m.1.7[.
#     0010: B2 3D DE 4B CD 17 AA A1   09 4B 5F D5 3F EC FD 82  .=.K.....K_.?...
#     0020: 86 21 70 A2 09 25 0E 7F   70 6E 43 49 F7 AA 7E FD  .!p..%..pnCI....
#     0030: 0E 28 0B 89 E6 B5 1A FA   AD 84 8B 62 C5 8F 03 E8  .(.........b....
#     0040: 8D 1B EF A9 F0 20 67 7B   82 7C 99 1F 0A 4D 7B 3A  ..... g......M.:
#     0050: 02 41 9E 6F C8 EA 3B 40   13 E4 78 16 8B 07 E0 8E  .A.o..;@..x.....
#     0060: 03 4C 50 3B 51 26 9A 77   E4 8A 38 F7 D2 75 C8 11  .LP;Q&.w..8..u..
#     0070: 31 23 48 BC 39 E2 96 EB   F7 C6 60 ED 78 0D B4 BB  1#H.9.....`.x...
#     0080: E8 B6 93 CE 0E 13 9E 44   08 6A E2 F4 97 3A 53 BF  .......D.j...:S.
#     0090: 53 0C 4B 08 0C BD 53 82   C6 2A FC BB 51 91 85 2F  S.K...S..*..Q../
#     00A0: 09 74 43 69 71 2B 6A D0   65 46 67 64 BD 5B 7B 56  .tCiq+j.eFgd.[.V
#     00B0: 7B CC 27 6E 8F B2 AD 8E   54 99 53 EB 40 07 64 0C  ..'n....T.S.@.d.
#     00C0: 9B 91 C1 AB 14 BD 61 91   29 0E B2 60 03 B1 95 8E  ......a.)..`....
#     00D0: 1C D8 F6 A6 E3 CF 49 BF   2A AA 62 2C 5A EA 5D 65  ......I.*.b,Z.]e
#     00E0: CC 5A 77 29 97 44 66 A1   78 0A 18 70 F6 6D EC E2  .Zw).Df.x..p.m..
#     00F0: A6 F0 CD EE 93 CC 8C 4D   52 0C 74 94 4E B1 E1 16  .......MR.t.N...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.699 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CE A7 ED A6 1C C5 AA 82   05 9C D3 62 5D 7B B7 1B  ...........b]...
#     0010: F4 28 F4 F9 21 93 BD 92   B5 BF D2 68 F4 AA EB 0D  .(..!......h....
#     0020: D5 D1 93 46 0F 56 79 98   2A 00 35 60 0F 61 EC 31  ...F.Vy.*.5`.a.1
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.700 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:40.749 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 BF 66 21 D4 D1 C1 B1 BE A3 C5 6D 57 2F 96 96 89 C9 28 CF F6 CB 56 3D 96 DC B4 18 92 24 95 F4",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 22:33:41.019 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 22:33:41.020 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 22:33:52.342; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:52.674 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "50 13 C9 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:07.000 UTC",
#       "not  after"         : "2023-12-24 22:33:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#           0010: BD F0 40 57                                        ..@W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5E 69 13 48 5D C1 55 86   D7 69 EF 52 5B 3E 90 8C  ^i.H].U..i.R[>..
#           0010: 9B FC 1B 6A                                        ...j
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "14 3D 88 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 22:33:05.000 UTC",
#       "not  after"         : "2023-12-24 22:33:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 16 99 F3 38 E6 D0 39 52   6F EE B5 53 02 BB DB FD  ...8..9Ro..S....
#           0010: BD F0 40 57                                        ..@W
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 22:33:52.691 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.083 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.083 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.084 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 22:33:53.084 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.169 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.171 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 22:33:53.172 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.190 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 22:33:53.193 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "15 F3 84 C4 B9 2F ED DD 6A 10 7F D7 AD 0C 1B 95 36 29 15 A9 7A C2 41 BE B9 CD AA 33 AA 01 D8 12",
#     "session id"          : "24 48 1F B1 80 B4 1F E1 2A 7D 26 98 92 0A 62 4E 46 A9 DB E5 10 3B 75 13 9B 8D 2E 4F 59 FE BB 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A3 41 EA FD 02 B1 68 31   3C 66 24 BA 2C F5 49 AC  .A....h1<f$.,.I.
#               0010: 18 72 25 74 B8 A1 AD 6B   06 67 23 54 EF 32 0C 1A  .r%t...k.g#T.2..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.212 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "08 18 5B FF 85 00 19 DA B4 E5 70 15 20 40 E3 2C 79 66 C8 A9 BD 9A 9F 32 FF 0E 14 71 94 FA 88 3A",
#     "session id"          : "24 48 1F B1 80 B4 1F E1 2A 7D 26 98 92 0A 62 4E 46 A9 DB E5 10 3B 75 13 9B 8D 2E 4F 59 FE BB 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: C7 3B 8D 0E CD EB 80 7A   59 9D 84 0E 2D D7 F6 98  .;.....zY...-...
#             0010: B5 17 6D B2 45 47 BA 24   68 26 AF 38 27 DF 59 4D  ..m.EG.$h&.8'.YM
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.213 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.213 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.215 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.217 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.219 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.227 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.229 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.230 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 22:33:53.234 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:33:53.235 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 22:3

[...truncated too long message...]


  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   71) Thread[id=77, name=qtp1094083871-77, state=TIMED_WAITING, group=TGRP-TestDocCollectionWatcher]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   72) Thread[id=81, name=qtp734515328-81, state=TIMED_WAITING, group=TGRP-TestDocCollectionWatcher]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   73) Thread[id=95, name=qtp1094083871-95, state=TIMED_WAITING, group=TGRP-TestDocCollectionWatcher]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   74) Thread[id=132, name=h2sc-61-thread-1, state=RUNNABLE, group=TGRP-TestDocCollectionWatcher]
  2>         at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
  2>         at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
  2>         at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
  2>         at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
  2>         at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
  2>         at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
  2>         at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$276/0x0000000840362c40.run(Unknown Source)
  2>         at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
  2>         at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$277/0x0000000840362440.run(Unknown Source)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
  2>         at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  2>   75) Thread[id=84, name=qtp1094083871-84, state=TIMED_WAITING, group=TGRP-TestDocCollectionWatcher]
  2>         at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
  2>         at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
  2>         at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
  2>         at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
  2>         at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
  2>         at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
   >     java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
   >         at __randomizedtesting.SeedInfo.seed([6DE57BFFF1610502]:0)
  2> NOTE: test params are: codec=Asserting(Lucene95): {}, docValues:{}, maxPointsInLeafNode=592, maxMBSortInHeap=5.967649802224547, sim=Asserting(RandomSimilarity(queryNorm=true): {}), locale=en-UG, timezone=Africa/Tripoli
  2> NOTE: Linux 5.4.0-100-generic amd64/Oracle Corporation 11.0.16 (64-bit)/cpus=1,threads=87,free=157643144,total=322961408
  2> NOTE: All tests run in this JVM: [LargeVolumeBinaryJettyTest, TestDocCollectionWatcher]
  2> NOTE: reproduce with: gradlew test --tests TestDocCollectionWatcher -Dtests.seed=6DE57BFFF1610502 -Dtests.locale=en-UG -Dtests.timezone=Africa/Tripoli -Dtests.asserts=true -Dtests.file.encoding=UTF-8

:solr:solrj:test (FAILURE): 1136 test(s), 2 failure(s), 40 skipped

1136 tests completed, 2 failed, 40 skipped

> Task :solr:solrj:test FAILED
> Task :solr:solrj:wipeTaskTemp

ERROR: The following test(s) have failed:
  - org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection (:solr:solrj)
    Test output: /tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.common.cloud.TestDocCollectionWatcher.txt
    Reproduce with: gradlew :solr:solrj:test --tests "org.apache.solr.common.cloud.TestDocCollectionWatcher.testCanWaitForNonexistantCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6DE57BFFF1610502 -Ptests.file.encoding=US-ASCII

  - org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod (:solr:solrj)
    Test output: /tmp/src/solr/solr/solrj/build/test-results/test/outputs/OUTPUT-org.apache.solr.common.cloud.TestDocCollectionWatcher.txt
    Reproduce with: gradlew :solr:solrj:test --tests "org.apache.solr.common.cloud.TestDocCollectionWatcher.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6DE57BFFF1610502 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:solrj:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/solrj/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 2h 2m 39s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 2h3m2s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5539 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5539/

All tests passed

Build Log:
[...truncated 1260 lines...]
#   ERROR: Error from server at http://localhost:34339/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#     Searching for Solr?<br/>
#     You must type the correct path.<br/>
#     Solr will respond.
#   </p>
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/5-2
# Last output:
# WARNING: Using _default configset with data driven schema functionality. NOT RECOMMENDED for production use.
#          To turn off: bin/solr config -c COLL_NAME -p 34339 -action set-user-property -property update.autoCreateFields -value false
#
# ERROR: Error from server at http://localhost:34339/solr/admin/info/system?wt=javabin&version=2: Expected mime type in [application/vnd.apache.solr.javabin, application/octet-stream] but got text/html. <p>
#   Searching for Solr?<br/>
#   You must type the correct path.<br/>
#   Solr will respond.
# </p>
ok 6 create collection in 7732ms
ok 7 reject d option with invalid config dir in 1273ms
ok 8 accept d option with builtin config in 5996ms
ok 9 accept d option with explicit path to config in 5851ms
ok 10 accept n option as config name in 5960ms
ok 11 allow config reuse when n option specifies same config in 10321ms
ok 12 create multisharded collections when s provided in 5790ms
ok 13 create replicated collections when rf provided in 6668ms
ok 14 can delete collections in 9669ms
ok 15 collection delete also deletes zk config in 8168ms
ok 16 deletes accompanying zk config with nondefault name in 8242ms
ok 17 deleteConfig option can opt to leave config in zk in 8171ms
ok 18 SOLR-16755 test works with noprompt in 37846ms
ok 19 Check export command in 28965ms
ok 20 export fails on non cloud mode in 17336ms
ok 21 using curl to extract a single pdf file in 24297ms
ok 22 using the bin/solr post tool to extract content from pdf in 24365ms
ok 23 using the bin/solr post tool to crawl web site in 26384ms
ok 24 healthcheck on cloud solr in 36271ms
ok 25 start help flag prints help in 153ms
ok 26 stop help flag prints help in 147ms
ok 27 restart help flag prints help in 152ms
ok 28 status help flag prints help in 49ms # skip Currently the status -help flag doesn't return nice help text!
ok 29 healthcheck help flag prints help in 144ms
ok 30 create help flag prints help in 145ms
ok 31 createcore help flag prints help in 146ms
ok 32 createcollection help flag prints help in 151ms
ok 33 delete help flag prints help in 147ms
ok 34 version help flag prints help in 47ms # skip Currently the version -help flag doesn't return nice help text!
ok 35 zk help flag prints help in 151ms
ok 36 auth help flag prints help in 151ms
ok 37 assert help flag prints help in 1022ms
ok 38 post help flag prints help in 1010ms
ok 39 SQL Module in 24449ms
ok 40 Hadoop-Auth Module: KerberosPlugin Classloading in 26186ms
ok 41 icu collation in analysis-extras module in 19386ms
ok 42 package detects no running solr in 237ms
ok 43 lifecycle of package in 16555ms
ok 44 deploying and undeploying a collection level package in 20436ms
ok 45 Affinity placement plugin using sysprop in 22509ms
ok 46 Random placement plugin using ENV in 23091ms
ok 47 Check help command in 2841ms
ok 48 basic post with a type specified in 5950ms
ok 49 basic post WITHOUT a type specified in 12355ms
ok 50 crawling a directory in 4717ms
ok 51 crawling a web site in 5200ms
ok 52 commit and optimize and delete in 3971ms
ok 53 args mode in 6640ms
ok 54 stdin mode in 3757ms
ok 55 post solr log into solr via script in 9076ms
ok 56 post solr log into solr via cli in 7681ms
ok 57 allowPaths - backup in 23464ms
ok 58 start solr with ssl in 25164ms
not ok 59 use different hostname when not checking peer-name in 26255ms
# (from function `assert_output' in file /tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34339.
#
# Started Solr server on port 34339 (pid=194515). Happy searching!
#
# INFO  - 2023-09-25 19:46:26.807; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 19:46:26.812; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 19:46:27.194; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-25 19:46:27.267; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-09-25 19:46:27.267; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@77b14724[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-09-25 19:46:35.839; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-09-25 19:46:35.844; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-09-25 19:46:36.227; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604c5de8(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/59/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:34339/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 19:46:37.723; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 19:46:37.728; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 19:46:38.640; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 19:46:38.679; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23035ms
ok 61 start solr with client truststore and security manager in 24986ms
not ok 62 start solr with mTLS needed in 59812ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ORyXlM/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34339.
#
# Started Solr server on port 34339 (pid=199373). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34340.
#
# Started Solr server on port 34340 (pid=199795). Happy searching!
#
# INFO  - 2023-09-25 19:48:02.324; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 19:48:02.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 19:48:02.715; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 19:48:02.718; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 19:48:02.719; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:02.753 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 B5 65 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:38.000 UTC",
#     "not  after"         : "2023-12-24 19:47:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC EF D9 6F 4A CC 44 5F   A0 EF 16 D7 F1 2B 28 E7  ...oJ.D_.....+(.
#         0010: E2 3E A3 16                                        .>..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:02.757 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 CB 2C 65",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:29.000 UTC",
#     "not  after"         : "2023-12-24 19:47:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:02.773 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:03.166 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:03.167 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:03.167 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:03.167 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:03.305 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:03.307 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:03.307 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.314 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.326 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.326 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.326 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:03.329 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DB B0 84 12 97 B6 35 FF 36 33 E3 E7 0C DC DE 4D F7 9E 59 DD F9 9A BA 87 EA E7 E2 CE 30 74 DD 97",
#   "session id"          : "01 36 D7 6C 43 38 8B 3D 34 58 4C C6 1B 9C 5D 5E FA F5 57 7F 4F 07 30 AC 12 A2 9C 65 0C 9E D1 4F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 72 80 5D 07 F3 B3 CF   CF AC EB F4 D9 DF 12 53  Yr.]...........S
#             0010: F7 BA 34 15 70 1E 4B C0   8B AB 3E 1C 30 79 3F 1B  ..4.p.K...>.0y?.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.442 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "45 C5 8B 8B F2 B3 F7 F2 58 36 AB 2B D3 01 30 30 09 9E 2B F0 52 36 63 EC F7 BA 78 EA F3 33 D9 54",
#   "session id"          : "01 36 D7 6C 43 38 8B 3D 34 58 4C C6 1B 9C 5D 5E FA F5 57 7F 4F 07 30 AC 12 A2 9C 65 0C 9E D1 4F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 55 3A EF 6A FA 48 2F   A9 21 A0 56 AC D1 25 FE  CU:.j.H/.!.V..%.
#           0010: 08 12 8A 69 1D 1C 74 04   8B 90 79 F9 1B 88 02 4D  ...i..t...y....M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.442 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.442 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.443 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.444 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.445 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.447 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.447 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.447 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.447 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.448 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.449 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.449 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.457 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.458 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.459 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.463 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.463 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.464 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.466 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.466 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.467 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.467 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.468 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.469 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.469 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.473 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 5C 12 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:34.000 UTC",
#       "not  after"         : "2023-12-24 19:47:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 43 01 13 CD 88 20 37   33 11 B8 61 D9 23 09 F7  .C.... 73..a.#..
#           0010: 58 DD F2 FE                                        X...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.473 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.554 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.558 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B FB FD 24 78 9C 32 A0   05 9A 2F 5C 62 D7 4E 7B  ...$x.2.../\b.N.
#     0010: 6F EC B1 FD 76 00 A5 C5   4C E7 2F 0E 98 5F 06 08  o...v...L./.._..
#     0020: 94 4B D1 EC 23 8E 2A C4   27 85 5E 9A A5 67 2B 54  .K..#.*.'.^..g+T
#     0030: BD 06 7E 70 07 F0 D3 15   0E 19 1A 5F D8 17 D0 81  ...p......._....
#     0040: 72 D5 67 B0 28 1E 0B 9D   C9 5A CA 82 ED 43 CD 32  r.g.(....Z...C.2
#     0050: C4 97 19 E4 04 28 20 88   2F 41 7D 4B B1 64 8E DC  .....( ./A.K.d..
#     0060: 50 93 D2 AD 3B 81 88 FF   C7 88 72 46 9D BD 5E 1A  P...;.....rF..^.
#     0070: 9A 7A D2 3D 9A A5 5E B4   25 ED 78 65 FE CE C9 E1  .z.=..^.%.xe....
#     0080: 5B 25 1F 11 55 86 22 38   A9 CA 50 1A 14 ED 37 75  [%..U."8..P...7u
#     0090: BF 85 56 E6 F0 D8 93 52   4E DB B2 5D 4F F7 A9 0A  ..V....RN..]O...
#     00A0: 2E 56 2A 70 18 C9 78 C1   08 DE DF 62 38 85 EE 95  .V*p..x....b8...
#     00B0: EB 6F D6 C3 AA EF C5 83   C5 43 F9 D8 E7 EF 45 41  .o.......C....EA
#     00C0: 61 48 94 1E A3 85 87 22   98 94 EB 50 7C 69 71 AA  aH....."...P.iq.
#     00D0: 7E CA C5 75 D7 C6 8E F8   6E 2C 8B 72 3A EA 70 E7  ...u....n,.r:.p.
#     00E0: 06 86 64 77 39 A2 F6 F1   58 A3 FC E4 84 97 26 11  ..dw9...X.....&.
#     00F0: EE C5 03 55 5B 51 B4 A8   CE CC EC 4D 2A 88 61 EA  ...U[Q.....M*.a.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.560 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 7E A7 16 72 10 E3 89   3D B4 28 6B EC D1 4C ED  D...r...=.(k..L.
#     0010: A3 AD FD 92 9C D9 5E 68   CB 9C CE 3F 6D 42 35 09  ......^h...?mB5.
#     0020: 97 3F 31 25 19 65 E8 B9   3C 9A 13 D7 93 19 C1 EC  .?1%.e..<.......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.562 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:03.563 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.563 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:03.564 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.564 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:03.564 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:03.565 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.565 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.568 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 B5 65 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:38.000 UTC",
#       "not  after"         : "2023-12-24 19:47:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC EF D9 6F 4A CC 44 5F   A0 EF 16 D7 F1 2B 28 E7  ...oJ.D_.....+(.
#           0010: E2 3E A3 16                                        .>..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 6B A3 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:31.000 UTC",
#       "not  after"         : "2023-12-24 19:47:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#           0010: 18 D5 E3 D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.595 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A 0E F2 84 8B D2 48 E7   16 68 73 32 30 09 5C 05  j.....H..hs20.\.
#     0010: 2A 84 84 7D 66 55 BC 8E   1A A0 0B E1 C7 BF 19 93  *...fU..........
#     0020: 94 91 C5 E3 15 EC 58 59   85 8B D8 6A 54 F4 B3 A7  ......XY...jT...
#     0030: DB 3A AB 1D 63 EF 54 F3   52 19 4D D1 DD C6 C7 BA  .:..c.T.R.M.....
#     0040: 8E E1 A1 27 3E AC 7A 4F   03 1D 29 06 0B 45 4E 23  ...'>.zO..)..EN#
#     0050: F0 98 8F DB BD BC ED EF   99 53 0B EC 8E 0A 92 EE  .........S......
#     0060: 24 A5 67 F5 C2 08 E0 67   C1 A8 6F AD 7F 90 12 94  $.g....g..o.....
#     0070: 9E A0 CD 82 AF 6B D4 22   89 9E F0 96 A3 39 93 B6  .....k.".....9..
#     0080: F6 53 DB 7E F4 6D 90 7A   35 CF 85 63 8A CA 01 BC  .S...m.z5..c....
#     0090: AD 76 5C 01 60 08 8A 5E   7D 84 46 21 DB 10 A5 E9  .v\.`..^..F!....
#     00A0: B4 67 8E B5 18 8A 98 08   EA 28 EF 87 34 C1 43 A9  .g.......(..4.C.
#     00B0: 2D DA DC 08 40 C2 5B 2F   31 63 6F 4C E6 48 B2 2E  -...@.[/1coL.H..
#     00C0: C8 1B 26 E3 4E F7 4B CF   B5 D6 A2 9B 61 5D 81 EA  ..&.N.K.....a]..
#     00D0: 54 1F 3A A1 9B 13 A7 96   B8 69 47 CD 8E 18 2C E7  T.:......iG...,.
#     00E0: 7B DE 9C 18 3B 9D B5 C7   E0 67 34 0D 74 FD 95 B8  ....;....g4.t...
#     00F0: DD A4 8E 66 48 EE 9D 64   B9 4E 75 16 78 82 EE 36  ...fH..d.Nu.x..6
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.596 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF 8C E2 F8 09 B9 4D D4   58 0C C2 04 87 02 A7 DE  ......M.X.......
#     0010: 37 4B E8 98 EC 4D 0F DC   DE 29 B7 A5 8C 7C 44 21  7K...M...)....D!
#     0020: 49 A6 11 E7 96 C9 D0 DC   F7 6D 30 10 DD 77 CA 94  I........m0..w..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.597 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:03.679 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "04 35 C1 96 01 D3 10 89 60 08 A1 6E 85 89 70 E1 24 4E 4F F4 27 1F 06 A0 B3 82 8C D8 4C F5 7F 06",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 19:48:03.988 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 19:48:03.989 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 19:48:04.968; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 19:48:04.974; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 19:48:05.360; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 19:48:05.363; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 19:48:05.364; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ORyXlM/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:05.397 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 B5 65 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:38.000 UTC",
#     "not  after"         : "2023-12-24 19:47:38.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC EF D9 6F 4A CC 44 5F   A0 EF 16 D7 F1 2B 28 E7  ...oJ.D_.....+(.
#         0010: E2 3E A3 16                                        .>..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:05.402 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 CB 2C 65",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:29.000 UTC",
#     "not  after"         : "2023-12-24 19:47:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:05.417 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:05.517 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:05.517 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:05.518 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:48:05.518 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:05.669 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:05.671 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:05.671 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.677 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.690 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.690 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.691 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:05.693 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8B A1 59 18 2E 73 36 E1 EB 5E 2C ED 75 B3 17 3B 79 12 A1 C8 3E 37 9B 4D E6 3C 03 CF 2E 64 17 21",
#   "session id"          : "B9 95 BC D9 09 9D 66 AC 9A BE 35 11 F1 75 85 04 AC F6 F9 22 07 B9 98 85 36 BA BD D5 B4 5B 1F FA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DD EF 3C F4 D5 4E 0C 1D   58 94 40 12 20 05 3B EE  ..<..N..X.@. .;.
#             0010: 23 A1 D1 F0 C1 A4 1B 96   94 C1 DA AE 0B 48 AA 00  #............H..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.799 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B9 91 47 99 83 C4 C9 F5 E2 1A D9 C7 4C C5 B5 B0 A5 B6 27 58 2E F7 2F 87 81 5F EB EC BC 7D CB 74",
#   "session id"          : "B9 95 BC D9 09 9D 66 AC 9A BE 35 11 F1 75 85 04 AC F6 F9 22 07 B9 98 85 36 BA BD D5 B4 5B 1F FA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E1 70 4B A7 55 19 EF 3B   6F 1C 4A DA 22 76 64 9A  .pK.U..;o.J."vd.
#           0010: 7D 31 97 50 7E CD 5B 45   8A 02 69 FF DE 03 61 14  .1.P..[E..i...a.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.800 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.800 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.802 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.802 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.802 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.804 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.804 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.805 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.806 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.806 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.814 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.815 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.817 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.820 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.821 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.822 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.822 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.823 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.823 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.824 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.824 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.825 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.825 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.826 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.829 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 5C 12 B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:34.000 UTC",
#       "not  after"         : "2023-12-24 19:47:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 43 01 13 CD 88 20 37   33 11 B8 61 D9 23 09 F7  .C.... 73..a.#..
#           0010: 58 DD F2 FE                                        X...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.829 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.915 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 6B A3 C9",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 19:47:31.000 UTC",
#     "not  after"         : "2023-12-24 19:47:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#         0010: 18 D5 E3 D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#         0010: AB A1 B2 F6                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.919 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 4E A7 3D 2D AD DC 97   0E FC 67 C9 37 34 A0 0D  5N.=-.....g.74..
#     0010: BA FB 03 21 17 BC 14 3B   83 57 3A 58 FD E4 3F 4E  ...!...;.W:X..?N
#     0020: 0C 63 33 A7 A3 A7 F2 1F   CC CA 5C CB C5 BC 01 16  .c3.......\.....
#     0030: BD 33 35 C9 C5 9C D6 51   29 60 76 37 8B DB F3 5E  .35....Q)`v7...^
#     0040: C1 97 D6 02 B8 31 30 42   90 9B 7D C8 32 9C D1 86  .....10B....2...
#     0050: 58 AA 7E 2F 93 19 D1 7C   30 FA 6B F6 0A 34 47 53  X../....0.k..4GS
#     0060: DE 16 40 4D 32 4C 75 7A   CB 85 8B 31 8F 3A D2 FC  ..@M2Luz...1.:..
#     0070: EC 17 64 15 F4 99 AE C2   58 00 7D 09 A9 B2 80 B5  ..d.....X.......
#     0080: 50 48 B9 3E 40 B8 93 2D   E3 FD C3 9E FB 92 B0 E3  PH.>@..-........
#     0090: A8 A7 24 3C AB D4 D3 94   93 99 98 C5 08 87 1A C1  ..$<............
#     00A0: 26 95 3A CC FA 00 CF 60   9D 2D 22 3E 21 D6 CE D3  &.:....`.-">!...
#     00B0: 19 4B C6 CA 6B 1E 75 40   7B CD 2C DC 75 F5 86 3F  .K..k.u@..,.u..?
#     00C0: 40 A3 60 4D 3E B4 65 0E   29 2E EC 6F EE F8 F9 40  @.`M>.e.)..o...@
#     00D0: 42 33 D6 EB FD FE 39 69   40 A1 4B EE BE D7 84 72  B3....9i@.K....r
#     00E0: 0F 5F DE 73 AD 34 51 3A   07 BB 96 CE 16 F9 C1 5F  ._.s.4Q:......._
#     00F0: A3 41 BE 2F 22 EE 89 53   E2 8A B7 7D 08 AC B3 A1  .A./"..S........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.921 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 AA 45 A0 E1 34 3D 69   B0 A6 D9 BE 72 62 29 13  ..E..4=i....rb).
#     0010: 4B 50 C0 0C 35 2F 5C DC   3B 8D 35 83 01 11 0E D3  KP..5/\.;.5.....
#     0020: 2A 37 17 F2 3C 35 AE 36   93 86 D3 47 81 52 B0 05  *7..<5.6...G.R..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.924 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:05.925 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.925 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:05.926 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.926 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 19:48:05.926 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:48:05.926 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.927 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.930 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 B5 65 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:38.000 UTC",
#       "not  after"         : "2023-12-24 19:47:38.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC EF D9 6F 4A CC 44 5F   A0 EF 16 D7 F1 2B 28 E7  ...oJ.D_.....+(.
#           0010: E2 3E A3 16                                        .>..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 6B A3 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:31.000 UTC",
#       "not  after"         : "2023-12-24 19:47:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#           0010: 18 D5 E3 D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.955 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 D4 CD A0 BC 8C D2 AF   14 1B 41 F7 E6 D3 36 A1  r.........A...6.
#     0010: 98 82 98 DD DC 1D 96 08   AD D5 DE F3 9B 34 C3 12  .............4..
#     0020: 1F CC AB 13 1A 3C BB 83   22 E0 42 33 71 1A 66 28  .....<..".B3q.f(
#     0030: 44 60 D3 1C 50 62 68 0E   6D 63 0A 2C CE 80 3D 42  D`..Pbh.mc.,..=B
#     0040: C5 F6 5D FA CC E1 4A 55   03 7C D0 16 84 73 0D 30  ..]...JU.....s.0
#     0050: 2D 61 36 4A A2 FC 0C 86   B3 2C 42 99 DE D6 D3 ED  -a6J.....,B.....
#     0060: 28 32 B3 81 58 50 67 E1   3B 33 84 AF EA CA 57 93  (2..XPg.;3....W.
#     0070: 92 73 3A 40 F5 D9 2A 21   EA 71 F3 79 B1 18 4C AA  .s:@..*!.q.y..L.
#     0080: 23 08 8B E6 3D F1 49 E4   72 1E 93 EA 36 B2 DC 2B  #...=.I.r...6..+
#     0090: A9 55 27 A7 D7 8B D9 0C   55 BF 71 8D F1 ED B7 9E  .U'.....U.q.....
#     00A0: 1D 6D E2 D5 EA DC F5 C3   41 D5 D0 6B 6C 75 8B 1C  .m......A..klu..
#     00B0: 5B 94 7A 4B 38 6B E9 75   A0 C4 8F 1D 96 E3 08 01  [.zK8k.u........
#     00C0: 6F FA A5 D7 6B 69 A4 70   F6 AB 8C 6E 46 04 45 54  o...ki.p...nF.ET
#     00D0: 02 63 82 3B C9 9B A6 4C   51 0A FF 89 34 02 E1 28  .c.;...LQ...4..(
#     00E0: 2E 99 98 F9 FD 05 42 E0   F5 2C 6C 5E 5A 2B F4 20  ......B..,l^Z+.
#     00F0: 6A 26 12 F0 85 BA 19 FD   71 DF 98 24 BF D5 FF 25  j&......q..$...%
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.957 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 19 6C CF C7 FE 6B 00 48   AE CE 37 7F 27 EF 55 60  .l...k.H..7.'.U`
#     0010: 65 52 04 27 6B 2D 2E 20   0F 7E 8F 92 15 BA 48 4E  eR.'k-. ......HN
#     0020: F8 EA 5F B3 12 93 D8 D4   A5 15 48 9E F1 16 D7 25  .._.......H....%
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:05.957 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:06.006 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E4 15 AD 05 17 05 2B EB C9 31 A9 40 EA CD D3 2D D7 CD D8 76 85 67 DD 42 45 AA 03 EE F1 11 0C 5D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 19:48:06.289 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 19:48:06.290 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 19:48:17.498; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:17.852 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 6B A3 C9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:31.000 UTC",
#       "not  after"         : "2023-12-24 19:47:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#           0010: 18 D5 E3 D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DF A3 F2 CA C3 25 0A 31   6E 47 88 EE 6D 35 AF 66  .....%.1nG..m5.f
#           0010: AB A1 B2 F6                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 CB 2C 65",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 19:47:29.000 UTC",
#       "not  after"         : "2023-12-24 19:47:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 95 88 0C 6A 50 BD EB C4   BD 0A 4F C1 D7 BC F3 3C  ...jP.....O....<
#           0010: 18 D5 E3 D1                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 19:48:17.870 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:18.161 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.161 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:18.164 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 19:48:18.164 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.183 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.183 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.183 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 19:48:18.186 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 0F 9F 56 9E C4 AF 80 A9 53 D7 2E A3 08 5C A1 2F 4E 06 D6 22 AD 4A C2 A0 F5 D1 C9 B5 14 D0 D2",
#     "session id"          : "A1 57 52 04 3F 3E 78 2B 02 C7 91 95 6A D8 45 85 0E 7B 81 27 DB 8C FF A6 C9 2F 73 A7 E9 91 2F C8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 9E 79 42 F9 06 74 66 29   24 89 3F 4F BE 57 8F 18  .yB..tf)$.?O.W..
#               0010: BB DE D1 CC 49 F0 66 FF   76 8A CD 85 18 42 F3 3C  ....I.f.v....B.<
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:18.207 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C1 5D AF 89 DB 87 64 81 CC 1B 19 9C 3A 07 2A 9B 41 AA 49 32 3C 7F 33 C2 8F F1 C7 9A 7F 57 E6 76",
#     "session id"          : "A1 57 52 04 3F 3E 78 2B 02 C7 91 95 6A D8 45 85 0E 7B 81 27 DB 8C FF A6 C9 2F 73 A7 E9 91 2F C8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 6B E7 03 09 9C 45 C4   88 09 EF 6F F0 C5 5F 0F  .k....E....o.._.
#             0010: 76 3F 8D F2 C8 BC DC 0E   36 B9 62 5E E5 9F 31 52  v?......6.b^..1R
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:18.208 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 19:48:18.208 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thr

[...truncated too long message...]

onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 19:49:39.616 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:49:39.657 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:49:39.658 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:49:39.658 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 19:49:39.658 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34340/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28209ms
ok 65 stop command for single port in 31274ms
ok 66 status detects locally running solr in 14425ms
ok 67 status does not expose cli parameters to end user in 218ms
ok 68 listing out files in 2192ms
ok 69 copying files around in 6597ms
ok 70 upconfig in 2646ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1241ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
ok 73 Cleanup in 1229ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 24m 6s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 24m27.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5538 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5538/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34977/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 16:23:13.660; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 16:23:13.666; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 16:23:14.697; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 16:23:14.738; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22707ms
ok 61 start solr with client truststore and security manager in 24953ms
not ok 62 start solr with mTLS needed in 59767ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-QmIsZV/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34977.
#
# Started Solr server on port 34977 (pid=199929). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34978.
#
# Started Solr server on port 34978 (pid=200350). Happy searching!
#
# INFO  - 2023-09-25 16:24:37.561; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 16:24:37.567; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 16:24:37.977; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 16:24:37.980; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 16:24:37.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:38.016 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 72 E8 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:13.000 UTC",
#     "not  after"         : "2023-12-24 16:24:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA A6 65 9B 91 C1 33 43   62 5C 93 0E 1F 00 0B 28  ..e...3Cb\.....(
#         0010: 90 1E AC 9E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:38.021 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 09 E7 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:05.000 UTC",
#     "not  after"         : "2023-12-24 16:24:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:38.037 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:38.385 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:38.385 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:38.386 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:38.386 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:38.538 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.539 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:38.541 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:38.541 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.547 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.559 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.559 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:38.563 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 D4 77 92 C3 07 F5 28 E2 AC C2 80 02 B8 7C 46 B0 00 BE 2A AE 10 CA CE E2 1F 17 43 A0 35 ED A8",
#   "session id"          : "2D 1E 8A C1 D3 02 95 6D B1 D7 89 8D 42 29 8D 10 D2 09 8C AA 7D 9C 4D 1B 29 19 F6 54 34 A6 C9 DD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2B A8 A7 1A 4C FE B4 EF   76 2C 72 31 2C 06 37 69  +...L...v,r1,.7i
#             0010: AF 16 6A 79 40 AE 13 D4   9A 7F 72 5F 80 1C 85 01  ..jy@.....r_....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.673 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 B6 59 AC C0 27 27 1F 07 19 F9 24 A1 31 56 29 97 68 B6 51 2B C1 52 00 D8 DB 78 1A D1 98 81 81",
#   "session id"          : "2D 1E 8A C1 D3 02 95 6D B1 D7 89 8D 42 29 8D 10 D2 09 8C AA 7D 9C 4D 1B 29 19 F6 54 34 A6 C9 DD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 04 99 93 79 8B 2E A5 E1   39 B2 C2 81 2A D6 92 D7  ...y....9...*...
#           0010: 40 3F 49 83 1F 75 4E AE   EA CA AA 00 C0 BC 71 0C  @?I..uN.......q.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.674 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.674 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.675 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.679 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.679 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.679 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.679 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.679 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.680 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.681 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.681 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.681 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.689 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.690 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.692 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.695 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.696 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.696 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.696 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.696 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.697 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.697 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.699 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.699 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.699 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.700 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.701 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.702 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.702 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.706 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B EF 56 03",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:09.000 UTC",
#       "not  after"         : "2023-12-24 16:24:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 64 E6 4B 8E 53 F3 A9   24 1F 07 A8 35 23 DA CE  8d.K.S..$...5#..
#           0010: 85 07 C8 9F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.706 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.803 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.807 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4C 32 B8 56 34 25 87 81   56 60 89 33 17 F7 E6 47  L2.V4%..V`.3...G
#     0010: 8C CF 5D 06 38 46 B8 BA   8D 63 EB 32 E1 76 0B BF  ..].8F...c.2.v..
#     0020: E3 78 5D 37 A5 C2 47 92   EE 1B 9A A6 7C 5E E1 24  .x]7..G......^.$
#     0030: 13 DC 97 2C 23 5A 87 85   5E 29 35 D4 38 20 07 B2  ...,#Z..^)5.8 ..
#     0040: FD 7B B9 39 BB F2 66 6E   A8 EE EE 2B 16 6A 10 B7  ...9..fn...+.j..
#     0050: 05 B9 9C 94 CF 82 85 5D   27 55 27 7A 24 06 35 55  .......]'U'z$.5U
#     0060: B1 62 C0 E2 1B 5D 98 03   0B 87 5B 04 EC 8D 17 4F  .b...]....[....O
#     0070: 30 6E 6D 38 DD 59 4F D4   B1 B0 4C 26 AB 27 59 A9  0nm8.YO...L&.'Y.
#     0080: 17 4E 40 BD 40 6D 0F 83   3E 0F DB 0F 24 F7 1E 89  .N@.@m..>...$...
#     0090: 01 53 F9 A6 FB 8B 96 B0   94 D5 41 06 4F 56 3C E8  .S........A.OV<.
#     00A0: C0 9C FD 11 6D 2D D0 78   C2 03 32 60 4E 4D F9 EE  ....m-.x..2`NM..
#     00B0: 4E 38 5F C9 8F 83 E8 03   A4 42 9D EB E2 16 76 E0  N8_......B....v.
#     00C0: 95 85 85 7A A9 DD BB CE   41 6A 86 91 D7 CA 60 82  ...z....Aj....`.
#     00D0: 58 A5 E5 3F A3 0E B9 E5   2B F6 F3 8B 10 52 35 5C  X..?....+....R5\
#     00E0: 59 67 67 28 51 F8 BA 74   5A 64 4F 3A 40 6C 6C 59  Ygg(Q..tZdO:@llY
#     00F0: 4B 09 6C 24 28 B7 20 2D   84 8F 7C CD 0D 2F D9 52  K.l$(. -...../.R
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.810 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 45 A9 43 81 15 62 E4 3D   98 D1 CC EA 85 B0 37 A8  E.C..b.=......7.
#     0010: BD AA 19 80 C5 23 8C F1   79 F0 37 EA 5C BC 06 31  .....#..y.7.\..1
#     0020: 51 F5 A3 FC AE 7C BF 4D   F4 6A A7 1F FB E3 1C E8  Q......M.j......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.812 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:38.813 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.813 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:38.813 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.814 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:38.814 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:38.814 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.815 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.818 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 72 E8 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:13.000 UTC",
#       "not  after"         : "2023-12-24 16:24:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA A6 65 9B 91 C1 33 43   62 5C 93 0E 1F 00 0B 28  ..e...3Cb\.....(
#           0010: 90 1E AC 9E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 EE 29 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:07.000 UTC",
#       "not  after"         : "2023-12-24 16:24:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#           0010: 2A 5A AF 6F                                        *Z.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.844 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A7 97 9B 52 FA 99 14 26   92 C0 1B 09 2F C5 EF 83  ...R...&..../...
#     0010: 9A 9E 6F 11 CC 0C C7 65   B4 7D 0D CF 0D DE 31 A3  ..o....e......1.
#     0020: 4A A3 C3 79 61 83 9C 5E   0F B1 5D B5 D3 1F 35 35  J..ya..^..]...55
#     0030: 53 08 8A D3 B8 17 6F 44   C2 21 46 20 78 C3 8D CB  S.....oD.!F x...
#     0040: 20 1F B9 D0 F6 E8 08 45   1F 04 8B 74 EB 9F 02 95   ......E...t....
#     0050: E3 4E 69 B9 85 9E 34 90   64 F1 A2 B0 9F 7D D1 F0  .Ni...4.d.......
#     0060: 00 FB 07 2B 8B 61 0F E0   BF 13 EC C5 0B B6 D1 BE  ...+.a..........
#     0070: D7 14 06 6C D5 F0 DB 0A   80 E3 DB DD 4D 7B 13 70  ...l........M..p
#     0080: C4 C5 BC A2 AA 78 DB 85   C6 6F F2 94 73 7C 11 65  .....x...o..s..e
#     0090: 82 FD 21 8E 6B B8 94 EB   3B 8C 4B 15 16 2E 66 98  ..!.k...;.K...f.
#     00A0: 6A 95 FB 52 16 7B 35 BB   89 F9 0F 1D F7 DC B8 12  j..R..5.........
#     00B0: 91 2C A1 9A B4 17 5D 25   75 BE EF D9 4F CF 3A 17  .,....]%u...O.:.
#     00C0: D0 EB D7 90 B8 32 6A B6   91 5D 53 04 8B 9D E7 6B  .....2j..]S....k
#     00D0: BC 05 44 17 61 90 50 32   78 E9 6B 16 B5 B3 BE 81  ..D.a.P2x.k.....
#     00E0: 39 6E C6 DB 10 DA 15 28   F2 E1 C4 01 9A 00 A1 4F  9n.....(.......O
#     00F0: B0 66 95 35 58 59 DC ED   CB E7 8C 0D 22 29 56 87  .f.5XY......")V.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.846 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A 69 BB 4A 14 1D D7 78   65 B6 F1 4D 33 BF A3 8F  Zi.J...xe..M3...
#     0010: B6 CA D4 A8 3F 43 ED 0C   A8 21 C2 CA DF F0 E9 8F  ....?C...!......
#     0020: 08 86 6F 8C 01 87 46 CC   44 8F 7E C1 D6 A7 A2 77  ..o...F.D......w
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.847 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:38.902 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FD 10 65 8B 9F D1 FD B9 26 55 55 0D EF 96 BB ED 5B C1 88 6A 5B CA 92 7A 16 49 58 F1 A5 2B 9C CA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 16:24:39.194 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 16:24:39.197 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 16:24:40.181; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 16:24:40.186; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 16:24:40.588; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 16:24:40.592; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 16:24:40.592; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QmIsZV/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:40.626 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 72 E8 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:13.000 UTC",
#     "not  after"         : "2023-12-24 16:24:13.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AA A6 65 9B 91 C1 33 43   62 5C 93 0E 1F 00 0B 28  ..e...3Cb\.....(
#         0010: 90 1E AC 9E                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:40.631 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0C 09 E7 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:05.000 UTC",
#     "not  after"         : "2023-12-24 16:24:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:40.646 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:40.925 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.926 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:40.928 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:40.928 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.935 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.947 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.948 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.948 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:40.951 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED CB D9 B8 20 16 6B D5 BE BD 49 40 64 AA AB 02 FC BE 66 8B C3 61 1D F6 3D 58 84 3A 47 A8 3A AF",
#   "session id"          : "6D D8 6F 8C F0 E9 55 0B 28 48 43 CB D1 86 99 1D B1 75 29 38 22 C8 FD A3 55 D9 3E 55 4B 21 A7 EE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AD E4 25 22 9A CF F7 E8   B3 2E 17 F2 85 1F B1 F3  ..%"............
#             0010: 65 CD 2C 58 14 C8 1D 77   08 62 55 63 77 2F F4 34  e.,X...w.bUcw/.4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.062 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "63 09 7D 32 40 4C 29 E9 0A F6 AB 2D 6C 9A A8 19 8D CD 16 B1 2C 4F 22 DC 22 F1 47 4C E9 D9 0D 83",
#   "session id"          : "6D D8 6F 8C F0 E9 55 0B 28 48 43 CB D1 86 99 1D B1 75 29 38 22 C8 FD A3 55 D9 3E 55 4B 21 A7 EE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 38 AB D1 E4 6F FA EB 35   4E 8F 74 91 DD 1A AD 2F  8...o..5N.t..../
#           0010: AD D6 B7 05 23 AF B8 3D   4A 95 62 D9 AF A4 27 1A  ....#..=J.b...'.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.063 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.063 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.068 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.068 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.069 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.070 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.080 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.081 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.085 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.085 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.085 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.086 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.088 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.088 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.089 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.089 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.090 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.091 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.091 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.095 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B EF 56 03",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:09.000 UTC",
#       "not  after"         : "2023-12-24 16:24:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 64 E6 4B 8E 53 F3 A9   24 1F 07 A8 35 23 DA CE  8d.K.S..$...5#..
#           0010: 85 07 C8 9F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.095 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:41.157 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:41.158 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:41.158 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:41.158 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.185 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 EE 29 C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 16:24:07.000 UTC",
#     "not  after"         : "2023-12-24 16:24:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#         0010: 2A 5A AF 6F                                        *Z.o
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#         0010: 13 14 C2 69                                        ...i
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.189 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 91 A7 34 56 54 DF CD   68 10 77 9F 23 8B E8 3A  c..4VT..h.w.#..:
#     0010: 79 C3 14 A0 B4 93 3E F6   0B 37 AD 9C 93 9D D9 D6  y.....>..7......
#     0020: 8A 68 95 94 2C 6D 5A EF   ED 0D CB DB 58 8E D0 78  .h..,mZ.....X..x
#     0030: DD C2 79 BD 8D 77 A5 EE   41 3D BE 4C 40 0E 9D 7C  ..y..w..A=.L@...
#     0040: 00 77 54 E9 9F 1F 67 F9   CF 3D 6A 85 96 71 B4 CA  .wT...g..=j..q..
#     0050: 2E EF A6 C6 87 3F 5B 28   85 7C 3A 32 6A 0C C5 05  .....?[(..:2j...
#     0060: 8F E9 0D 99 F8 6D 2D 1E   3A E6 B8 56 8D 21 C6 BB  .....m-.:..V.!..
#     0070: 23 47 C4 32 BB 1E 0C D5   40 0F 92 E5 96 C4 44 61  #G.2....@.....Da
#     0080: 63 D8 FF 76 36 AA 51 1D   7B C5 68 DF 6B D5 CF F6  c..v6.Q...h.k...
#     0090: A2 E3 60 CF A8 72 EE FD   BE 03 67 19 D6 90 FA BE  ..`..r....g.....
#     00A0: 14 C0 CD 77 AC 54 A9 12   51 0C C8 88 00 3C A1 AF  ...w.T..Q....<..
#     00B0: 2C A5 22 53 47 B1 EB 2E   94 D0 05 2B 4F 3B A6 D4  ,."SG......+O;..
#     00C0: 41 A1 40 82 4F 69 06 46   DF 3E AC 79 05 11 F8 16  A.@.Oi.F.>.y....
#     00D0: E7 71 78 52 E3 00 AB 6D   47 17 3A D5 29 E2 39 43  .qxR...mG.:.).9C
#     00E0: 95 ED FF 37 18 E3 A4 7C   48 C3 3E 3D 58 77 84 6F  ...7....H.>=Xw.o
#     00F0: 02 BA 63 D4 B0 E4 1D 9A   B4 D1 E2 FC 7E 57 5B CE  ..c..........W[.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.191 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F4 18 39 5E 72 36 E9 38   3A 26 86 AF 42 B1 A1 F1  ..9^r6.8:&..B...
#     0010: F9 71 F4 6E A2 4E DA E5   AB 40 A9 34 F0 AB D3 92  .q.n.N...@.4....
#     0020: 74 D1 BF 01 5E C2 B6 19   AE 85 EA 6B 60 E4 ED D6  t...^......k`...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.193 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:41.194 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.195 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:41.195 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.195 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 16:24:41.195 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:41.195 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.196 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.199 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 72 E8 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:13.000 UTC",
#       "not  after"         : "2023-12-24 16:24:13.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AA A6 65 9B 91 C1 33 43   62 5C 93 0E 1F 00 0B 28  ..e...3Cb\.....(
#           0010: 90 1E AC 9E                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 EE 29 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:07.000 UTC",
#       "not  after"         : "2023-12-24 16:24:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#           0010: 2A 5A AF 6F                                        *Z.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.224 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A CA 4D 78 86 6C 1F 3D   EF 3B E0 87 DB 61 5F 8D  ..Mx.l.=.;...a_.
#     0010: 65 9D D4 80 0A EF 1F 3D   56 C9 24 60 BD F6 1D E8  e......=V.$`....
#     0020: BC 3C 16 99 41 45 34 69   EF 97 23 01 11 DD 1A B0  .<..AE4i..#.....
#     0030: 2F 03 1B 4C 77 DF 26 37   F2 86 98 EB 71 41 97 89  /..Lw.&7....qA..
#     0040: 9F FC 56 C1 C2 77 D1 14   82 35 B0 42 3E 86 C4 E4  ..V..w...5.B>...
#     0050: 89 6D E8 D2 76 E7 78 29   A3 58 F2 49 42 50 7D E0  .m..v.x).X.IBP..
#     0060: D3 44 17 6A E3 E2 1C 4B   4E 40 CB 1A 4B A6 5E CC  .D.j...KN@..K.^.
#     0070: C2 CE 95 89 99 3B 09 91   73 60 68 3A 35 13 D9 0C  .....;..s`h:5...
#     0080: B2 2B 6E F5 5E 98 C4 3A   AD 43 FF BC 7F 32 C1 9C  .+n.^..:.C...2..
#     0090: 7B C8 F2 E3 4F 97 B7 5A   B1 24 37 E7 BC 0D 20 CE  ....O..Z.$7... .
#     00A0: 95 DD E0 B5 C4 B6 B2 11   9A DB 67 83 E9 8E CC 0D  ..........g.....
#     00B0: FF 91 42 96 1F 5C A4 8A   5F AD 48 05 E9 D5 A7 37  ..B..\.._.H....7
#     00C0: F5 51 D4 05 D1 66 50 70   B3 C5 16 99 47 7E FF BD  .Q...fPp....G...
#     00D0: B6 17 F7 98 3B A8 5F FE   2C 85 E3 5A 5F 25 C1 9E  ....;._.,..Z_%..
#     00E0: A0 E2 43 18 7A A9 8D 6F   3A 69 11 3B B3 B0 F7 7A  ..C.z..o:i.;...z
#     00F0: 61 2A EC 02 2C 55 8F 73   3E 92 28 48 9F C6 97 83  a*..,U.s>.(H....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.226 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 FE D6 C2 77 C4 3C 49   5E 2D 33 9E FD 38 02 D0  ....w.<I^-3..8..
#     0010: 86 D1 6F 7B ED 68 46 80   75 C5 85 DC 29 8E D0 0C  ..o..hF.u...)...
#     0020: 90 80 9A 52 F4 75 50 97   B9 B6 BF 87 6A 1A DD 31  ...R.uP.....j..1
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.227 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:41.285 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "13 D2 ED A8 FA 69 97 22 75 A4 2B 62 F8 12 C1 ED 83 42 2D FC F6 31 46 66 BC 83 C1 24 6D 76 AB 12",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 16:24:41.563 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 16:24:41.565 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 16:24:52.839; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:53.172 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0C 09 E7 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:05.000 UTC",
#       "not  after"         : "2023-12-24 16:24:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#           0010: 2A 5A AF 6F                                        *Z.o
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 EE 29 C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 16:24:07.000 UTC",
#       "not  after"         : "2023-12-24 16:24:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 7E 75 91 5A C3 5D 21   FE C8 22 5F 56 BC 0C 29  ..u.Z.]!.."_V..)
#           0010: 2A 5A AF 6F                                        *Z.o
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 82 C7 BA 7C B4 29 1C   0B 73 FD C9 67 DD 02 15  ......)..s..g...
#           0010: 13 14 C2 69                                        ...i
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 16:24:53.189 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:53.561 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:53.562 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:53.562 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:24:53.562 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:53.659 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.659 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:53.661 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 16:24:53.661 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.666 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.678 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.678 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.678 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 16:24:53.681 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "12 DE 0A 9E D4 CF F3 61 90 51 C6 B9 F0 D6 92 70 A9 27 F9 1A B0 7B 39 16 B3 64 71 5A B6 15 47 D5",
#     "session id"          : "C5 4A B9 A8 15 B4 D1 E7 E5 38 7D 56 1F 20 8E EF E6 D9 71 4E 50 19 DE E1 9B FF CE 83 FF CB 8C 22",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 62 45 7E 9C 75 85 E3 23   85 54 4A E2 CC FA 21 C7  bE..u..#.TJ...!.
#               0010: 34 24 54 AF 34 AE 2D A9   9F 91 D4 A6 4B 32 4F 3A  4$T.4.-.....K2O:
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.700 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F5 04 A9 B5 8D C3 1C 8A 87 1F D8 04 C2 11 13 BA 39 02 41 5B 5E AB 8C 77 57 A8 55 17 A4 47 99 7D",
#     "session id"          : "C5 4A B9 A8 15 B4 D1 E7 E5 38 7D 56 1F 20 8E EF E6 D9 71 4E 50 19 DE E1 9B FF CE 83 FF CB 8C 22",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 5F 9A 05 45 93 31 7C   05 BF 4E E3 AC 66 03 F2  ._..E.1...N..f..
#             0010: 54 52 A6 BE D5 A4 9C 33   B1 75 0E 01 EB A7 B0 4F  TR.....3.u.....O
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.701 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.701 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.702 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.702 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.702 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.702 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.703 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.703 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.703 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.703 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.706 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.706 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.706 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.706 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:53.707 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.708 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.708 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.716 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.718 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.720 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.724 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.725 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:53.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:24:53.725 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 16:24:53.726 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 16:26:15.804 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:26:15.848 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:26:15.849 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:26:15.850 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 16:26:15.850 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34978/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28081ms
ok 65 stop command for single port in 30731ms
ok 66 status detects locally running solr in 14680ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2201ms
ok 69 copying files around in 6703ms
ok 70 upconfig in 2666ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 56s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m21s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5537 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5537/

1 tests failed.
FAILED:  org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection

Error Message:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>

Stack Trace:
java.lang.AssertionError: expected:<COMPLETED> but was:<RUNNING>
	at __randomizedtesting.SeedInfo.seed([F4CEC0D7CF569D1C:C13A2B8C248AAB42]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.cloud.api.collections.AbstractIncrementalBackupTest.testRestoreToOriginalCollection(AbstractIncrementalBackupTest.java:209)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 5669 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection (:solr:modules:hdfs)
    Test output: /tmp/src/solr/solr/modules/hdfs/build/test-results/test/outputs/OUTPUT-org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.txt
    Reproduce with: gradlew :solr:modules:hdfs:test --tests "org.apache.solr.hdfs.cloud.api.collections.HdfsCloudIncrementalBackupTest.testRestoreToOriginalCollection" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=F4CEC0D7CF569D1C -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:hdfs:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/hdfs/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 7m 17s
651 actionable tasks: 634 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 7m48.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5536 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5536/

4 tests failed.
FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server

Error Message:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>

Stack Trace:
org.junit.ComparisonFailure: Should have received 401 code expected:<[401]> but was:<[200]>
	at __randomizedtesting.SeedInfo.seed([59B20FF065D3A88E:DEB2EEA0006F5462]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:136)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod

Error Message:
java.lang.AssertionError: ObjectTracker found 23 object(s) that were not released!!! [Http2SolrClient, ZkStateReader, InternalHttpClient, SolrZkClient, Thread, ZkTestServer, Overseer, ZkStateReader, Http2SolrClient, SolrZkClient, ZKServerMain, InternalHttpClient, ZkStateReader, InternalHttpClient, SolrZkClient, InternalHttpClient, InternalHttpClient, Http2SolrClient, ZkController, ZkController, Http2SolrClient, SolrZkClient, SolrZkClient]
org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:202)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1099)
	at org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:288)
	at org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:55)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:800)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:434)
	at org.apache.solr.client.solrj.impl.ZkClientClusterStateProvider.getZkStateReader(ZkClientClusterStateProvider.java:215)
	at org.apache.solr.common.cloud.ZkStateReader.from(ZkStateReader.java:227)
	at org.apache.solr.cloud.MiniSolrCloudCluster.getZkStateReader(MiniSolrCloudCluster.java:484)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForNode(MiniSolrCloudCluster.java:444)
	at org.apache.solr.cloud.MiniSolrCloudCluster.waitForAllNodes(MiniSolrCloudCluster.java:424)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:396)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:376)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:385)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:311)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:296)
	at org.apache.solr.client.solrj.impl.CloudLegacySolrClient.<init>(CloudLegacySolrClient.java:79)
	at org.apache.solr.client.solrj.impl.CloudLegacySolrClient$Builder.build(CloudLegacySolrClient.java:402)
	at org.apache.solr.cloud.MiniSolrCloudCluster.buildSolrClient(MiniSolrCloudCluster.java:815)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:393)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:386)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:829)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.ZkTestServer$1:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer$1
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer.run(ZkTestServer.java:589)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:344)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.ZkTestServer:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer.<init>(ZkTestServer.java:440)
	at org.apache.solr.cloud.ZkTestServer.<init>(ZkTestServer.java:423)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:342)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)

org.apache.solr.cloud.Overseer:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.Overseer
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.Overseer.start(Overseer.java:807)
	at org.apache.solr.cloud.OverseerElectionContext.runLeaderProcess(OverseerElectionContext.java:76)
	at org.apache.solr.cloud.LeaderElector.runIamLeaderProcess(LeaderElector.java:171)
	at org.apache.solr.cloud.LeaderElector.checkIfIamLeader(LeaderElector.java:131)
	at org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:311)
	at org.apache.solr.cloud.LeaderElector.joinElection(LeaderElector.java:214)
	at org.apache.solr.cloud.ZkController.init(ZkController.java:1007)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:402)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:829)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:405)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:395)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:829)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.client.solrj.impl.Http2SolrClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.client.solrj.impl.Http2SolrClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:202)
	at org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:1099)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:152)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:806)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.SolrZkClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.SolrZkClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:211)
	at org.apache.solr.common.cloud.SolrZkClient.<init>(SolrZkClient.java:111)
	at org.apache.solr.common.cloud.SolrZkClient$Builder.build(SolrZkClient.java:1203)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:386)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:829)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.cloud.ZkTestServer$ZKServerMain:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.cloud.ZkTestServer$ZKServerMain
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.cloud.ZkTestServer$ZKServerMain.runFromConfig(ZkTestServer.java:310)
	at org.apache.solr.cloud.ZkTestServer$1.run(ZkTestServer.java:581)

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:376)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:137)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:806)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.solr.common.cloud.ZkStateReader:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.solr.common.cloud.ZkStateReader
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.common.cloud.ZkStateReader.<init>(ZkStateReader.java:405)
	at org.apache.solr.cloud.ZkController.<init>(ZkController.java:395)
	at org.apache.solr.core.ZkContainer.initZooKeeper(ZkContainer.java:148)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:829)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	... 1 more

org.apache.http.impl.client.InternalHttpClient:org.apache.solr.common.util.ObjectReleaseTracker$ObjectTrackerException: org.apache.http.impl.client.InternalHttpClient
	at org.apache.solr.common.util.ObjectReleaseTracker.track(ObjectReleaseTracker.java:52)
	at org.apache.solr.client.solrj.impl.HttpClientUtil.createClient(HttpClientUtil.java:376)
	at org.apache.solr.update.UpdateShardHandler.<init>(UpdateShardHandler.java:137)
	at org.apache.solr.core.CoreContainer.loadInternal(CoreContainer.java:806)
	at org.apache.solr.core.CoreContainer.load(CoreContainer.java:763)
	at org.apache.solr.servlet.CoreContainerProvider.createCoreContainer(CoreContainerProvider.java:427)
	at org.apache.solr.servlet.CoreContainerProvider.init(CoreContainerProvider.java:246)
	at org.apache.solr.embedded.JettySolrRunner$1.lifeCycleStarted(JettySolrRunner.java:407)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.setStarted(AbstractLifeCycle.java:253)
	at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:94)
	at org.apache.solr.embedded.JettySolrRunner.retryOnPortBindFailure(JettySolrRunner.java:616)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:554)
	at org.apache.solr.embedded.JettySolrRunner.start(JettySolrRunner.java:525)
	at org.apache.solr.cloud.MiniSolrCloudCluster.startJettySolrRunner(MiniSolrCloudCluster.java:570)
	at org.apache.solr.cloud.MiniSolrCloudCluster.lambda$new$0(MiniSolrCloudCluster.java:376)
	at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)
Caused by: java.lang.Exception: Submitter stack trace
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.execute(ExecutorUtil.java:256)
	at java.base/java.util.concurrent.AbstractExecutorService.invokeAll(AbstractExecutorService.java:242)
	at org.apache.solr.cloud.MiniSolrCloudCluster.<init>(MiniSolrCloudCluster.java:381)
	at org.apache.solr.cloud.MiniSolrCloudCluster$Builder.build(MiniSolrCloudCluster.java:1314)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.configureClusterMockOauth(JWTAuthPluginIntegrationTest.java:304)
	at org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server(JWTAuthPluginIntegrationTest.java:131)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache

[...truncated too long message...]

at app//org.apache.zookeeper.ClientCnxn$SendThread.run(ClientCnxn.java:1274)
  46) Thread[id=508, name=httpShardExecutor-273-thread-1, state=RUNNABLE, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/sun.nio.ch.EPoll.wait(Native Method)
        at java.base@11.0.16/sun.nio.ch.EPollSelectorImpl.doSelect(EPollSelectorImpl.java:120)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.lockAndDoSelect(SelectorImpl.java:124)
        at java.base@11.0.16/sun.nio.ch.SelectorImpl.select(SelectorImpl.java:141)
        at app//org.eclipse.jetty.io.ManagedSelector.nioSelect(ManagedSelector.java:180)
        at app//org.eclipse.jetty.io.ManagedSelector.select(ManagedSelector.java:187)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.select(ManagedSelector.java:604)
        at app//org.eclipse.jetty.io.ManagedSelector$SelectorProducer.produce(ManagedSelector.java:541)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
        at app//org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
        at app//org.eclipse.jetty.io.ManagedSelector$$Lambda$321/0x0000000840491440.run(Unknown Source)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
        at app//org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor$$Lambda$265/0x0000000840427440.run(Unknown Source)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  47) Thread[id=487, name=qtp1568317359-487, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  48) Thread[id=483, name=qtp161604915-483, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  49) Thread[id=495, name=qtp161604915-495, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  50) Thread[id=497, name=qtp161604915-497, state=TIMED_WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.parkNanos(LockSupport.java:234)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2123)
        at app//org.eclipse.jetty.util.BlockingArrayQueue.poll(BlockingArrayQueue.java:219)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.idleJobPoll(QueuedThreadPool.java:1124)
        at app//org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1141)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
  51) Thread[id=470, name=NIOWorkerThread-2, state=WAITING, group=TGRP-JWTAuthPluginIntegrationTest]
        at java.base@11.0.16/jdk.internal.misc.Unsafe.park(Native Method)
        at java.base@11.0.16/java.util.concurrent.locks.LockSupport.park(LockSupport.java:194)
        at java.base@11.0.16/java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.await(AbstractQueuedSynchronizer.java:2081)
        at java.base@11.0.16/java.util.concurrent.LinkedBlockingQueue.take(LinkedBlockingQueue.java:433)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.getTask(ThreadPoolExecutor.java:1054)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1114)
        at java.base@11.0.16/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
        at java.base@11.0.16/java.lang.Thread.run(Thread.java:829)
	at __randomizedtesting.SeedInfo.seed([59B20FF065D3A88E]:0)




Build Log:
[...truncated 11312 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.mockOAuth2Server" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=59B20FF065D3A88E -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=59B20FF065D3A88E -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=59B20FF065D3A88E -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod (:solr:modules:jwt-auth)
    Test output: /tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.txt
    Reproduce with: gradlew :solr:modules:jwt-auth:test --tests "org.apache.solr.security.jwt.JWTAuthPluginIntegrationTest.classMethod" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=59B20FF065D3A88E -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* What went wrong:
Execution failed for task ':solr:modules:jwt-auth:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/modules/jwt-auth/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 4m 53s
634 actionable tasks: 617 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 5m30s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5535 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5535/

1 tests failed.
FAILED:  org.apache.solr.cloud.api.collections.TestCollectionAPI.test

Error Message:
org.junit.ComparisonFailure: collection health expected:<[GREEN]> but was:<[YELLOW]>

Stack Trace:
org.junit.ComparisonFailure: collection health expected:<[GREEN]> but was:<[YELLOW]>
	at __randomizedtesting.SeedInfo.seed([EFE05A4F76476C02:67B46595D8BB01FA]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.apache.solr.cloud.api.collections.TestCollectionAPI.clusterStatusWithCollectionHealthState(TestCollectionAPI.java:428)
	at org.apache.solr.cloud.api.collections.TestCollectionAPI.test(TestCollectionAPI.java:98)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at org.apache.solr.BaseDistributedSearchTestCase$ShardsRepeatRule$ShardsFixedStatement.callStatement(BaseDistributedSearchTestCase.java:1163)
	at org.apache.solr.BaseDistributedSearchTestCase$ShardsRepeatRule$ShardsStatement.evaluate(BaseDistributedSearchTestCase.java:1134)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4923 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33907/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 09:24:55.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 09:24:55.065; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 09:24:56.329; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 09:24:56.372; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22687ms
ok 61 start solr with client truststore and security manager in 25731ms
not ok 62 start solr with mTLS needed in 59849ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-WDu9Ws/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33907.
#
# Started Solr server on port 33907 (pid=204240). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 33908.
#
# Started Solr server on port 33908 (pid=204667). Happy searching!
#
# INFO  - 2023-09-25 09:26:20.102; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 09:26:20.108; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 09:26:20.486; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 09:26:20.490; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 09:26:20.491; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:20.527 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 4E F8 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:56.000 UTC",
#     "not  after"         : "2023-12-24 09:25:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 53 F0 7F 59 71 B4 D2   6F 9C B1 12 91 BD 16 24  .S..Yq..o......$
#         0010: 08 92 5F BD                                        .._.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:20.531 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 45 B6 F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:47.000 UTC",
#     "not  after"         : "2023-12-24 09:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:20.548 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:20.799 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:20.802 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:20.802 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.821 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.822 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:20.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1C 1A 97 EA 0A 19 4E CC B3 1B 92 4C 4B 3F F5 FF 8B E8 4F 2A 00 23 AE F1 73 6A 1E CB 0D 73 E7 29",
#   "session id"          : "C3 37 79 69 02 AB 38 A2 EA 02 59 0C 8D EB FB 40 47 98 4E EC E1 8E E8 0F BE 23 D3 DA 2B 14 59 00",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 A2 93 AE 60 30 75 54   4B 52 AC AD C5 E9 0E 1E  ....`0uTKR......
#             0010: EE 70 FE EB 5B 74 3B 5B   90 39 45 77 A3 EB 43 7E  .p..[t;[.9Ew..C.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.938 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "66 46 04 65 E0 16 B9 C4 7D 12 FA 77 EC F9 CA 10 B3 75 37 74 03 66 10 3C 5A 34 9E 57 96 7A 1C 28",
#   "session id"          : "C3 37 79 69 02 AB 38 A2 EA 02 59 0C 8D EB FB 40 47 98 4E EC E1 8E E8 0F BE 23 D3 DA 2B 14 59 00",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 75 5F 84 7C 88 79 FB D3   B1 F4 37 49 A4 78 2A 2D  u_...y....7I.x*-
#           0010: 47 3B B9 F4 B4 B8 97 2F   D7 D5 E7 C0 FA B4 E8 53  G;...../.......S
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.938 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.938 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.939 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.941 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.943 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.943 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.943 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:20.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:20.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.953 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.954 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.955 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.959 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:20.960 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.962 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.963 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.963 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.963 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.964 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.966 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:20.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.970 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 DA 6D D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:52.000 UTC",
#       "not  after"         : "2023-12-24 09:25:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 D3 64 B9 20 FE 2F DA   F5 48 C9 B1 1C AD 0C 6A   .d. ./..H.....j
#           0010: 58 C8 8C 28                                        X..(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:20.970 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:21.044 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:21.045 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:21.045 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:21.045 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.074 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.078 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 14 8E EE 2A 6E 01 72   0D 12 73 E5 A6 82 1F FC  W...*n.r..s.....
#     0010: 1A DE B2 64 3C 6E 33 D1   DF 9C 80 8F 0C 46 7A 73  ...d<n3......Fzs
#     0020: 64 0F 89 EC A7 03 39 E0   C5 AC D9 55 31 01 07 17  d.....9....U1...
#     0030: 40 46 80 C7 1B FB 84 90   2D 56 CA C8 FF 7E E6 F7  @F......-V......
#     0040: 0B 29 7B 39 49 73 59 B7   4D F6 0B 27 3A E0 DF 91  .).9IsY.M..':...
#     0050: F8 01 73 5B 2F A1 EE 5E   37 A0 30 90 A4 24 EE AC  ..s[/..^7.0..$..
#     0060: 4C 21 4C 85 6C AA 03 58   94 1F 01 6D 8E DB BB 24  L!L.l..X...m...$
#     0070: 0D E7 27 32 2A 47 BC B1   10 82 6F C3 84 59 04 CA  ..'2*G....o..Y..
#     0080: 2B 34 8E 74 95 FA 8B 73   9A D6 76 86 61 64 B9 75  +4.t...s..v.ad.u
#     0090: 34 86 B5 E5 79 57 42 D6   67 7C 4A 2A 44 62 44 DA  4...yWB.g.J*DbD.
#     00A0: 44 F2 F6 DA A9 5F 96 B9   D6 A6 A3 1B 9A 20 79 D5  D...._....... y.
#     00B0: C8 B3 7D DF 78 A7 B3 89   E6 DC 69 BA B4 E6 B2 B3  ....x.....i.....
#     00C0: 36 84 27 BD 1D 55 79 0A   2C E8 E9 47 40 40 0B A7  6.'..Uy.,..G@@..
#     00D0: F5 D4 4E 8A FD 33 E2 0C   B9 C9 F2 AA 78 55 02 3B  ..N..3......xU.;
#     00E0: 7A 53 72 08 34 0A 9A 7A   22 4E BA 30 44 7E FC 7D  zSr.4..z"N.0D...
#     00F0: 93 4B 70 B4 83 AB B0 8B   83 AA 93 B3 BA AA 93 1D  .Kp.............
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.081 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DD 51 80 0F CB F1 3F 23   F0 38 F4 C0 D1 6E F4 B4  .Q....?#.8...n..
#     0010: DF 5E AF EE 3F 9A 56 0C   65 04 3D CB CA 35 B3 C8  .^..?.V.e.=..5..
#     0020: 8D D2 20 36 81 17 34 84   78 D1 51 A1 21 00 77 9C  .. 6..4.x.Q.!.w.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.083 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:21.085 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:21.085 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:21.085 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:21.085 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:21.086 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:21.086 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.087 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.091 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 4E F8 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:56.000 UTC",
#       "not  after"         : "2023-12-24 09:25:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 53 F0 7F 59 71 B4 D2   6F 9C B1 12 91 BD 16 24  .S..Yq..o......$
#           0010: 08 92 5F BD                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B5 D9 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:50.000 UTC",
#       "not  after"         : "2023-12-24 09:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#           0010: 67 15 D0 94                                        g...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.117 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 29 A3 B7 1B CD 86 33 05   3B C0 C8 B4 0E A7 9E 70  ).....3.;......p
#     0010: 1C 0A AA CC 18 6A 3E 66   3A BF F7 D6 80 F4 1E E6  .....j>f:.......
#     0020: EB AE 07 57 D4 D2 5B 20   71 C7 5B 03 28 37 68 A0  ...W..[ q.[.(7h.
#     0030: AD 0D 4C 91 3F 31 BB AA   70 8F A3 11 2A 15 AD 74  ..L.?1..p...*..t
#     0040: 6B 17 05 FF 84 50 14 04   96 17 0D F2 38 84 3C EF  k....P......8.<.
#     0050: 95 99 86 E9 B0 87 DD A0   14 13 8A 71 A4 26 9D 81  ...........q.&..
#     0060: 75 FC 92 B9 6E 53 CD C5   C7 36 CC 7E C0 B0 26 39  u...nS...6....&9
#     0070: FA 6F A8 97 E4 70 72 07   35 0F 84 52 6F 60 21 96  .o...pr.5..Ro`!.
#     0080: C6 18 1A 77 43 B8 79 56   53 86 FB 26 55 92 5E 60  ...wC.yVS..&U.^`
#     0090: D2 51 E8 ED 0A 0C AB CD   F0 56 32 47 6E 13 D8 97  .Q.......V2Gn...
#     00A0: CD 1A 2F 99 06 95 1F 77   E2 0B 43 68 E4 DA 4D F0  ../....w..Ch..M.
#     00B0: CD DD 46 1B D0 A7 61 AE   F7 30 EA 8C 1F 47 D8 25  ..F...a..0...G.%
#     00C0: 90 70 B4 3D 8B 27 59 11   22 19 A3 F3 0F 4C 79 FB  .p.=.'Y."....Ly.
#     00D0: 6A F7 99 02 2D 52 F5 04   0A E3 22 F2 C7 4A 89 6F  j...-R...."..J.o
#     00E0: 19 96 4C CE C0 4A 7A A0   9D DE 05 84 3F 3C 23 E1  ..L..Jz.....?<#.
#     00F0: F9 CC 66 CE DC 80 70 3B   8E 58 4F 82 70 69 D3 78  ..f...p;.XO.pi.x
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.118 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5A 32 79 DA 80 CD C3 44   D3 99 7A AF 10 DC 74 66  Z2y....D..z...tf
#     0010: 1B 82 9A FC 66 1A 10 EF   5D 11 FA 76 C9 CB 58 8A  ....f...]..v..X.
#     0020: 0F 92 83 A4 F5 45 51 C6   09 9E 1D 96 D6 C6 FE 9F  .....EQ.........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.119 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:21.178 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D1 6D 4D 8A 57 25 2C B8 46 C4 E0 58 F1 BE 02 A5 2A F5 FA 61 A9 8A D6 9E 15 67 59 9C 9E ED 30 BA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 09:26:21.472 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 09:26:21.474 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 09:26:22.452; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 09:26:22.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 09:26:22.808; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 09:26:22.811; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 09:26:22.811; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-WDu9Ws/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:22.843 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4E 4E F8 57",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:56.000 UTC",
#     "not  after"         : "2023-12-24 09:25:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 91 53 F0 7F 59 71 B4 D2   6F 9C B1 12 91 BD 16 24  .S..Yq..o......$
#         0010: 08 92 5F BD                                        .._.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:22.848 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "21 45 B6 F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:47.000 UTC",
#     "not  after"         : "2023-12-24 09:25:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:22.862 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:22.952 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:22.952 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:22.953 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:26:22.953 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:23.096 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:23.098 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:23.098 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.104 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.116 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.116 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.116 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:23.118 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "20 A7 96 1D 3B AD 2A B2 F9 12 0D A5 42 54 50 D5 EA C5 E9 D4 25 77 07 50 B9 00 DA C9 43 18 2A 3E",
#   "session id"          : "18 99 C3 8D 84 D8 B4 1D 28 11 07 54 F3 3E 0C D3 A0 A0 D9 7E 74 30 E5 7F BF 97 29 75 DA 1A DA CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F0 AB 60 0F 24 98 83 17   28 51 62 BF 39 07 2F C2  ..`.$...(Qb.9./.
#             0010: 86 C4 6A 4E DF 7C 8B CE   77 CD C7 8B 5C 74 36 44  ..jN....w...\t6D
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.240 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5A B2 F0 6E A9 0B 67 6E E0 CB 67 D6 6F C7 F4 2C F8 20 8B 49 A7 84 35 F4 BB 8C CD 6D 3F 48 7F 68",
#   "session id"          : "18 99 C3 8D 84 D8 B4 1D 28 11 07 54 F3 3E 0C D3 A0 A0 D9 7E 74 30 E5 7F BF 97 29 75 DA 1A DA CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6E 4A 95 D9 AE E4 C6 42   72 DB F8 B5 7B A0 33 B1  nJ.....Br.....3.
#           0010: C5 C9 8E 70 F4 A4 5D 28   85 27 D0 0C 0C 19 FF 75  ...p..](.'.....u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.241 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.241 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.243 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.243 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.243 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.243 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.243 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.245 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.246 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.247 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.247 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.255 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.257 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.258 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.262 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.262 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.262 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.262 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.262 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.263 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.263 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.263 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.263 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.265 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.265 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.265 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.266 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.267 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.268 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.268 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.271 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 DA 6D D4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:52.000 UTC",
#       "not  after"         : "2023-12-24 09:25:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 D3 64 B9 20 FE 2F DA   F5 48 C9 B1 1C AD 0C 6A   .d. ./..H.....j
#           0010: 58 C8 8C 28                                        X..(
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.272 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.360 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B B5 D9 A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 09:25:50.000 UTC",
#     "not  after"         : "2023-12-24 09:25:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#         0010: 67 15 D0 94                                        g...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#         0010: CB 87 8F C9                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.364 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 FA AA B3 BB 5E B9 80   E6 4F DB F8 76 DF EB 9A  .....^...O..v...
#     0010: 5C D0 74 FD 0C F8 0D 07   02 1F 6C 19 46 01 6A 5E  \.t.......l.F.j^
#     0020: 81 43 38 D6 2F CB BD 0C   62 9F 7A 64 FA A4 F5 53  .C8./...b.zd...S
#     0030: B4 F8 9F 78 97 E7 BF FD   81 04 17 9B 03 77 8C A0  ...x.........w..
#     0040: F4 F4 5F 78 E2 01 97 59   FF 4E 89 D8 15 37 43 1B  .._x...Y.N...7C.
#     0050: AF D1 8D E4 20 6F 24 16   20 34 2D 24 C6 4C BD DE  .... o$. 4-$.L..
#     0060: FF 74 EE 62 FF C6 2B D8   A2 F6 70 05 8F 6A 5F 27  .t.b..+...p..j_'
#     0070: D7 D1 49 4F 48 2F B0 1D   0E 1C 91 35 04 32 3E 1A  ..IOH/.....5.2>.
#     0080: 51 99 29 77 D8 44 B5 5C   04 64 A1 E9 14 FD B5 AB  Q.)w.D.\.d......
#     0090: 8F 47 E0 80 6C B2 5D 1D   18 45 5B F8 B4 F2 7F AA  .G..l.]..E[.....
#     00A0: E9 33 86 8C A0 C9 D5 25   35 0B 37 F2 95 14 F4 9C  .3.....%5.7.....
#     00B0: F4 61 55 54 43 F1 51 CF   23 12 7B 8D 53 42 1A 00  .aUTC.Q.#...SB..
#     00C0: 2A 3C 0D 45 7F 74 6B 51   B8 24 DA B1 3E 5D 20 0B  *<.E.tkQ.$..>] .
#     00D0: 4B 91 03 A7 80 DC BC 8F   9F F0 41 35 8B 83 BA 65  K.........A5...e
#     00E0: 01 1D 09 34 5E 2E 69 DE   A6 8C EA 78 1B 85 99 A2  ...4^.i....x....
#     00F0: CD D4 09 BC 2F 59 55 43   85 63 A3 66 F7 67 6D E7  ..../YUC.c.f.gm.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.366 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D FF A7 5C 4E 90 03 5F   BB E2 29 6B EE 6A AE AA  ...\N.._..)k.j..
#     0010: 5A 1D A4 82 AB 62 54 57   BE FF 63 58 CC 7F 96 BC  Z....bTW..cX....
#     0020: 99 C3 4B C9 D2 DC A3 7C   4B E2 AA F8 24 80 1A 15  ..K.....K...$...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.368 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:23.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.369 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:23.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 09:26:23.370 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:26:23.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.371 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.373 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4E 4E F8 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:56.000 UTC",
#       "not  after"         : "2023-12-24 09:25:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 91 53 F0 7F 59 71 B4 D2   6F 9C B1 12 91 BD 16 24  .S..Yq..o......$
#           0010: 08 92 5F BD                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B5 D9 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:50.000 UTC",
#       "not  after"         : "2023-12-24 09:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#           0010: 67 15 D0 94                                        g...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.399 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 D4 89 76 BD 86 AD BF   C8 B8 51 19 04 6F 1A 4F  v..v......Q..o.O
#     0010: FD 88 10 11 ED 98 EB A8   07 B6 75 FC 84 AF A8 9A  ..........u.....
#     0020: B5 D7 36 A7 35 9E 1A D1   D9 BE 82 99 0D 06 82 3B  ..6.5..........;
#     0030: CD D5 26 DD 76 11 7B 32   A9 28 07 77 7A 2A 01 AC  ..&.v..2.(.wz*..
#     0040: 27 25 3B 03 C4 F2 D7 A3   AE 2B 9A 1D 48 EB C8 9E  '%;......+..H...
#     0050: 4F 70 8F B3 29 51 CB AD   B0 1F 2C 13 F7 1F 5C 95  Op..)Q....,...\.
#     0060: 30 71 07 F0 BD E5 12 C0   03 95 03 5F CF 07 AD C8  0q........._....
#     0070: EB 2D 6A 98 B9 A7 78 30   93 62 4F DB 31 AC CD 0B  .-j...x0.bO.1...
#     0080: 44 38 AF 7B EE F9 AB E3   55 2D D0 19 91 25 14 BA  D8......U-...%..
#     0090: 3A D4 63 B8 CA F4 09 E3   EA 97 8C 43 23 82 72 76  :.c........C#.rv
#     00A0: 7C 19 16 1D 6B 00 50 56   12 B4 F1 A0 28 1C BB A9  ....k.PV....(...
#     00B0: BE A4 FE 34 7D DE 81 FA   DF 1A B2 3A 51 97 D9 AD  ...4.......:Q...
#     00C0: 36 7A B4 D8 FB 97 0D 22   E6 24 10 67 4A 47 FD 1F  6z.....".$.gJG..
#     00D0: 59 0B 1E 5E 09 DD B9 D3   7B 2B B1 B1 6B 41 6D 64  Y..^.....+..kAmd
#     00E0: A7 1D 5B 2B DA 7C 54 9C   D6 1F 2A F2 B0 AD 05 C2  ..[+..T...*.....
#     00F0: 56 C0 A0 74 46 7F 5D 49   2C 8B 62 54 1F C9 62 EC  V..tF.]I,.bT..b.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.401 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D 6D 09 70 7F D1 3A 34   D9 FF E0 FC F4 CC 06 BA  =m.p..:4........
#     0010: F6 92 5B 50 B7 4C 35 FC   DA 4E 6C 5B 1A BE 91 AF  ..[P.L5..Nl[....
#     0020: F9 CA 91 CF AB 50 E0 93   9A 48 8F 91 98 0B 9D D2  .....P...H......
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.401 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:23.450 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BB DC 3D E0 E0 91 34 3E 21 6E CE 04 B6 1E 4B E8 9B 95 49 03 21 93 91 97 71 53 61 16 AA 70 E4 50",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 09:26:23.742 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 09:26:23.744 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 09:26:35.463; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:35.796 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 45 B6 F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:47.000 UTC",
#       "not  after"         : "2023-12-24 09:25:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#           0010: 67 15 D0 94                                        g...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B B5 D9 A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 09:25:50.000 UTC",
#       "not  after"         : "2023-12-24 09:25:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 91 42 9C 34 2B 0A 27   00 83 B1 FB 7A 8F 6E 64  ..B.4+.'....z.nd
#           0010: 67 15 D0 94                                        g...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 0A C4 5C 52 E7 8B 49   52 93 74 5F C7 4E B4 E1   ..\R..IR.t_.N..
#           0010: CB 87 8F C9                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 09:26:35.811 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:36.030 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.030 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:36.032 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 09:26:36.032 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.037 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.049 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.050 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.050 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 09:26:36.052 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "87 46 C3 28 78 62 7A C8 EA 02 4F 86 91 3C A3 1F CE 1A AB 98 B3 94 04 A4 29 B1 B2 4C 8B 92 4B 09",
#     "session id"          : "0F 00 22 F0 2D CA BE 23 E6 D0 EF AA 40 30 81 C4 C7 60 A2 39 B8 4C 69 3D 0B 75 05 1D B0 A5 6E CE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 80 17 92 2F C2 70 85 22   DC 4D 67 FE F6 29 BD 83  .../.p.".Mg..)..
#               0010: 27 9C 45 4A 60 6A 89 2F   93 E5 60 99 F4 8F D9 7E  '.EJ`j./..`.....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.074 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EE 36 5A F4 FD 05 C9 B4 64 86 A7 ED F8 A1 8E 3B 7C B6 DD C7 2C 8C F0 E3 2D 90 0A 42 FF B4 B4 54",
#     "session id"          : "0F 00 22 F0 2D CA BE 23 E6 D0 EF AA 40 30 81 C4 C7 60 A2 39 B8 4C 69 3D 0B 75 05 1D B0 A5 6E CE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: AF D5 A9 0E 83 02 97 F8   54 12 D3 7C 91 6F 7A EF  ........T....oz.
#             0010: CE E5 A6 B6 4C AA 5C F6   60 D2 CF 17 01 67 55 6E  ....L.\.`....gUn
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.074 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.075 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.076 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.076 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.076 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.076 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 09:26:36.076 UTC|SSLExtensions.java:163|Ignore unsupported

[...truncated too long message...]

java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 09:27:58.671 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:27:58.721 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:27:58.721 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:27:58.722 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 09:27:58.722 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:33908/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28474ms
ok 65 stop command for single port in 31179ms
ok 66 status detects locally running solr in 14371ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2185ms
ok 69 copying files around in 6646ms
ok 70 upconfig in 2650ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1221ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.api.collections.TestCollectionAPI.test (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.api.collections.TestCollectionAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.api.collections.TestCollectionAPI.test" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=EFE05A4F76476C02 -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 22m 6s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m30.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5534 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5534/

All tests passed

Build Log:
[...truncated 1326 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40069/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 07:23:24.206; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 07:23:24.212; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 07:23:25.111; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 07:23:25.149; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22682ms
ok 61 start solr with client truststore and security manager in 24777ms
not ok 62 start solr with mTLS needed in 61821ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-sIQN1h/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40069.
#
# Started Solr server on port 40069 (pid=199047). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 40070.
#
# Started Solr server on port 40070 (pid=199491). Happy searching!
#
# INFO  - 2023-09-25 07:24:47.771; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 07:24:47.778; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 07:24:48.166; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 07:24:48.169; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 07:24:48.170; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:48.201 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 E3 F0 1F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:23.000 UTC",
#     "not  after"         : "2023-12-24 07:24:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 8D 2A DF E8 AB 12 BD   10 1D E7 9C 60 1F D9 C0  B.*.........`...
#         0010: 72 D8 D8 56                                        r..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:48.206 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 DB 8B CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:15.000 UTC",
#     "not  after"         : "2023-12-24 07:24:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:48.220 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:48.316 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:48.316 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:48.317 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:48.317 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:48.454 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.455 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:48.456 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:48.457 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.462 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.473 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.474 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.474 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:48.476 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3B 35 21 E5 1E 33 F7 C0 EB 91 C3 B5 31 7B AF 58 7A 67 C2 2C 27 D9 96 75 0C 90 5E 4C 22 94 A0 79",
#   "session id"          : "0C 30 06 A0 7E 9A D8 FA AA 34 9A 64 39 83 81 36 DB 18 55 23 83 F0 B1 F1 D4 E3 0D D2 7F FA E7 3D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 72 F4 6D EF 0D F8 8D 00   01 A9 4D 7B 88 B8 03 51  r.m.......M....Q
#             0010: F2 06 2E 25 5B 9F 61 B5   E8 0E AE F2 1F 69 E4 0A  ...%[.a......i..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.591 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "92 92 64 C0 A3 22 99 42 10 EC FC C3 CA 11 FE F3 16 8F DF A9 78 F3 16 FA EC DC 6F 05 E0 45 47 82",
#   "session id"          : "0C 30 06 A0 7E 9A D8 FA AA 34 9A 64 39 83 81 36 DB 18 55 23 83 F0 B1 F1 D4 E3 0D D2 7F FA E7 3D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 73 C7 B3 10 1C 2F 33 78   15 88 4E AE 22 A7 5B C9  s..../3x..N.".[.
#           0010: E6 BA DC A7 54 48 B0 EA   80 A4 3F 55 5E 5F E9 4E  ....TH....?U^_.N
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.592 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.592 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.593 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.594 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.595 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.596 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.596 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.596 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.605 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.606 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.608 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.611 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.611 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.612 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.613 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.614 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.614 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.615 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.615 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.616 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.616 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.617 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.619 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E DD CF 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:20.000 UTC",
#       "not  after"         : "2023-12-24 07:24:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 9F E2 56 E4 56 28 41   4D EF 8D E0 29 39 D9 A4  ...V.V(AM...)9..
#           0010: C7 08 38 29                                        ..8)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.620 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.696 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.700 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 07 AB 64 61 E9 C5 45 D0   04 98 47 D1 90 02 38 9E  ..da..E...G...8.
#     0010: F1 F9 FA 39 EF E3 A8 56   35 30 5D 90 50 7A 40 94  ...9...V50].Pz@.
#     0020: D6 9A 1C C7 74 83 B0 A1   C8 BB 86 31 41 C4 6A 02  ....t......1A.j.
#     0030: F5 E1 96 D1 69 A9 8D 28   1E D0 C3 76 8A 23 66 20  ....i..(...v.#f
#     0040: 79 4E 80 6C CF 80 DD DE   F5 B7 BE 6E 02 6F 80 6E  yN.l.......n.o.n
#     0050: B8 AF D7 C0 56 53 93 50   AB CA A5 7D 59 24 EE E4  ....VS.P....Y$..
#     0060: A7 40 6F 76 0E 44 63 38   E0 3A E1 4B 77 71 6B DE  .@ov.Dc8.:.Kwqk.
#     0070: F5 EB 90 D8 ED A7 77 ED   AF DB B4 29 41 3B C5 5B  ......w....)A;.[
#     0080: 33 84 5E 22 33 B0 6D 1E   93 1F 7C CB 9D C7 45 16  3.^"3.m.......E.
#     0090: 60 3C 1A 02 47 D2 E3 E1   91 C0 A8 AF E8 9B DA 25  `<..G..........%
#     00A0: 68 79 37 4C E3 A1 19 3F   8A 0A C5 4E FE 25 50 B2  hy7L...?...N.%P.
#     00B0: 48 2E 0F 28 60 C1 39 46   1B 52 FE D6 79 FE DD 6B  H..(`.9F.R..y..k
#     00C0: B2 F6 40 E1 C9 93 3C 59   DA 9B 6E 78 F0 2E 3F 70  ..@...<Y..nx..?p
#     00D0: B3 E7 9C B8 8C F9 93 D6   0B FD 26 BB 85 15 9F 27  ..........&....'
#     00E0: 98 83 9F 1D 49 F2 0A 52   4B 15 F2 FD 7D 4F BC 7F  ....I..RK....O..
#     00F0: F1 01 EA B4 30 D6 C3 29   85 2D F7 E9 D5 11 50 AC  ....0..).-....P.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.702 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 B1 68 36 3A 89 58 B7   60 62 84 0E 0E A2 E9 D3   .h6:.X.`b......
#     0010: 0C C3 B1 98 0A 88 28 72   3D A4 CB 98 DA CA 70 7C  ......(r=.....p.
#     0020: C6 2A FD B9 32 20 9D B5   A6 8E 7F A5 B3 AA 02 52  .*..2 .........R
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.704 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:48.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.706 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:48.706 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.706 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:48.706 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:48.706 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.707 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.709 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 E3 F0 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:23.000 UTC",
#       "not  after"         : "2023-12-24 07:24:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 8D 2A DF E8 AB 12 BD   10 1D E7 9C 60 1F D9 C0  B.*.........`...
#           0010: 72 D8 D8 56                                        r..V
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 05 9D DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:17.000 UTC",
#       "not  after"         : "2023-12-24 07:24:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#           0010: EE 2B D6 21                                        .+.!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.736 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 71 9D 7C 3D 60 DF 2B   09 74 23 EC F3 FC 3F BF  Uq..=`.+.t#...?.
#     0010: 8C D6 04 91 22 A6 37 64   2B CC 5F 60 EA DF 70 E8  ....".7d+._`..p.
#     0020: 98 4F 6D BA 91 D8 F6 AA   C1 FD 00 22 AA E3 0D 4F  .Om........"...O
#     0030: 79 BA 08 C2 3A C7 50 EB   6F E2 60 79 7D 42 09 52  y...:.P.o.`y.B.R
#     0040: A1 CF D3 FB 98 78 29 94   F9 37 5B 5B E0 81 46 F1  .....x)..7[[..F.
#     0050: 4F 47 25 2E 1A D4 F4 E6   4C 3A CF 17 27 A4 71 93  OG%.....L:..'.q.
#     0060: F8 8C 84 37 B8 8F 3D 51   78 4F 7F 9E 2E 3A 68 A4  ...7..=QxO...:h.
#     0070: 8A 2B 95 40 43 1E 38 9A   FB 4E AC 6A B8 D6 56 8F  .+.@C.8..N.j..V.
#     0080: 91 1B 7B FE A2 14 CE A1   A8 11 64 D7 4D 51 D4 97  ..........d.MQ..
#     0090: F1 09 1E 3B 5D 37 EA 35   22 9B 2B 20 B9 F3 13 B3  ...;]7.5".+ ....
#     00A0: 3D 6F 19 FD 03 33 98 3D   7B C8 80 26 DF E6 19 8F  =o...3.=...&....
#     00B0: 05 DE 92 85 59 40 7E F0   0F 40 A0 70 D5 25 35 F8  ....Y@...@.p.%5.
#     00C0: 8A 02 43 54 59 A4 0E DD   FC C8 74 FC A4 8A 4E E1  ..CTY.....t...N.
#     00D0: 89 8B 20 04 91 2D 16 DE   C6 DC E1 7A F2 2C A0 73  .. ..-.....z.,.s
#     00E0: BB 00 27 24 8C 8E 92 51   7C 29 22 6C 12 87 76 E2  ..'$...Q.)"l..v.
#     00F0: 6B 42 2C 9F F8 15 F4 D5   9E BF 5C C7 07 81 3B CB  kB,.......\...;.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.738 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5E 7F D2 9D 92 58 32 03   18 B9 93 6E 02 1D 84 4E  ^....X2....n...N
#     0010: 63 D7 53 6C 95 1A 62 F6   FF 79 1C 75 35 A0 40 06  c.Sl..b..y.u5.@.
#     0020: 43 CD 5A 78 97 A1 C7 88   B8 8B B1 19 3D F8 73 DB  C.Zx........=.s.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.738 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:48.787 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BF D9 FF 06 9B 7D E2 66 5E BB DF 8D 99 9A A4 6D 06 35 8A 43 87 91 D7 28 AF BA 98 87 1F 13 1A FE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 07:24:49.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 07:24:49.071 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 07:24:50.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 07:24:50.041; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 07:24:50.442; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 07:24:50.446; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 07:24:50.446; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-sIQN1h/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:50.480 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "00 E3 F0 1F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:23.000 UTC",
#     "not  after"         : "2023-12-24 07:24:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 8D 2A DF E8 AB 12 BD   10 1D E7 9C 60 1F D9 C0  B.*.........`...
#         0010: 72 D8 D8 56                                        r..V
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:50.485 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 DB 8B CA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:15.000 UTC",
#     "not  after"         : "2023-12-24 07:24:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 07:24:50.499 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:50.838 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:50.839 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:50.839 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:24:50.839 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:50.985 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:50.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:50.987 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:24:50.987 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:50.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:51.005 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:51.006 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:51.006 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:24:51.008 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0F C1 36 4A 91 0A 37 82 A8 35 73 94 DA 0C 2B 6A A9 8A 24 E4 95 3E B8 7F C5 33 C1 C3 32 57 BD 67",
#   "session id"          : "E0 A0 88 02 EC DA 87 64 A1 C1 15 D5 55 F2 F1 F3 9F 20 73 DD 72 57 65 F1 97 D4 88 59 68 1D 01 59",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 03 41 F3 26 A5 CF 78   66 7D 7D 21 ED 5D 0C 17  ..A.&..xf..!.]..
#             0010: 5A DA E1 BD FB 00 4A 32   49 54 C9 F0 08 14 86 47  Z.....J2IT.....G
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.120 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "04 81 E2 98 B5 F4 58 15 9B 07 6D 1D 84 6C 38 37 EE 91 53 2A 15 F8 FD 2D 33 32 BC A7 3A 79 6F E7",
#   "session id"          : "E0 A0 88 02 EC DA 87 64 A1 C1 15 D5 55 F2 F1 F3 9F 20 73 DD 72 57 65 F1 97 D4 88 59 68 1D 01 59",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B7 D5 28 46 4E F0 22 91   45 3A 01 D9 D7 17 D6 EC  ..(FN.".E:......
#           0010: B8 35 A0 73 86 7A 88 A9   87 7B F3 A5 F2 94 E4 3A  .5.s.z.........:
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.121 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.121 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.122 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.123 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.124 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.124 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.125 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.126 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.126 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.126 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.127 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.128 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.135 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.136 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.138 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.141 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.141 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.142 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.143 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.144 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.144 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.145 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.145 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.146 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.146 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.146 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.149 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7E DD CF 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:20.000 UTC",
#       "not  after"         : "2023-12-24 07:24:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D1 9F E2 56 E4 56 28 41   4D EF 8D E0 29 39 D9 A4  ...V.V(AM...)9..
#           0010: C7 08 38 29                                        ..8)
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.150 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.245 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 05 9D DB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 07:24:17.000 UTC",
#     "not  after"         : "2023-12-24 07:24:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#         0010: EE 2B D6 21                                        .+.!
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#         0010: 93 B7 C8 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.249 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 D0 85 1E 22 3C DC B5   80 F8 FF F3 7E 19 58 E4  ...."<........X.
#     0010: 03 DD 2C D2 6D 5B A9 F7   D8 0B 05 03 5E 77 73 04  ..,.m[......^ws.
#     0020: CB 69 1C 9E 91 9B 6E 85   91 65 B0 92 4B 0C F1 C8  .i....n..e..K...
#     0030: CE DD 94 32 E6 74 C9 1E   B9 0C 9C 6F 1D 76 21 68  ...2.t.....o.v!h
#     0040: 5B 69 64 50 6F C4 E7 75   88 A3 DC 95 19 64 1F 52  [idPo..u.....d.R
#     0050: F0 2C 42 50 47 9A 8A 64   AA E2 2D 05 88 EE 48 C3  .,BPG..d..-...H.
#     0060: 90 8E D1 58 67 FD 65 27   CA 42 FC 5D 73 28 14 F4  ...Xg.e'.B.]s(..
#     0070: 11 23 B0 1A E1 AE 5E 0E   D5 AE 68 F6 1C 3B 38 63  .#....^...h..;8c
#     0080: E3 4D EB 85 A2 CE CE 06   A9 76 97 98 D6 EB E7 CC  .M.......v......
#     0090: 2C 29 C7 C5 6D 54 8E 29   66 A0 3F 70 64 76 42 80  ,)..mT.)f.?pdvB.
#     00A0: AF 87 E9 F4 00 17 C3 C7   AB 30 35 68 19 83 9C C2  .........05h....
#     00B0: 8D BC F2 11 20 16 E3 2D   44 4A 26 F5 E6 36 54 F8  .... ..-DJ&..6T.
#     00C0: 22 48 86 BB A8 B7 DF 69   8F 65 77 45 A2 FE 78 8E  "H.....i.ewE..x.
#     00D0: A6 4C B3 7F 48 25 FE E3   85 A5 0E 57 FE 10 1B 95  .L..H%.....W....
#     00E0: A1 F5 C9 F5 09 C6 A8 59   07 15 7D C5 54 3F 25 76  .......Y....T?%v
#     00F0: 83 CD 58 4A 9B 43 31 D4   AB 84 A4 8E 16 6C CD CD  ..XJ.C1......l..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.251 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 51 76 F8 CE C5 D0 98 A5   CE 50 CB B0 B6 28 0F 0F  Qv.......P...(..
#     0010: A9 4C CC BD BC 88 C6 1A   BE C8 C2 46 C8 7F E6 5B  .L.........F...[
#     0020: E2 D8 1F 83 A9 2F 4A 4A   18 BA 16 B0 E6 BD F4 E9  ...../JJ........
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.254 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:51.255 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.255 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:51.256 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.256 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 07:24:51.256 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:24:51.256 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.257 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.259 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "00 E3 F0 1F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:23.000 UTC",
#       "not  after"         : "2023-12-24 07:24:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 8D 2A DF E8 AB 12 BD   10 1D E7 9C 60 1F D9 C0  B.*.........`...
#           0010: 72 D8 D8 56                                        r..V
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 05 9D DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:17.000 UTC",
#       "not  after"         : "2023-12-24 07:24:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#           0010: EE 2B D6 21                                        .+.!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.285 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 C8 9F A9 C2 54 0F 1E   AC 34 53 70 E5 0A D6 5C  @....T...4Sp...\
#     0010: B9 0E 0E D3 5B 33 45 91   49 A9 57 A9 42 CA 20 A6  ....[3E.I.W.B. .
#     0020: 18 3F F6 11 17 1E 42 15   F8 0B FD 4F 32 E7 D3 4C  .?....B....O2..L
#     0030: 17 F7 28 93 33 70 90 99   98 EB FA C9 7A C1 01 94  ..(.3p......z...
#     0040: 58 A7 B2 07 80 9D 90 F8   39 2E B5 03 9B A0 97 9F  X.......9.......
#     0050: 82 3D 32 1A 61 A2 6A B5   34 F2 25 47 7B 89 0B E2  .=2.a.j.4.%G....
#     0060: 37 10 6D 78 95 11 CA 44   08 C3 A3 59 77 BB 26 AA  7.mx...D...Yw.&.
#     0070: 52 AC 04 C5 53 2A 11 D3   8D 65 C0 03 F3 68 EB 53  R...S*...e...h.S
#     0080: 1C 3C 22 BD 9B 5C 4D 01   61 9A 3C D9 88 87 AC 64  .<"..\M.a.<....d
#     0090: F8 22 02 5F CE 3E 14 A4   88 CE A3 7C CB DC BE 18  ."._.>..........
#     00A0: CF CC E8 FA 3C B3 6D E7   A8 A6 51 FF 8D EE 65 44  ....<.m...Q...eD
#     00B0: 43 FA 23 FB 05 6C EB 84   73 C1 72 70 4D AB 0C AD  C.#..l..s.rpM...
#     00C0: BF 15 9A 4C 52 B3 2F A9   8F 94 A9 D9 94 3B BA D8  ...LR./......;..
#     00D0: B8 74 DF A3 67 DE F1 F1   D0 C2 F8 63 C5 F7 C3 06  .t..g......c....
#     00E0: 91 4B 7B 69 35 65 6E 50   56 08 6E BD 5A B1 6C F4  .K.i5enPV.n.Z.l.
#     00F0: 61 53 E2 93 18 74 76 AB   A0 C9 C1 03 5A 72 7E 60  aS...tv.....Zr.`
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.287 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 31 70 C2 32 12 B6 7F A5   FF 18 D1 DE 9F 56 DA CE  1p.2.........V..
#     0010: FD 03 89 0E 59 A9 8F 1C   8A 6C 72 70 D3 2D B9 4D  ....Y....lrp.-.M
#     0020: C5 F6 63 B7 A4 10 10 0D   91 50 B5 2A 68 79 67 09  ..c......P.*hyg.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.287 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:24:51.336 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3E DD 68 54 5C 5F EB 5C 03 FE 3D B0 4E 09 BD F0 56 37 18 9C B2 48 9F 6A CA F6 8A 3B AF DF 9A 09",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 07:24:51.624 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 07:24:51.626 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 07:25:03.332; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 07:25:03.665 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 DB 8B CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:15.000 UTC",
#       "not  after"         : "2023-12-24 07:24:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#           0010: EE 2B D6 21                                        .+.!
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 05 9D DB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 07:24:17.000 UTC",
#       "not  after"         : "2023-12-24 07:24:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 8B 92 28 DB FD F3 58   CF AF DC 65 CE 24 14 8E  ...(...X...e.$..
#           0010: EE 2B D6 21                                        .+.!
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED A7 C0 F9 26 E5 6E 23   37 8A C6 C2 A7 6F F2 6F  ....&.n#7....o.o
#           0010: 93 B7 C8 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 07:25:03.682 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:25:04.143 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:25:04.145 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:25:04.146 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:25:04.146 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:25:04.206 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.206 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:25:04.208 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 07:25:04.209 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.215 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.227 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.228 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 07:25:04.230 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "12 FF 05 24 2B A0 71 BC 3B 4B E2 10 34 6A 40 CC BB AB A0 2A 9E 40 F6 72 90 A6 73 F2 9B C1 CD 0F",
#     "session id"          : "D6 16 B8 FE 9D B6 B9 50 E8 1D B4 4F D6 3C 78 55 24 78 F8 6C 3C 69 B2 FD 4C B0 F5 F2 8A 80 63 86",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 9B 23 B4 9D D9 EC F2 23   46 80 A7 D3 6D 48 A9 8F  .#.....#F...mH..
#               0010: 7A 0F 1E 5C BA 26 2B 30   F9 D2 AE 03 6F 82 B6 7E  z..\.&+0....o...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.249 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8A 76 4D EF 42 71 43 C5 F4 C3 14 75 9E AC EE 91 35 A6 A7 49 D5 C9 7D 4F C7 B2 36 C9 7F 2E D6 FA",
#     "session id"          : "D6 16 B8 FE 9D B6 B9 50 E8 1D B4 4F D6 3C 78 55 24 78 F8 6C 3C 69 B2 FD 4C B0 F5 F2 8A 80 63 86",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 87 B1 B3 0B E4 2F 9A 36   03 48 45 53 AA 37 F7 78  ...../.6.HES.7.x
#             0010: 4D 57 12 39 DF B2 80 29   21 4B FA B0 34 61 60 40  MW.9...)!K..4a`@
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.250 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.250 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.251 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.252 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.252 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.254 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.255 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.256 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.264 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.266 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.267 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:25:04.272 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:25:04.272 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 07:25:04.273 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

n.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 07:26:28.340 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:26:28.389 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:26:28.390 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:26:28.390 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 07:26:28.390 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40070/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28707ms
ok 65 stop command for single port in 31425ms
ok 66 status detects locally running solr in 14386ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2173ms
ok 69 copying files around in 6608ms
ok 70 upconfig in 2622ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1214ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 4s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m31s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5533 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5533/

All tests passed

Build Log:
[...truncated 1324 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41251/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 04:22:30.500; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 04:22:30.505; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 04:22:31.440; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 04:22:31.480; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22584ms
ok 61 start solr with client truststore and security manager in 25206ms
not ok 62 start solr with mTLS needed in 57462ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-SsBiY1/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41251.
#
# Started Solr server on port 41251 (pid=200259). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41252.
#
# Started Solr server on port 41252 (pid=200688). Happy searching!
#
# INFO  - 2023-09-25 04:23:54.231; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 04:23:54.236; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 04:23:54.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 04:23:54.619; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 04:23:54.619; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:54.651 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 42 39 83",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:30.000 UTC",
#     "not  after"         : "2023-12-24 04:23:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F 64 6C 3F C5 40 B7 26   9A C9 59 41 F7 2D 99 5E  .dl?.@.&..YA.-.^
#         0010: 0F A6 91 C5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:54.655 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B8 1D D1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:22.000 UTC",
#     "not  after"         : "2023-12-24 04:23:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:54.669 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:54.894 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:54.896 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:54.896 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.904 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.916 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.917 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.917 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:54.920 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BA 95 B0 28 5D 54 36 DD BC C0 CD 04 70 56 97 52 5F 0C 86 77 D8 7E 5C AD 8D 61 A2 BB 4A 81 17 8D",
#   "session id"          : "52 AE E8 6F F6 C9 E0 BD EE F1 D9 64 36 E0 F7 60 BD 5E 98 EE 0F FB 14 E7 1A BC 41 78 35 0C 82 78",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 0E 03 F6 C7 C2 A9 BB   9E D0 F6 95 90 D2 66 9D  ..............f.
#             0010: 65 28 71 A1 3F B3 60 72   DD F0 03 BC D4 B6 D9 5E  e(q.?.`r.......^
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.051 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "98 3C 5A 95 F8 30 D0 DD 82 50 1D 66 CD 76 C8 03 0F 44 85 E6 D6 45 52 75 FB A0 4B 87 C5 29 C3 AA",
#   "session id"          : "52 AE E8 6F F6 C9 E0 BD EE F1 D9 64 36 E0 F7 60 BD 5E 98 EE 0F FB 14 E7 1A BC 41 78 35 0C 82 78",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 48 D1 F6 03 87 6C AF 88   53 C1 DE 20 00 C2 45 65  H....l..S.. ..Ee
#           0010: C4 76 FB A5 CA 0E 1C 60   B4 96 58 D1 3C F8 9A 59  .v.....`..X.<..Y
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.052 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.054 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.054 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.055 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.056 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.057 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.064 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.066 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.067 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.071 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.071 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.071 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.071 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.071 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.072 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.072 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.072 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.073 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.074 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.074 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.074 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.075 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.075 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.078 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 1B D8 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:26.000 UTC",
#       "not  after"         : "2023-12-24 04:23:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A F0 CF 1C 64 B4 61 2A   EE A1 DA 33 79 BA 4E 18  *...d.a*...3y.N.
#           0010: B0 FD 7C A2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.078 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:55.141 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:55.142 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:55.143 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:55.143 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.164 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.168 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1E 43 ED 0D 31 F4 52 26   B1 F7 12 A0 75 C2 68 26  .C..1.R&....u.h&
#     0010: 42 CB F4 C5 5F C4 0C 43   C2 AA 82 AF A9 E0 50 1A  B..._..C......P.
#     0020: 7E 1C FA 70 A3 3D B7 FA   AA 46 FE DD BD 05 85 D8  ...p.=...F......
#     0030: FB B3 99 98 6B 56 83 E2   BF 55 99 17 98 FE C3 E4  ....kV...U......
#     0040: 9F FA 28 3A 12 16 21 31   35 E4 87 C0 EF E3 55 03  ..(:..!15.....U.
#     0050: 21 B6 57 12 EC 1E BF 7C   81 45 13 CA 5B 46 66 03  !.W......E..[Ff.
#     0060: F6 BE 28 C3 1B 36 BD 6F   A6 EA 53 CC 81 9C B2 67  ..(..6.o..S....g
#     0070: 9E 81 AC 70 08 D2 B4 4F   45 4C 27 26 FD 4B 39 6F  ...p...OEL'&.K9o
#     0080: 4F A7 4B AE 56 0F DE D6   3F B7 39 BF FE FB 4F 63  O.K.V...?.9...Oc
#     0090: 09 A0 03 70 D6 8E DB 11   36 B3 B6 4E B8 82 05 CD  ...p....6..N....
#     00A0: 82 22 68 BA CA 9B 1E 01   38 BD F2 EF 17 77 B3 AC  ."h.....8....w..
#     00B0: A2 B5 7C 14 FA E2 2B E7   34 BF 28 7C 77 5F 35 F4  ......+.4.(.w_5.
#     00C0: 13 62 7C 49 76 0E A3 40   4D 84 39 7F 4D E4 46 EB  .b.Iv..@M.9.M.F.
#     00D0: 3C 30 F5 74 E3 A7 2E 1E   3A 68 2D 18 56 E0 1F 19  <0.t....:h-.V...
#     00E0: CE C9 8F E2 A5 72 BA 89   E7 C4 A0 8C 14 C1 3E CB  .....r........>.
#     00F0: A1 0B 16 BD C0 94 46 5F   8C 50 BB 1D 49 A4 68 B9  ......F_.P..I.h.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.170 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 56 AD C2 56 6F B8 34 96   43 CD AC 3D 00 B3 E5 8E  V..Vo.4.C..=....
#     0010: 9B 85 A8 95 81 AD 6C E0   53 FA 6D 95 31 3F B3 16  ......l.S.m.1?..
#     0020: AE 96 7D BC 6E 81 FB 86   25 F4 B4 CD 32 79 25 85  ....n...%...2y%.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.173 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:55.174 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.174 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:55.174 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.174 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:55.175 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:55.175 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.175 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.178 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 42 39 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:30.000 UTC",
#       "not  after"         : "2023-12-24 04:23:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F 64 6C 3F C5 40 B7 26   9A C9 59 41 F7 2D 99 5E  .dl?.@.&..YA.-.^
#           0010: 0F A6 91 C5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 F7 7B 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:24.000 UTC",
#       "not  after"         : "2023-12-24 04:23:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#           0010: 31 8F E7 BE                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.202 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 A8 41 31 B2 27 5F 5E   E8 73 E3 5B AC 54 A2 AA  ..A1.'_^.s.[.T..
#     0010: 34 BE B0 6B F4 22 A8 10   A2 B5 1D 33 8B 7D 9C F1  4..k.".....3....
#     0020: 8C 7C B1 42 62 7E 85 5B   39 82 CC 65 74 0F 50 89  ...Bb..[9..et.P.
#     0030: 4C 26 21 B7 76 BE 03 C9   25 98 70 1A 3E 27 7F A1  L&!.v...%.p.>'..
#     0040: 75 D4 AF 3A BE 60 E4 4F   90 2A F3 D6 F3 F5 E1 B2  u..:.`.O.*......
#     0050: 98 0B 71 84 81 2D 8F 88   62 F2 81 18 AF C4 F1 99  ..q..-..b.......
#     0060: 76 24 A3 F1 76 2B FC 73   8D CC E9 50 67 04 68 C8  v$..v+.s...Pg.h.
#     0070: 2B 85 95 0F 4F FD 8C 95   96 8B E5 B1 16 CE 5E 62  +...O.........^b
#     0080: C1 6F 25 0E 88 15 BE E5   B6 1C 62 8F 47 E5 5C 72  .o%.......b.G.\r
#     0090: 0B 2E CC 7B 04 75 56 57   F0 93 B4 2D E0 5C 8F 18  .....uVW...-.\..
#     00A0: 05 97 F3 B7 5C 04 CE 97   68 4D 3A 9A 74 7D 63 BB  ....\...hM:.t.c.
#     00B0: 42 AA F4 7C B3 2B 64 E6   61 1C 1C FE 43 91 E1 BC  B....+d.a...C...
#     00C0: 17 B4 BA B4 FD B6 2C 45   43 7C D8 1A 0C 17 53 E1  ......,EC.....S.
#     00D0: DF 70 DD CB D8 2B 00 B5   35 B0 D0 6A AA 3E B7 3D  .p...+..5..j.>.=
#     00E0: 43 DB 60 F7 03 71 EA 20   B0 6D 6E A8 82 E7 FA A6  C.`..q. .mn.....
#     00F0: E4 B5 4A 2A 99 D1 7D 2D   C8 F2 A7 65 03 1E 28 CF  ..J*...-...e..(.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.203 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 DF 08 95 55 82 E8 0E   08 25 51 12 C3 AD 21 7E  ....U....%Q...!.
#     0010: 21 26 D0 12 A0 A3 8D 35   39 1E 9A D4 42 5C 3F B0  !&.....59...B\?.
#     0020: B9 DE B8 58 B8 58 9E C3   CA 29 3C 7F 0A 78 8A 36  ...X.X...)<..x.6
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.204 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:55.256 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "54 B8 58 CB 36 4E 12 02 A1 74 CE 8F 59 14 A8 55 81 BF 5F 47 ED 21 0E 5F 1D 5F 15 DE 05 FD F8 40",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 04:23:55.568 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 04:23:55.569 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 04:23:56.524; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 04:23:56.530; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 04:23:56.899; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 04:23:56.902; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 04:23:56.903; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-SsBiY1/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:56.935 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "64 42 39 83",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:30.000 UTC",
#     "not  after"         : "2023-12-24 04:23:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F 64 6C 3F C5 40 B7 26   9A C9 59 41 F7 2D 99 5E  .dl?.@.&..YA.-.^
#         0010: 0F A6 91 C5                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:56.939 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B8 1D D1",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:22.000 UTC",
#     "not  after"         : "2023-12-24 04:23:22.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 04:23:56.954 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:57.316 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:57.317 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:57.317 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:23:57.317 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:57.452 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.452 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:57.454 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:23:57.454 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.460 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.472 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.472 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.472 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:23:57.474 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6B 9E B1 9E B9 38 AB 5A BB 0D 4A 77 A5 F5 15 40 9B 23 44 88 0F 5F BD 88 FF 71 B1 47 67 64 9E 5B",
#   "session id"          : "EA 94 A3 68 74 BA 84 0C C8 6E 86 46 2C D1 FE 4B DE 2A 7B EE D1 C0 BB 67 97 78 68 53 C9 52 37 AA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 19 CA E4 23 76 C7 17 A1   AB E7 FE B1 A4 31 F1 37  ...#v........1.7
#             0010: 86 2A 26 87 F0 A5 F9 27   49 99 E4 4A 00 8E B8 5C  .*&....'I..J...\
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.593 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "39 1E 0B 96 A8 E6 55 6D 88 4D A3 64 01 16 F4 22 E7 05 5A 35 5A 27 08 17 66 53 B0 AE 7C 47 73 B6",
#   "session id"          : "EA 94 A3 68 74 BA 84 0C C8 6E 86 46 2C D1 FE 4B DE 2A 7B EE D1 C0 BB 67 97 78 68 53 C9 52 37 AA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A FF 71 41 41 FB 2F DD   D3 73 CD FE 4B D8 98 50  :.qAA./..s..K..P
#           0010: A0 84 0D A3 1F 83 E6 59   00 36 0D A5 6B E5 89 33  .......Y.6..k..3
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.594 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.594 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.598 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.598 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.600 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.600 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.600 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.607 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.609 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.610 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.613 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.616 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.616 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.617 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.618 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.621 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 1B D8 BC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:26.000 UTC",
#       "not  after"         : "2023-12-24 04:23:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A F0 CF 1C 64 B4 61 2A   EE A1 DA 33 79 BA 4E 18  *...d.a*...3y.N.
#           0010: B0 FD 7C A2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.622 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.711 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "54 F7 7B 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 04:23:24.000 UTC",
#     "not  after"         : "2023-12-24 04:23:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#         0010: 31 8F E7 BE                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#         0010: FB 4F BD 04                                        .O..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.715 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 13 EC 4D 89 72 EE 15 CF   1D A8 AF 45 C7 55 6A A1  ..M.r......E.Uj.
#     0010: A6 60 34 4A 2A 28 9A 15   0C 29 81 63 41 EC B9 16  .`4J*(...).cA...
#     0020: DF C3 55 BC 1D 93 58 92   CB 65 4D C4 F3 AD 5B 40  ..U...X..eM...[@
#     0030: 3D 55 45 0C 37 BB 6D 98   20 92 A1 12 E6 75 9B F3  =UE.7.m. ....u..
#     0040: 33 A0 E9 0C FB 0D 9A D7   A3 7A 50 9E CB 5D F4 A8  3........zP..]..
#     0050: 4E B2 93 86 CB E5 F5 71   E9 81 DD 73 A1 EA EC F7  N......q...s....
#     0060: 51 39 64 2F 94 F9 E8 94   6F E5 D7 DE F8 29 E6 C8  Q9d/....o....)..
#     0070: 92 DA AF 6E A5 69 6C 2F   57 88 91 C2 1D 8A E5 9E  ...n.il/W.......
#     0080: E2 B0 BA 01 E3 AF 8B 9D   7A 5B 59 5D 8C 5E 95 00  ........z[Y].^..
#     0090: 28 D4 15 3E CD 79 5C E9   F5 14 F7 14 3A 61 7D 5B  (..>.y\.....:a.[
#     00A0: A3 0E A1 D1 CE FC B3 E5   75 83 0A 44 75 B5 DE 7A  ........u..Du..z
#     00B0: 34 70 D3 45 1B 9B DA 9B   F4 77 AC 6D 2B 17 46 52  4p.E.....w.m+.FR
#     00C0: 4B 03 BD 57 84 4B 77 4F   C8 13 43 B4 0F 84 F6 59  K..W.KwO..C....Y
#     00D0: B7 6D B3 E0 FF 55 F1 20   A6 AA 51 3C 64 91 82 74  .m...U. ..Q<d..t
#     00E0: 10 17 0F A5 ED 48 81 BD   0C 13 F1 BF F1 D1 0D B6  .....H..........
#     00F0: FB 43 9D DB 29 79 6D 04   92 ED BF 19 49 30 22 1B  .C..)ym.....I0".
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.717 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 48 0A 23 76 68 14 EB   69 7D 4B 5C 75 22 E0 E5  *H.#vh..i.K\u"..
#     0010: 34 39 DE 48 DA 84 39 53   83 FF BD 80 2A 73 63 4E  49.H..9S....*scN
#     0020: 72 C4 BC 9D 66 C7 85 AD   35 AC 76 5A 1A 11 E5 9C  r...f...5.vZ....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.719 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:57.720 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.720 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:57.720 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.720 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 04:23:57.720 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:23:57.721 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.721 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.724 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "64 42 39 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:30.000 UTC",
#       "not  after"         : "2023-12-24 04:23:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F 64 6C 3F C5 40 B7 26   9A C9 59 41 F7 2D 99 5E  .dl?.@.&..YA.-.^
#           0010: 0F A6 91 C5                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 F7 7B 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:24.000 UTC",
#       "not  after"         : "2023-12-24 04:23:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#           0010: 31 8F E7 BE                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.750 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 39 83 58 8A B5 E6 12 CA   A6 BC 72 35 DF 8B 0D DA  9.X.......r5....
#     0010: F4 2C 69 38 39 7E 95 54   0D FB 51 0A E8 55 29 7A  .,i89..T..Q..U)z
#     0020: B7 23 E5 F3 4F D5 FB 89   37 E4 CA 2D E5 03 42 34  .#..O...7..-..B4
#     0030: AF 2E 98 AC 2C D7 4C 08   4B 77 9E B9 96 D6 5A 00  ....,.L.Kw....Z.
#     0040: 72 F1 4B DC A1 FB 56 6D   1A E7 0C D0 70 69 DE 28  r.K...Vm....pi.(
#     0050: 40 2F 48 8E 1D 5A 42 54   39 56 49 A3 D3 25 C6 3F  @/H..ZBT9VI..%.?
#     0060: A0 8F 43 4F 8D 6D DD 26   BC 4A 6D 77 18 2E 02 DC  ..CO.m.&.Jmw....
#     0070: ED 9D B7 51 DA C3 DB 3E   5D 0D D0 C1 27 67 EB C4  ...Q...>]...'g..
#     0080: 40 1F 42 3A A7 2E 71 1E   C4 26 E9 7D DF 01 16 24  @.B:..q..&.....$
#     0090: 3C 91 33 DF 5B 12 85 86   47 2D 34 D3 81 74 5E B5  <.3.[...G-4..t^.
#     00A0: A3 D4 ED 5A D9 39 BF 09   3D A1 14 AC 29 9F 71 A8  ...Z.9..=...).q.
#     00B0: CA 41 65 13 A2 47 BF DC   2C 93 64 EB 65 E0 C2 B8  .Ae..G..,.d.e...
#     00C0: 56 89 E5 61 4C E0 B0 5E   52 C1 16 3C 16 14 35 33  V..aL..^R..<..53
#     00D0: 09 E9 35 E4 A9 14 B2 0B   62 03 80 9E 4A F3 AE 6C  ..5.....b...J..l
#     00E0: 13 46 13 13 AD 1D ED 1F   00 E8 72 EA 51 9B BD 56  .F........r.Q..V
#     00F0: DF F9 36 61 2C D0 65 26   0D 45 63 43 46 AC FF D9  ..6a,.e&.EcCF...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.751 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EC BE E9 73 F1 01 FD A4   ED 81 71 DA 68 5F 57 15  ...s......q.h_W.
#     0010: 42 E3 B1 67 12 B7 24 3D   A7 1B 88 05 E2 60 9B 10  B..g..$=.....`..
#     0020: D6 ED 05 6C A4 B2 BA 00   DB 86 31 5E 05 F2 69 FA  ...l......1^..i.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.752 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:23:57.798 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA E5 DB 7B 8D F9 18 F8 6B DC 42 D1 0C A9 EC CA CA D4 32 AD 5C 0D 0E C5 91 69 FE 73 37 28 FC 3B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 04:23:58.083 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 04:23:58.085 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 04:24:09.918; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 04:24:10.229 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "54 F7 7B 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:24.000 UTC",
#       "not  after"         : "2023-12-24 04:23:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#           0010: 31 8F E7 BE                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 20 2B 38 DD B7 7A 0C F2   AF 35 04 BF 5B 68 0C 9A   +8..z...5..[h..
#           0010: FB 4F BD 04                                        .O..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A B8 1D D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 04:23:22.000 UTC",
#       "not  after"         : "2023-12-24 04:23:22.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 03 A4 9F E2 14 CD E2   85 2B 43 C7 85 E6 63 BD  T........+C...c.
#           0010: 31 8F E7 BE                                        1...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 04:24:10.244 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:24:10.402 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:24:10.402 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:24:10.402 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:24:10.403 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:24:10.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:24:10.484 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 04:24:10.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.489 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 04:24:10.503 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2D AB D6 19 73 57 D0 00 5C 8C D1 3D D2 FD BD EF 52 82 29 B6 82 46 C2 FC AE A3 CD 7E 1E 23 D5 F8",
#     "session id"          : "BD C9 16 33 8A 19 52 47 1B 7B AA 6B 20 F1 F6 48 69 C5 7D 63 2B 27 47 43 9F 39 C3 35 A8 23 CD 7A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B4 E6 A4 3E BF 5C F0 57   3D 3E 4B 2F 10 22 69 C5  ...>.\.W=>K/."i.
#               0010: 08 BD 7D 79 EB B2 4A 95   7E BB E3 AB AA B2 67 2A  ...y..J.......g*
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "23 D3 7A F9 30 28 3D 3E B3 F1 23 DD 7D 77 DD 2A 6A F8 C0 54 AB 50 69 FD B9 5A 0C 21 A9 62 55 FC",
#     "session id"          : "BD C9 16 33 8A 19 52 47 1B 7B AA 6B 20 F1 F6 48 69 C5 7D 63 2B 27 47 43 9F 39 C3 35 A8 23 CD 7A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 21 E0 84 26 A6 D1 24   60 99 02 B1 8D A9 C6 91  .!..&..$`.......
#             0010: 4B 09 B5 08 FE BE FF 71   FB 79 28 E1 92 37 14 05  K......q.y(..7..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.524 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.528 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.537 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.539 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.540 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.543 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:24:10.544 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:24:10.545 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 04:24:10.546 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 04:25:30.593 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:25:30.635 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:25:30.635 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:25:30.635 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 04:25:30.635 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41252/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28126ms
ok 65 stop command for single port in 31398ms
ok 66 status detects locally running solr in 14375ms
ok 67 status does not expose cli parameters to end user in 212ms
ok 68 listing out files in 2184ms
ok 69 copying files around in 6581ms
ok 70 upconfig in 2651ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1213ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 73 Cleanup in 1223ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 13s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m39s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5532 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5532/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:34373/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-25 01:01:55.530; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 01:01:55.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-25 01:01:56.778; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-25 01:01:56.819; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 23575ms
ok 61 start solr with client truststore and security manager in 25328ms
not ok 62 start solr with mTLS needed in 58234ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-5GANd8/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34373.
#
# Started Solr server on port 34373 (pid=202165). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 34374.
#
# Started Solr server on port 34374 (pid=202591). Happy searching!
#
# INFO  - 2023-09-25 01:03:20.662; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 01:03:20.668; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 01:03:21.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ff684e1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 01:03:21.066; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@363042d7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 01:03:21.066; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@366ac49b(ca,h=[localhost],a=[],w=[]) for Client@1b73be9f[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:21.100 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 57 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:56.000 UTC",
#     "not  after"         : "2023-12-24 01:02:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D7 F4 EF 5A 63 9B 1F 16   36 84 B5 C3 1F EB 28 26  ...Zc...6.....(&
#         0010: 9F 9E AC 3B                                        ...;
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:21.105 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 22 4E D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:48.000 UTC",
#     "not  after"         : "2023-12-24 01:02:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:21.120 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:21.481 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:21.481 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:21.481 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:21.482 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:21.630 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.630 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:21.632 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:21.632 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.638 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.650 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.651 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.651 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:21.654 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "22 4D 75 01 79 C8 8D 7E 3A E3 B8 80 CF C7 03 16 8C 85 95 F0 69 FF 39 1A A3 47 5D DA 47 42 E1 CE",
#   "session id"          : "A2 FA 49 37 9C 86 7C 38 A3 7A 7B 1B AD 75 6F BE 56 EC FB 0F F5 5A 60 73 97 C2 EF 2B CC 6C B1 EA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D3 FC 06 1E 55 2E BE F7   92 5B EE 54 64 3E C1 A4  ....U....[.Td>..
#             0010: 0F 14 1D B2 EE 6C 0A 01   0A F0 F3 B8 64 24 1B 41  .....l......d$.A
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.771 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "09 55 63 29 10 BA E6 07 56 E3 9E C4 B9 B0 AB 51 BA B0 AA A8 B7 B7 ED A3 BF 78 12 97 7A C7 F2 AC",
#   "session id"          : "A2 FA 49 37 9C 86 7C 38 A3 7A 7B 1B AD 75 6F BE 56 EC FB 0F F5 5A 60 73 97 C2 EF 2B CC 6C B1 EA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FD 97 3F 8D B2 83 6A 32   F9 CF 64 14 B1 E9 72 61  ..?...j2..d...ra
#           0010: B9 61 CA 44 E0 9A 01 49   14 29 34 94 E4 2F 07 7D  .a.D...I.)4../..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.771 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.772 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.774 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.774 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.776 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.776 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.776 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.777 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.778 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.786 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.788 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.789 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.793 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.793 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.794 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.796 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.796 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.797 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.797 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.798 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.799 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.799 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.803 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 75 28 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:53.000 UTC",
#       "not  after"         : "2023-12-24 01:02:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 10 EC 79 47 8E 1F 16   96 E7 51 93 A7 5F FD 58  ...yG.....Q.._.X
#           0010: 25 96 75 91                                        %.u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.804 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.888 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.892 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 F1 79 34 B4 31 02 94   1D F8 C2 A2 00 C1 BE 69  H.y4.1.........i
#     0010: 0E B1 A4 C4 42 AD 5D 94   97 4D A6 85 DD 3B F6 13  ....B.]..M...;..
#     0020: 3D 6D 45 EA B6 D1 7B 7A   66 5F C8 1A CB 2A 56 5C  =mE....zf_...*V\
#     0030: 8F 02 28 A7 24 F5 17 F8   41 EF 21 88 30 7C F7 B8  ..(.$...A.!.0...
#     0040: 69 82 5F 9F C3 C3 90 2B   8F F0 44 2A 16 1E B1 52  i._....+..D*...R
#     0050: 55 81 FE 36 BD 3D 7E 62   12 E2 1D A8 68 CF 44 59  U..6.=.b....h.DY
#     0060: D7 E0 F1 85 3F 8C D5 8E   82 7C 0C 2F 56 5B 94 90  ....?....../V[..
#     0070: 7B 5B 5C CA B9 2F 97 00   60 12 DB 63 77 19 BE 9B  .[\../..`..cw...
#     0080: B3 8A 99 77 E8 9B 74 58   B3 80 06 9F 6D 7B D3 6B  ...w..tX....m..k
#     0090: 09 B3 E1 9C AA 6F 15 CE   C9 BE 0D 48 2C 3E 93 DB  .....o.....H,>..
#     00A0: 85 34 50 62 CD 71 20 1A   49 4A A8 8C 30 69 E6 D9  .4Pb.q .IJ..0i..
#     00B0: AD D2 14 FF F1 06 02 BB   64 7B 22 96 DA 8B E9 B6  ........d.".....
#     00C0: 29 53 B8 2E E5 47 C7 95   13 EE E3 27 91 43 22 2E  )S...G.....'.C".
#     00D0: 86 1E DA D0 09 79 1E 47   9F 69 11 67 7D 91 29 90  .....y.G.i.g..).
#     00E0: D9 BC 18 3F CE 2F D7 BE   11 50 F4 B1 54 AE BC 2A  ...?./...P..T..*
#     00F0: 1A 9C 2A 3A 6E 83 11 40   55 C4 C3 B6 82 A2 86 0D  ..*:n..@U.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.894 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE 5D F6 35 D6 BD CB 69   F8 53 C7 2A 44 2B 92 6A  .].5...i.S.*D+.j
#     0010: 22 F6 D2 43 61 81 93 4C   CA DC 03 89 15 8E 18 B9  "..Ca..L........
#     0020: 29 1A 8F A4 32 EC 74 68   FF 52 12 2B DE D8 DE 2E  )...2.th.R.+....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.897 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:21.897 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.898 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:21.898 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.898 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:21.898 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:21.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.899 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.903 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 57 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:56.000 UTC",
#       "not  after"         : "2023-12-24 01:02:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 F4 EF 5A 63 9B 1F 16   36 84 B5 C3 1F EB 28 26  ...Zc...6.....(&
#           0010: 9F 9E AC 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 76 BE D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:50.000 UTC",
#       "not  after"         : "2023-12-24 01:02:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#           0010: 6C B8 C2 13                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.929 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 C9 BF 0F 63 88 69 70   69 62 4D 88 3B 65 81 3A  `...c.ipibM.;e.:
#     0010: 8D C7 82 72 C0 55 78 30   45 53 3E F9 B6 2C 12 61  ...r.Ux0ES>..,.a
#     0020: D6 DC D6 4D 13 57 8C 07   37 41 AB FE EB 8D 8F 22  ...M.W..7A....."
#     0030: B9 E6 14 12 24 09 C4 B4   2D CA B4 71 3D 31 17 B2  ....$...-..q=1..
#     0040: 40 14 47 F0 FE F1 D3 F1   41 0D A9 5C 9B C0 2E A5  @.G.....A..\....
#     0050: 48 51 C6 49 99 D0 BD 70   12 8E A1 F9 1B 2E 37 85  HQ.I...p......7.
#     0060: 2D D9 7B 04 E7 41 77 AF   3C A0 90 2C 35 C5 8F C8  -....Aw.<..,5...
#     0070: 78 E7 B3 17 AC 24 C0 C8   B9 58 1F 6D 0F B3 2C B5  x....$...X.m..,.
#     0080: E1 10 BA E2 41 62 06 4B   60 A8 65 D7 8D 5C 3A F6  ....Ab.K`.e..\:.
#     0090: F4 67 D5 56 FE 5E B9 9A   F4 4F 0B CC 1B A6 B2 15  .g.V.^...O......
#     00A0: A9 7B 4F C2 F4 76 BD A5   B5 49 D9 28 88 08 C8 F5  ..O..v...I.(....
#     00B0: 7F 21 43 16 C7 77 74 95   D7 79 B0 97 58 39 EB 54  .!C..wt..y..X9.T
#     00C0: D0 E8 0B FE 36 D8 D6 CB   FC BA 5C 0E 8C FD A0 6C  ....6.....\....l
#     00D0: 86 E3 06 CB 13 60 11 D7   AF B2 2A DA 07 03 0F 37  .....`....*....7
#     00E0: DB 9A 82 FA C4 7B 85 69   8C 6D 62 94 A7 82 29 D1  .......i.mb...).
#     00F0: 53 93 AE D8 BC 22 32 55   F3 65 23 68 26 C2 5F A4  S...."2U.e#h&._.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.931 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 29 E4 A3 15 0F DA 8F C3   63 8B 4D 74 76 55 BA 4F  ).......c.MtvU.O
#     0010: 2E A9 FB B5 CE 85 22 E7   7A AD 0E 17 B8 91 D4 A4  ......".z.......
#     0020: 30 45 03 60 6F 13 4A EC   2B B8 58 63 E4 BB 36 CA  0E.`o.J.+.Xc..6.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.932 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:21.985 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FB E5 41 31 2D 85 BC 70 68 E3 2C 67 69 62 8E 6A 6E B5 FD D9 A7 9B 74 D3 D6 0E 6A 2F 36 87 D0 A8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 01:03:22.258 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 01:03:22.259 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-25 01:03:23.213; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-25 01:03:23.219; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-25 01:03:23.599; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 01:03:23.602; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-25 01:03:23.603; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-5GANd8/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:23.635 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D 57 48",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:56.000 UTC",
#     "not  after"         : "2023-12-24 01:02:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D7 F4 EF 5A 63 9B 1F 16   36 84 B5 C3 1F EB 28 26  ...Zc...6.....(&
#         0010: 9F 9E AC 3B                                        ...;
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:23.640 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "65 22 4E D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:48.000 UTC",
#     "not  after"         : "2023-12-24 01:02:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:23.655 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:24.012 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:24.019 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:24.019 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:24.019 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:24.175 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.176 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:24.178 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:24.178 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.185 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.197 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.197 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.197 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:24.201 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "87 0B 25 63 65 51 02 09 4A 7F 99 82 3E F2 42 20 B3 41 08 AB B0 A7 EB 1D 2A 51 29 EB 39 EF 5F AF",
#   "session id"          : "D0 F6 A7 96 7E CB 6A 40 9C D9 DB EB CD 5B 8C C8 99 F2 91 39 1B DD 58 78 28 2C AB BA D9 A4 4F AB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 12 96 52 98 64 E8 4F CB   D1 47 FE EB D6 3B 9C 92  ..R.d.O..G...;..
#             0010: 2E 30 47 F2 EC 53 CA 1B   EF 13 38 39 48 07 2E 2E  .0G..S....89H...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.322 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "23 41 CF BC 8C 6E F0 F0 F4 96 22 47 FB 6A DE 17 FD 62 CE 92 FA 35 16 9E 1A 82 AB F2 68 D3 E4 BE",
#   "session id"          : "D0 F6 A7 96 7E CB 6A 40 9C D9 DB EB CD 5B 8C C8 99 F2 91 39 1B DD 58 78 28 2C AB BA D9 A4 4F AB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0C 81 7B 23 62 6C BD 6E   99 32 D9 C3 D4 3B F3 DF  ...#bl.n.2...;..
#           0010: 14 7A C9 E3 6D 13 77 E1   D6 EA 1E 76 59 31 24 18  .z..m.w....vY1$.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.323 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.325 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.327 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.327 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.327 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.328 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.329 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.337 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.338 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.340 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.343 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.344 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.344 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.344 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.344 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.344 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.345 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.345 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.345 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.346 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.347 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.347 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.347 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.348 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.349 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.351 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "35 75 28 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:53.000 UTC",
#       "not  after"         : "2023-12-24 01:02:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 10 EC 79 47 8E 1F 16   96 E7 51 93 A7 5F FD 58  ...yG.....Q.._.X
#           0010: 25 96 75 91                                        %.u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.352 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.454 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 76 BE D2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-25 01:02:50.000 UTC",
#     "not  after"         : "2023-12-24 01:02:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#         0010: 6C B8 C2 13                                        l...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#         0010: 45 39 EE AA                                        E9..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.458 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 23 7E 44 E8 B8 10 69   EE 67 A5 25 66 21 3D 1D  5#.D...i.g.%f!=.
#     0010: 04 40 9C 4D 33 D5 F7 16   52 50 90 63 50 39 3B B1  .@.M3...RP.cP9;.
#     0020: 39 CC 19 C4 11 CC 40 75   AF 54 AD A9 82 91 7E 20  9.....@u.T.....
#     0030: 34 24 71 64 68 4A 59 26   47 E1 97 B5 5A 61 2C 5E  4$qdhJY&G...Za,^
#     0040: D7 0E 6C CC BB F0 98 63   B3 23 E8 26 13 B3 04 AD  ..l....c.#.&....
#     0050: 84 BC 70 D5 92 60 39 CA   22 F5 12 F1 F1 BE 09 E6  ..p..`9.".......
#     0060: F2 6F 86 7F 51 BA 73 67   A0 19 48 80 70 6A 31 0E  .o..Q.sg..H.pj1.
#     0070: AA 5E 27 6E 28 F8 21 D4   BA 38 95 83 FF 74 B6 CA  .^'n(.!..8...t..
#     0080: E3 DD 07 E1 FF 9B 3E BE   B8 18 09 9E 03 62 B4 F4  ......>......b..
#     0090: 11 03 9C 7C 6A CA 85 9C   FE 79 5F 0A 53 BC AA FF  ....j....y_.S...
#     00A0: B8 90 2B E7 F5 77 DC 74   7C 19 39 C7 6E 29 DE C2  ..+..w.t..9.n)..
#     00B0: DE EC 15 1A 6D 23 01 4F   C9 88 7B FA CF 9C 18 9C  ....m#.O........
#     00C0: 45 BC 2A AE 00 82 3F 4F   B2 BF D9 92 B0 BB 6F 37  E.*...?O......o7
#     00D0: 75 3B 83 D7 0A B0 54 D6   91 E4 A8 23 D3 1F 94 D4  u;....T....#....
#     00E0: 0F 88 ED A0 4C EE 38 46   51 5E FF 71 3C 1C F9 28  ....L.8FQ^.q<..(
#     00F0: 6D DB D1 47 C0 88 5D D3   CA 86 A2 84 3F 56 10 E6  m..G..].....?V..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.460 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE 52 71 DF 1C 50 CD 3E   9A D6 8C 5F 0C 05 57 1A  .Rq..P.>..._..W.
#     0010: F1 5D 30 C8 96 A1 34 E0   65 6C CE 00 A2 E0 D1 E9  .]0...4.el......
#     0020: 83 4F A7 CA C4 3E DD 23   5B 49 C4 6F 00 9F 30 78  .O...>.#[I.o..0x
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:24.463 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.463 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:24.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-25 01:03:24.464 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:24.464 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.465 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.467 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D 57 48",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:56.000 UTC",
#       "not  after"         : "2023-12-24 01:02:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D7 F4 EF 5A 63 9B 1F 16   36 84 B5 C3 1F EB 28 26  ...Zc...6.....(&
#           0010: 9F 9E AC 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 76 BE D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:50.000 UTC",
#       "not  after"         : "2023-12-24 01:02:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#           0010: 6C B8 C2 13                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.492 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 97 C6 30 08 BB CB 94   3E 3B 28 32 FB 19 51 B1  x..0....>;(2..Q.
#     0010: 43 E0 2E 2A C6 83 40 5A   3D 6C A5 CA 68 9F D4 26  C..*..@Z=l..h..&
#     0020: C4 4D DC 37 9C 06 46 CB   2D 63 D2 5A E6 C6 CC 62  .M.7..F.-c.Z...b
#     0030: 3E C9 96 75 A9 F4 4F F0   56 FB 12 C7 CF E9 92 BF  >..u..O.V.......
#     0040: 69 64 34 24 41 36 B8 EE   95 47 C0 21 34 55 96 76  id4$A6...G.!4U.v
#     0050: D0 AD 84 BF E1 9C CA 32   4E 36 75 CF E4 3B 9D D2  .......2N6u..;..
#     0060: 2C 76 48 CF 42 70 56 D6   72 ED EA 0C 41 EC 07 C3  ,vH.BpV.r...A...
#     0070: AE 6D 6A 72 44 4A 9D CA   56 4C F2 7A C4 BF 04 8A  .mjrDJ..VL.z....
#     0080: 7A B2 AF A4 91 6B A5 A7   EC 50 61 D9 78 7B 21 B2  z....k...Pa.x.!.
#     0090: BB D5 E1 6F 64 9C DE DA   39 2A F4 E4 7A 68 D7 3E  ...od...9*..zh.>
#     00A0: 03 3F FA AF 69 6A FF D1   46 1D 85 65 D6 6A CD D8  .?..ij..F..e.j..
#     00B0: 40 B6 07 4C CB 43 F1 FB   A2 B6 BB BB 56 FD B5 20  @..L.C......V..
#     00C0: D1 C7 A8 6C 59 86 C5 20   57 7C 0C B2 9F 9A BB 5B  ...lY.. W......[
#     00D0: 73 11 3A 37 9C 1F FB 20   2B B3 B6 F2 AE 55 9F 6D  s.:7... +....U.m
#     00E0: D4 46 33 9C E4 EF 50 F8   6D 42 D1 13 2E CF 24 B1  .F3...P.mB....$.
#     00F0: 3F 13 E5 90 E2 D5 52 DF   64 0E 56 AB 96 7F 4F 46  ?.....R.d.V...OF
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.493 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 78 67 8F 53 2C 48 BF   1F 64 00 F0 02 C3 F3 3A  pxg.S,H..d.....:
#     0010: 75 98 46 56 45 54 D9 7A   88 C2 33 6B 4C D2 B5 BC  u.FVET.z..3kL...
#     0020: 91 C3 EE 7A 9F 88 CE 81   4A 40 C7 27 2D 5A 87 44  ...z....J@.'-Z.D
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.494 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:24.546 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "75 6D D5 4D FC 14 18 6B 56 C7 DA FB A6 86 31 D3 F4 4E A7 DD 01 19 76 ED 80 DA 8A 3E 24 5F A0 25",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-25 01:03:24.852 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-25 01:03:24.853 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-25 01:03:36.568; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:36.921 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 76 BE D2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:50.000 UTC",
#       "not  after"         : "2023-12-24 01:02:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#           0010: 6C B8 C2 13                                        l...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B1 A5 CC 35 1B 9F 40 32   22 3F 87 9A 59 DE 10 23  ...5..@2"?..Y..#
#           0010: 45 39 EE AA                                        E9..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "65 22 4E D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-25 01:02:48.000 UTC",
#       "not  after"         : "2023-12-24 01:02:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 DF D6 B6 D6 07 BD E4   D3 8D 37 FB 20 74 BC C2  ..........7. t..
#           0010: 6C B8 C2 13                                        l...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-25 01:03:36.939 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:37.345 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:37.346 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:37.346 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:03:37.346 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:37.439 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.439 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:37.441 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-25 01:03:37.441 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.447 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.459 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.459 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.459 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-25 01:03:37.461 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "CB E0 76 78 97 7B E7 1A 82 3B E4 71 06 7D B1 88 ED 0F 7A CA E8 65 E2 08 18 D7 55 8C 1D 2F 05 0C",
#     "session id"          : "65 2F 9A 62 22 DA 1F 9B 89 6A EB 38 79 01 BF D9 10 03 ED 46 C6 69 51 F5 D8 6C DF 83 F4 39 08 88",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 8F 01 6A 55 A9 0A 64 4F   07 2A DC 36 5A 71 E1 72  ..jU..dO.*.6Zq.r
#               0010: C3 AF 9E 42 87 63 C4 C7   53 01 B2 DD ED CB 36 62  ...B.c..S.....6b
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.482 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CE 91 AD AC A0 65 86 19 A7 DF 15 F2 DA E0 7E B9 0F 7D C1 08 70 F7 74 28 2F 73 4B F8 5F 3E 4E 97",
#     "session id"          : "65 2F 9A 62 22 DA 1F 9B 89 6A EB 38 79 01 BF D9 10 03 ED 46 C6 69 51 F5 D8 6C DF 83 F4 39 08 88",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 67 9E 84 42 8C 2A 01 F3   83 3E 13 60 F7 1F D1 90  g..B.*...>.`....
#             0010: 0D 48 FF B2 91 B2 F6 1D   BD F7 03 D9 41 B4 18 34  .H..........A..4
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.482 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.483 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.485 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.485 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.488 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.488 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.488 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.489 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.490 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.498 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.500 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.501 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.505 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.505 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.505 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.505 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.505 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.506 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:37.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:03:37.506 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-25 01:03:37.508 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_

[...truncated too long message...]

.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-25 01:04:57.569 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:04:57.627 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:04:57.627 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:04:57.628 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-25 01:04:57.628 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:34374/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28425ms
ok 65 stop command for single port in 31797ms
ok 66 status detects locally running solr in 14712ms
ok 67 status does not expose cli parameters to end user in 211ms
ok 68 listing out files in 2173ms
ok 69 copying files around in 6642ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1219ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 15s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m41s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5531 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5531/

All tests passed

Build Log:
[...truncated 1329 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41535/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-24 22:06:01.345; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 22:06:01.350; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-24 22:06:02.546; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-24 22:06:02.583; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22747ms
ok 61 start solr with client truststore and security manager in 24847ms
not ok 62 start solr with mTLS needed in 56697ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MfzU1n/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41535.
#
# Started Solr server on port 41535 (pid=201712). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 41536.
#
# Started Solr server on port 41536 (pid=202122). Happy searching!
#
# INFO  - 2023-09-24 22:07:25.042; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 22:07:25.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 22:07:25.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 22:07:25.424; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 22:07:25.425; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:25.458 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 A1 27 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:07:01.000 UTC",
#     "not  after"         : "2023-12-23 22:07:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 46 C1 09 1C 1C 56 35   10 9D 0F 06 0C F4 4D 61  .F....V5......Ma
#         0010: E6 26 3F B2                                        .&?.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:25.462 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 44 07 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:53.000 UTC",
#     "not  after"         : "2023-12-23 22:06:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:25.477 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:25.829 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:25.830 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:25.830 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:25.831 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:25.977 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:25.977 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:25.979 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:25.979 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:25.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:25.996 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:25.997 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:25.997 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:26.000 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "46 A8 CD 71 1E 88 D4 23 65 D6 D6 02 23 A3 86 E0 59 C6 43 54 9F 8E 33 1D DE 14 8F 4C D0 1C D0 13",
#   "session id"          : "CC 4C 9A 73 9B 23 E3 B2 04 32 14 A6 6E EC 18 09 22 FB 6C F0 46 81 73 40 7D 58 51 D4 CE B1 79 F6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 21 76 88 EF 1D 6B 61 AE   18 3D FE 67 B4 6F E4 CC  !v...ka..=.g.o..
#             0010: 83 6D 55 64 49 EF 02 B5   75 D0 DD 4D 9D 72 4B 2F  .mUdI...u..M.rK/
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.179 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8B E1 A9 A7 12 5F 2C E5 D3 5E 10 41 42 BF CC 50 F8 1D AE AE A7 98 B9 73 82 B4 E6 98 9C C3 66 EF",
#   "session id"          : "CC 4C 9A 73 9B 23 E3 B2 04 32 14 A6 6E EC 18 09 22 FB 6C F0 46 81 73 40 7D 58 51 D4 CE B1 79 F6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E0 96 21 9E 8E EB 81 DA   D7 5E 48 FD 2A 12 0E 6A  ..!......^H.*..j
#           0010: C0 89 36 10 CA 48 D6 85   41 91 F5 2E B0 9E 5B 51  ..6..H..A.....[Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.179 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.180 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.182 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.183 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.183 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.184 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.184 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.185 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.193 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.194 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.195 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.199 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.199 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.199 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.200 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.202 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.202 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.203 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.203 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.204 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.205 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.205 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.209 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 D6 84 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:57.000 UTC",
#       "not  after"         : "2023-12-23 22:06:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 53 67 90 3B 0D 6C 14 61   5C 43 26 6C C4 78 C4 54  Sg.;.l.a\C&l.x.T
#           0010: F7 87 5F 05                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.209 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.316 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.320 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1A B9 AC 10 86 B4 08 F1   1B 4D 0D EF 47 5B 7D B4  .........M..G[..
#     0010: BA 18 41 BF A4 5F 6E 7A   C4 AB 18 F9 AC 74 9F 55  ..A.._nz.....t.U
#     0020: 76 FC 69 7B 8C B9 83 35   9A 00 BF 05 43 A5 87 BA  v.i....5....C...
#     0030: A1 2C 39 D7 88 2F 18 E4   65 39 E8 0D 68 2C 3B AD  .,9../..e9..h,;.
#     0040: F9 65 F8 D9 12 A9 B3 5B   03 30 60 F9 9A 25 78 5D  .e.....[.0`..%x]
#     0050: 40 1E 05 85 AB 31 5C 70   1E 09 FA 6F 4C A3 A9 50  @....1\p...oL..P
#     0060: D9 98 D6 CB D4 1A 18 AF   1E EA C1 D0 BA DC 1C 67  ...............g
#     0070: BD C1 5B EC C8 FB C9 04   D1 9C A1 56 0B CD 47 99  ..[........V..G.
#     0080: C2 34 BC E7 68 9B 91 73   6D DA 52 D6 4A D1 D6 A7  .4..h..sm.R.J...
#     0090: 16 D7 3F E2 4C D5 CC DE   1A 87 DB A9 21 CB E2 51  ..?.L.......!..Q
#     00A0: 8B 82 0A 97 72 05 05 DE   B8 75 63 86 EB 16 1E 6A  ....r....uc....j
#     00B0: 5A 7A CC DB B1 F2 AA 4D   16 11 F8 81 1D 7B 86 13  Zz.....M........
#     00C0: A2 E9 24 1A BA 8F 8B B7   68 E3 EA DD 79 EB 18 CE  ..$.....h...y...
#     00D0: CC 94 C4 F8 B5 1D 70 53   D3 06 E7 C4 9D 14 20 02  ......pS...... .
#     00E0: 9C 26 DD 8A 2A 0D 40 8E   47 6E 9E 05 D1 CB 71 70  .&..*.@.Gn....qp
#     00F0: C9 1A 78 B0 7C 73 CA 39   1D 6F 65 22 E8 95 F3 E7  ..x..s.9.oe"....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.321 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 57 10 38 F6 2F A0 D6 16   0D F6 58 49 FB C3 46 F4  W.8./.....XI..F.
#     0010: 3A 63 6F 5A 35 21 E6 BE   12 43 5A FA 84 BE BF C8  :coZ5!...CZ.....
#     0020: 9B 34 9E 2F 92 EA 54 A0   87 B0 FF 86 21 17 B3 16  .4./..T.....!...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.323 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:26.324 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.325 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:26.325 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.325 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:26.325 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:26.325 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.326 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.328 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 A1 27 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:07:01.000 UTC",
#       "not  after"         : "2023-12-23 22:07:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 46 C1 09 1C 1C 56 35   10 9D 0F 06 0C F4 4D 61  .F....V5......Ma
#           0010: E6 26 3F B2                                        .&?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 3F AF A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:55.000 UTC",
#       "not  after"         : "2023-12-23 22:06:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#           0010: 69 7E 31 27                                        i.1'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.353 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 90 B4 BA 89 5F 13 2A 15   29 58 D6 63 DE 81 C5 71  ...._.*.)X.c...q
#     0010: 9D 55 09 7D C4 89 2E 7E   3F EA 94 54 4A FF E1 EB  .U......?..TJ...
#     0020: 1D 02 BF 65 40 8D BC B7   56 32 DC 2F 4E FC 54 15  ...e@...V2./N.T.
#     0030: 7F C2 A7 84 18 86 D1 84   0B A4 77 EA C9 E6 6B BC  ..........w...k.
#     0040: 2B E9 FB E8 7C 12 49 D9   70 A2 E1 39 DE 77 DE E4  +.....I.p..9.w..
#     0050: 05 68 9A 29 62 66 25 50   32 64 09 43 F6 20 16 BC  .h.)bf%P2d.C. ..
#     0060: 3C E0 68 E4 C1 01 EB 1B   D0 83 FA 93 BB A3 1C 6E  <.h............n
#     0070: 71 89 AD 8A 9D 7F 33 E4   63 10 4D A1 E0 60 4D 6A  q.....3.c.M..`Mj
#     0080: B1 A2 DD BE A6 1B 68 85   B8 53 8A 00 CD 9A 9E 92  ......h..S......
#     0090: 32 C1 A6 31 9C 8A E7 2D   55 D2 E6 CD D8 56 2E 72  2..1...-U....V.r
#     00A0: 5A 37 7F EF FA 9D 43 4F   76 81 DC 3E 2F 4A 59 2C  Z7....COv..>/JY,
#     00B0: 70 3F B2 D3 D8 D9 C8 86   DA D3 01 52 03 17 E9 51  p?.........R...Q
#     00C0: FF 0F 37 05 38 D6 F5 40   27 61 99 E6 19 71 52 7D  ..7.8..@'a...qR.
#     00D0: B1 93 02 62 1E 21 8B 0F   48 C9 50 34 EF DF FF F7  ...b.!..H.P4....
#     00E0: 4F B1 8C A4 FD 84 66 80   A6 83 C6 DE DE 0B 33 B6  O.....f.......3.
#     00F0: 39 58 98 3C 36 1D D5 55   8E 89 7B 15 1A B8 08 D3  9X.<6..U........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.354 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5F F6 C2 D3 5C BE 0A 3D   CE D2 26 5B D3 61 4B 21  _...\..=..&[.aK!
#     0010: E9 63 45 19 A5 84 96 2E   18 12 E3 AA D1 9B 10 71  .cE............q
#     0020: F2 A5 28 65 3B 02 8E 33   7E C7 92 55 AB 57 5B 6B  ..(e;..3...U.W[k
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.355 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:26.407 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C6 2E 4A 0C 88 EF 75 10 05 83 CC DD D3 B6 E1 F0 64 C5 DC EC 46 47 C6 AC 3B 3A C6 B9 73 04 52 6B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 22:07:26.685 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 22:07:26.686 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-24 22:07:27.613; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 22:07:27.618; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 22:07:27.993; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@57abad67(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 22:07:27.996; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77b14724(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 22:07:27.996; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(ca,h=[localhost],a=[],w=[]) for Client@5ef6ae06[provider=null,keyStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MfzU1n/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:28.029 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "19 A1 27 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:07:01.000 UTC",
#     "not  after"         : "2023-12-23 22:07:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A5 46 C1 09 1C 1C 56 35   10 9D 0F 06 0C F4 4D 61  .F....V5......Ma
#         0010: E6 26 3F B2                                        .&?.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:28.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F 44 07 A0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:53.000 UTC",
#     "not  after"         : "2023-12-23 22:06:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:28.047 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:28.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:28.133 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:28.134 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:28.134 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:28.271 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.272 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:28.274 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:28.274 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.280 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.294 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.295 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:28.297 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FD EA C1 7F FD 80 8D 5E F7 9C 52 66 07 7A F1 97 A5 D3 B9 F9 0C 42 C5 2E 07 7E 25 61 FE DD 5C EA",
#   "session id"          : "DF 3F 10 18 13 96 58 63 CA 9F 7E 9A 29 88 CC DF CE E6 08 92 90 7E B5 3D C8 1E 0F A8 D3 B4 8E FD",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD B9 31 11 29 9E 14 7F   3C B4 EC AF CE 5D 09 63  ..1.)...<....].c
#             0010: A9 4F 24 68 E8 AD 02 82   B4 B7 DA 34 36 3F 09 4A  .O$h.......46?.J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.404 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "54 14 00 2A FB 78 BB EA EC 72 CC F0 36 17 7A 53 6B 94 25 33 14 C3 7E 6B D3 41 71 7B 8E EA 08 0E",
#   "session id"          : "DF 3F 10 18 13 96 58 63 CA 9F 7E 9A 29 88 CC DF CE E6 08 92 90 7E B5 3D C8 1E 0F A8 D3 B4 8E FD",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 73 CB F6 A6 86 7B D6 19   67 E3 77 41 A7 E3 96 AF  s.......g.wA....
#           0010: A0 37 FF D8 02 8F 91 8C   C5 17 7F D9 7E 5B F4 75  .7...........[.u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.404 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.404 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.405 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.405 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.405 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.405 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.406 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.406 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.406 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.406 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.407 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.408 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.408 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.408 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.408 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.408 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.416 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.418 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.419 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.422 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.422 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.423 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.425 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.425 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.425 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.425 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.426 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.427 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.427 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.429 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 D6 84 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:57.000 UTC",
#       "not  after"         : "2023-12-23 22:06:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 53 67 90 3B 0D 6C 14 61   5C 43 26 6C C4 78 C4 54  Sg.;.l.a\C&l.x.T
#           0010: F7 87 5F 05                                        .._.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.430 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.527 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 3F AF A5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 22:06:55.000 UTC",
#     "not  after"         : "2023-12-23 22:06:55.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#         0010: 69 7E 31 27                                        i.1'
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#         0010: 97 B8 75 82                                        ..u.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.530 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AD E4 CF 1B F3 49 E8 31   38 ED 43 0D D6 B6 B3 0C  .....I.18.C.....
#     0010: FE 0A FA 42 4A D6 73 9A   A1 CF 58 C7 78 A6 A9 1F  ...BJ.s...X.x...
#     0020: AC A1 16 9C C6 2D 05 EC   CC 14 35 66 CA 93 4A 86  .....-....5f..J.
#     0030: D6 90 B6 4E A7 32 65 7F   7B 29 D2 B3 CB A5 90 87  ...N.2e..)......
#     0040: F0 D9 9C A2 FB AE 95 07   7B 6E 49 16 39 14 AA 87  .........nI.9...
#     0050: 23 4D 05 50 6B B1 C8 6B   55 B2 6D 8C 9E EE E5 24  #M.Pk..kU.m....$
#     0060: AB 7F 0B 81 41 04 74 26   96 25 0B E4 C0 81 F5 24  ....A.t&.%.....$
#     0070: F9 9A 59 72 AA 80 ED 6B   15 BB FE F8 49 8E 3C 22  ..Yr...k....I.<"
#     0080: E5 05 30 4E BC 8C EB 86   17 F4 E7 5F 55 14 B4 ED  ..0N......._U...
#     0090: 3F FA 3E A1 E1 BE 4B 2D   B7 BA 13 62 CE 76 84 EF  ?.>...K-...b.v..
#     00A0: D6 BD 71 5C EA EC C1 2F   83 8B CF 05 25 02 FD AE  ..q\.../....%...
#     00B0: 02 4D C8 F7 21 B0 FD 1A   26 1B 18 3A 32 65 39 12  .M..!...&..:2e9.
#     00C0: 2C 3F D1 53 3D 43 0D A9   12 8C 43 6F CB E8 30 9D  ,?.S=C....Co..0.
#     00D0: 8E 5D BE 34 38 A0 CE 4E   01 D3 2B 34 24 65 23 20  .].48..N..+4$e#
#     00E0: 74 DA 90 6E C4 9C 51 F5   75 EF 31 3C 30 68 31 90  t..n..Q.u.1<0h1.
#     00F0: 14 B3 9D 28 F3 AE DE 3C   3E ED BB 91 79 21 91 87  ...(...<>...y!..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.531 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 AE C6 D1 2D 51 E0 92   26 FF 79 6D C4 76 96 EE  ....-Q..&.ym.v..
#     0010: 9C BE EC CA 2A CD B3 74   B1 A4 41 D9 83 13 73 AE  ....*..t..A...s.
#     0020: BD 06 9D 9D 79 28 F2 47   E9 50 0F CF 85 59 D9 31  ....y(.G.P...Y.1
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.533 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:28.534 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.534 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:28.535 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.535 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 22:07:28.535 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:28.535 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.535 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.538 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 A1 27 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:07:01.000 UTC",
#       "not  after"         : "2023-12-23 22:07:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A5 46 C1 09 1C 1C 56 35   10 9D 0F 06 0C F4 4D 61  .F....V5......Ma
#           0010: E6 26 3F B2                                        .&?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 3F AF A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:55.000 UTC",
#       "not  after"         : "2023-12-23 22:06:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#           0010: 69 7E 31 27                                        i.1'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.563 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D 12 23 DE A0 35 F5 AF   83 C8 06 4D 14 4F CF 19  -.#..5.....M.O..
#     0010: E9 B9 36 69 6E 5C 09 1B   2B E4 D0 4C D7 08 43 F9  ..6in\..+..L..C.
#     0020: 5D 7E A3 CE 97 F4 25 09   7C 30 5E C4 DD 0D AD BB  ].....%..0^.....
#     0030: CC AD EB 84 31 F1 31 9F   F3 97 40 06 49 E6 99 63  ....1.1...@.I..c
#     0040: E4 59 A7 53 03 9C E3 A7   74 95 D8 43 60 24 47 56  .Y.S....t..C`$GV
#     0050: 27 5F E6 0D 5B 1F 2B 2E   47 22 C2 BB 7E 55 5B D0  '_..[.+.G"...U[.
#     0060: D6 60 B3 42 D7 01 9B 96   E0 2A 3B BB 0F 1D C9 01  .`.B.....*;.....
#     0070: 86 E6 52 21 5F 12 3D 87   77 0F 3C F6 3F AE F0 A0  ..R!_.=.w.<.?...
#     0080: FA 91 CF DC D2 68 8F 3D   B7 2A 2D 33 2B 22 A7 8C  .....h.=.*-3+"..
#     0090: B4 3E BB CD 33 07 D4 1E   EC 76 68 67 F5 58 7C F7  .>..3....vhg.X..
#     00A0: BC A7 56 0D A5 C8 26 1D   E4 AE E4 5C 8A CC 8C B3  ..V...&....\....
#     00B0: F6 A9 6F 07 37 38 48 8E   F4 9A 3F 04 75 BF 61 75  ..o.78H...?.u.au
#     00C0: 6B 27 99 CE B2 FF CD 30   B4 45 F5 F2 F6 5B 4D 6C  k'.....0.E...[Ml
#     00D0: C1 AC 60 D7 8A 38 5F 77   C9 11 C1 78 5E 69 C8 74  ..`..8_w...x^i.t
#     00E0: C6 5E 2A 12 A3 F8 7A 3E   1C 48 9E 2D 6B 47 D0 6D  .^*...z>.H.-kG.m
#     00F0: 88 D1 F9 03 52 11 70 04   55 E4 19 B8 ED E7 2C 8C  ....R.p.U.....,.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.564 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 83 04 B4 83 66 4D FF 2C   9E D9 6A 30 86 38 77 BD  ....fM.,..j0.8w.
#     0010: CF 59 C7 0E EE 44 01 BB   AB C5 6E 59 59 44 C8 D8  .Y...D....nYYD..
#     0020: 81 FA 14 F3 3A 64 0E F1   7A 8D 42 46 13 FB 5D 4B  ....:d..z.BF..]K
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.565 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:28.611 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "32 8F 0B 45 A7 81 3F C1 30 3D 5A F7 62 7B D1 68 91 78 D0 27 B7 9E BD 5D 70 80 D2 2A D1 9B 12 DF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 22:07:28.881 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 22:07:28.882 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-24 22:07:39.982; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:40.292 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 3F AF A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:55.000 UTC",
#       "not  after"         : "2023-12-23 22:06:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#           0010: 69 7E 31 27                                        i.1'
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 35 3E 41 6D DC A8 96 0F   DE 1E 70 E3 9B 7A 11 F3  5>Am......p..z..
#           0010: 97 B8 75 82                                        ..u.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F 44 07 A0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 22:06:53.000 UTC",
#       "not  after"         : "2023-12-23 22:06:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 27 FE 08 37 42 20 53 29   52 12 7B A3 04 13 6E D7  '..7B S)R.....n.
#           0010: 69 7E 31 27                                        i.1'
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-24 22:07:40.309 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:40.720 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:40.721 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:40.721 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:07:40.722 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:40.797 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.797 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:40.799 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 22:07:40.799 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.815 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 22:07:40.817 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C2 10 59 F3 81 F9 9E E8 69 4A 32 02 6A 32 85 85 D6 43 EC A5 96 7C 60 78 98 69 C6 4D B0 B9 ED 37",
#     "session id"          : "7F 3C 09 85 A7 5D 0A 9A 0E 82 38 F6 ED B6 08 42 9D 1A B6 B2 75 7F D0 26 19 7C 98 6B 09 7F 09 A8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 60 85 A2 72 57 24 8C C1   26 AA 6E 74 D6 A8 22 7E  `..rW$..&.nt..".
#               0010: 8B 75 62 A8 43 F3 77 1C   8F DA D1 55 F3 85 81 1A  .ub.C.w....U....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.839 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "47 B1 8F 03 5D 22 74 21 E2 25 A9 50 0F BB BD 6E F9 40 58 24 6F ED B4 69 9D 14 B1 E5 47 AB 96 A7",
#     "session id"          : "7F 3C 09 85 A7 5D 0A 9A 0E 82 38 F6 ED B6 08 42 9D 1A B6 B2 75 7F D0 26 19 7C 98 6B 09 7F 09 A8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: BC 86 29 20 69 59 D0 DA   10 EE CB EF 0A 4B 0E 4D  ..) iY.......K.M
#             0010: E5 56 F4 4F 3D 8C AA 08   C0 F0 3B C6 D2 52 3B 4B  .V.O=.....;..R;K
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.839 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.839 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.840 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.840 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.841 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.842 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.844 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.844 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.844 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:40.845 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.846 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.853 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.854 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.855 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.859 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.859 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.859 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:07:40.860 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 22:07:40.862 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha5

[...truncated too long message...]

onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 22:08:58.406 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:08:58.452 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:08:58.453 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:08:58.453 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 22:08:58.453 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41536/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 27976ms
ok 65 stop command for single port in 31074ms
ok 66 status detects locally running solr in 14282ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2145ms
ok 69 copying files around in 6490ms
ok 70 upconfig in 2579ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1222ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1224ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 8s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m34.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5530 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5530/

1 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:40843_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:40843_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>
	at __randomizedtesting.SeedInfo.seed([E83E500883FC035B:C6558432B69FD22F]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4528 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44425/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-24 19:42:58.368; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 19:42:58.374; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-24 19:42:59.272; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-24 19:42:59.311; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22840ms
ok 61 start solr with client truststore and security manager in 24842ms
not ok 62 start solr with mTLS needed in 61320ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2qlKMg/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44425.
#
# Started Solr server on port 44425 (pid=199567). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 44426.
#
# Started Solr server on port 44426 (pid=199990). Happy searching!
#
# INFO  - 2023-09-24 19:44:22.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 19:44:22.154; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 19:44:22.519; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5fe1ce85(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 19:44:22.522; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5ef6ae06(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 19:44:22.523; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(ca,h=[localhost],a=[],w=[]) for Client@2dca0d64[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:22.556 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 77 30 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:58.000 UTC",
#     "not  after"         : "2023-12-23 19:43:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 3C 8E 5E C9 3C 40 8F   BE 28 A1 D3 82 81 28 AF  .<.^.<@..(....(.
#         0010: D7 6F B3 DD                                        .o..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:22.561 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 2A A5 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:50.000 UTC",
#     "not  after"         : "2023-12-23 19:43:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:22.577 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:22.907 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:22.907 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:22.908 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:22.908 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:23.073 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.074 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:23.076 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:23.076 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.082 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.094 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.094 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.094 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:23.098 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "33 19 79 0F A1 2B 8C 71 4D 51 0A 32 BF 05 C3 EA 1B C4 59 64 1C 83 25 9D EF 9C 0F F1 A6 E4 FC 94",
#   "session id"          : "47 EA 7D 6A 3D C5 E8 59 E6 57 F5 DF B0 88 5D 4E B4 CC 34 C5 08 41 D4 95 81 C9 96 C4 6B 88 B3 DE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 53 8E 76 47 CA 11 84 FF   50 B0 A3 47 EB 17 85 BF  S.vG....P..G....
#             0010: 07 2A 70 80 55 41 78 93   1D 53 B5 08 D8 68 BB 0F  .*p.UAx..S...h..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.242 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FC 9C 76 7F 64 70 A7 B6 5A 6E 8A 79 8F D4 10 DC 09 7A 28 16 78 D5 15 AC 44 70 C7 78 D9 E1 B7 0B",
#   "session id"          : "47 EA 7D 6A 3D C5 E8 59 E6 57 F5 DF B0 88 5D 4E B4 CC 34 C5 08 41 D4 95 81 C9 96 C4 6B 88 B3 DE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 66 C8 56 50 DA 3E 16 1B   08 73 EF 70 FD 76 4A C3  f.VP.>...s.p.vJ.
#           0010: 5E 41 BB 96 A8 F5 24 0A   F2 E4 03 69 E8 BE 9E 7C  ^A....$....i....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.243 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.243 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.244 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.244 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.244 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.245 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.245 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.247 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.248 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.249 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.250 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.257 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.259 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.260 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.264 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.264 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.264 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.265 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.265 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.265 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.265 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.265 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.268 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.269 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.270 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.271 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.275 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 67 AC 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:54.000 UTC",
#       "not  after"         : "2023-12-23 19:43:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 DB D5 25 BB F0 EA CC   56 9D 41 7B CE 23 A1 BB  u..%....V.A..#..
#           0010: F4 90 50 A4                                        ..P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.275 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.358 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.362 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 1F 86 3B E0 9D B2 9C   2D 4D A1 E2 76 1A B0 12  ...;....-M..v...
#     0010: AC DE ED 2F 8D F0 04 79   2B AB D7 26 46 43 A0 52  .../...y+..&FC.R
#     0020: 6C 9C 2D 62 DA 24 ED E4   2D 9D 41 3B 4B 82 EE 8F  l.-b.$..-.A;K...
#     0030: C2 17 BC E0 BE 4F 78 93   9A C1 38 34 10 54 73 4D  .....Ox...84.TsM
#     0040: FB 64 8F B5 D7 8A C8 D3   3D 3A 22 EE 5B D4 10 54  .d......=:".[..T
#     0050: 2C 9A 67 0B 31 01 FC 56   AC CF 02 78 34 58 4E 49  ,.g.1..V...x4XNI
#     0060: 3C E8 B8 8E FD DB E4 99   5C C3 57 62 E7 2F E0 5E  <.......\.Wb./.^
#     0070: 16 9C 33 60 BE A3 22 18   11 18 CC C5 C5 AF 12 F3  ..3`..".........
#     0080: F4 6E B7 08 2C 4D 24 8E   17 70 24 B9 71 EB 0A B4  .n..,M$..p$.q...
#     0090: 59 DA DC 12 FE A3 D3 39   6E 3F C1 98 B2 AF 72 E1  Y......9n?....r.
#     00A0: 81 CD 81 01 A2 C1 AC 7D   7F AC 8E E2 84 50 E9 15  .............P..
#     00B0: EF 0F 4C CC 04 9E 81 C1   72 39 44 C5 ED 1D FB CA  ..L.....r9D.....
#     00C0: 76 C5 74 42 F4 30 CD 75   DC 48 29 15 36 9C 7E E5  v.tB.0.u.H).6...
#     00D0: E3 E5 83 B1 15 5C 69 81   03 84 A9 D9 11 EA 3F 9B  .....\i.......?.
#     00E0: 56 98 01 E9 DD 49 64 E6   25 E7 57 C5 A1 CF 7A C7  V....Id.%.W...z.
#     00F0: C1 89 31 96 10 5C 4C 71   65 CC 96 A1 66 CB E5 30  ..1..\Lqe...f..0
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.364 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 92 44 B9 B0 40 87 BD 08   54 7C 88 26 DF E4 61 C3  .D..@...T..&..a.
#     0010: F6 7D 2C 14 4B 38 C3 95   49 70 5D 83 F8 B1 D1 D6  ..,.K8..Ip].....
#     0020: 4A 57 65 01 DD DB E4 C0   74 A8 91 67 09 72 0B 94  JWe.....t..g.r..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.366 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:23.367 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.367 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:23.367 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.368 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:23.368 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:23.368 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.368 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.371 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 77 30 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:58.000 UTC",
#       "not  after"         : "2023-12-23 19:43:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 3C 8E 5E C9 3C 40 8F   BE 28 A1 D3 82 81 28 AF  .<.^.<@..(....(.
#           0010: D7 6F B3 DD                                        .o..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 22 EE 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:51.000 UTC",
#       "not  after"         : "2023-12-23 19:43:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#           0010: 9F 25 1C CF                                        .%..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.398 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 85 7F 88 F5 4B DC 1F D9   8C 21 A1 B5 68 59 92 6D  ....K....!..hY.m
#     0010: 0F 64 EE 72 C5 B5 68 4E   08 13 96 44 81 83 14 F6  .d.r..hN...D....
#     0020: 1F 80 C8 20 42 E0 0C 9A   00 A2 D8 7F AB CA 57 7D  ... B.........W.
#     0030: 20 76 C2 58 CB C6 06 F1   C7 DC 72 F0 1E 5C 19 E0   v.X......r..\..
#     0040: F3 5C 03 34 6F 8A 72 1D   BF F6 4E 7D 06 E4 AF 88  .\.4o.r...N.....
#     0050: DB 9B 35 36 27 56 89 60   E5 6E 60 34 16 D4 22 FE  ..56'V.`.n`4..".
#     0060: 8A E1 9C B8 BE 36 F2 51   17 42 A1 92 1F 54 13 E6  .....6.Q.B...T..
#     0070: C3 CE F6 26 E9 C4 B3 4C   24 8F B0 F4 D7 01 7A 1F  ...&...L$.....z.
#     0080: 08 CB 80 30 99 8D 8E 58   A4 61 B7 FE E2 38 10 B4  ...0...X.a...8..
#     0090: E4 E4 1C C7 D6 BB 17 E6   62 02 EC 99 F7 16 26 C5  ........b.....&.
#     00A0: C2 57 02 02 09 F8 B8 82   DE 89 27 93 EF 9B 7A 0D  .W........'...z.
#     00B0: 71 CF F7 5F B7 B3 01 24   71 C0 50 87 BC FD 32 35  q.._...$q.P...25
#     00C0: CA E9 82 73 E3 EE 37 9F   33 AE B5 F7 D9 40 F1 4C  ...s..7.3....@.L
#     00D0: DB 69 E4 A8 D7 0E 29 27   92 C0 2C 71 CE 19 52 00  .i....)'..,q..R.
#     00E0: 4D 1D CE 4E 29 99 10 19   11 50 65 9D 3F CA C9 C0  M..N)....Pe.?...
#     00F0: 7E CB 64 76 7A 86 A1 50   6D 96 8C CE FA 3D D6 9E  ..dvz..Pm....=..
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.399 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 CD 0F F7 55 52 99 54   1E 85 9B 4F CA 48 5E 8E  R...UR.T...O.H^.
#     0010: AE AE B7 90 F5 63 75 F1   97 5C A7 BE 6C 46 F8 3C  .....cu..\..lF.<
#     0020: 0A 3B 22 F8 17 90 D1 17   B0 86 B9 5E 17 7D 78 83  .;"........^..x.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.399 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:23.456 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "71 39 03 47 A2 31 70 24 9D 45 28 A1 65 5B 4C 6A 90 80 36 66 72 B4 E6 36 68 23 C3 01 4E FD F7 87",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 19:44:23.738 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 19:44:23.739 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-24 19:44:24.671; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 19:44:24.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 19:44:25.045; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@604c5de8(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 19:44:25.048; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55dfebeb(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 19:44:25.048; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e35bc3d(ca,h=[localhost],a=[],w=[]) for Client@f80945f[provider=null,keyStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2qlKMg/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:25.081 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "68 77 30 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:58.000 UTC",
#     "not  after"         : "2023-12-23 19:43:58.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 08 3C 8E 5E C9 3C 40 8F   BE 28 A1 D3 82 81 28 AF  .<.^.<@..(....(.
#         0010: D7 6F B3 DD                                        .o..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:25.085 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 2A A5 3B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:50.000 UTC",
#     "not  after"         : "2023-12-23 19:43:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:25.100 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:25.329 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.329 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:25.331 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:25.331 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.336 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.347 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.347 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:25.350 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D3 76 A6 AC 90 08 07 D5 8E CC C2 01 22 3F 4F F7 AC C2 86 DA 24 6C 5F 99 CC 07 C1 C0 E1 90 AE B3",
#   "session id"          : "FC 3B 5F 64 AA 6F B0 1F E5 13 C6 91 76 EA 72 CB A8 48 6A DC 70 38 FD 2E 19 1E A7 71 96 6F 17 5A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 B5 A3 5B 2A 59 62 AF   A7 45 E7 89 8B E9 6E 02  ...[*Yb..E....n.
#             0010: 42 01 51 28 87 1C FA F4   F4 B1 EC 69 05 C7 44 1B  B.Q(.......i..D.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.453 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "56 68 FD 2B 21 FC F5 A7 00 EF F0 A3 6E 77 FA 88 94 5D EB 59 52 80 40 7A D8 74 09 CF DF 6A 83 FE",
#   "session id"          : "FC 3B 5F 64 AA 6F B0 1F E5 13 C6 91 76 EA 72 CB A8 48 6A DC 70 38 FD 2E 19 1E A7 71 96 6F 17 5A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 07 C3 5A FC 28 13 FE 1F   41 1A 36 20 AA 70 F7 FE  ..Z.(...A.6 .p..
#           0010: 2E 71 E0 1B C8 05 25 F2   9C A4 D1 BC D6 95 DB 08  .q....%.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.453 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.454 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.455 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.455 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.455 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.455 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.456 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.457 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.458 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.458 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.459 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.460 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.460 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.467 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.468 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.470 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.473 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.473 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.474 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.474 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.474 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.474 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.475 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.475 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.476 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.476 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.477 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.477 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.478 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.478 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.481 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 67 AC 21",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:54.000 UTC",
#       "not  after"         : "2023-12-23 19:43:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 DB D5 25 BB F0 EA CC   56 9D 41 7B CE 23 A1 BB  u..%....V.A..#..
#           0010: F4 90 50 A4                                        ..P.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.482 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:25.540 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:25.540 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:25.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:44:25.541 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.567 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 22 EE 45",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 19:43:51.000 UTC",
#     "not  after"         : "2023-12-23 19:43:51.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#         0010: 9F 25 1C CF                                        .%..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#         0010: 5B 72 57 59                                        [rWY
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.571 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 89 F7 F3 C1 02 48 BE D1   2B F6 20 82 C7 9D E8 6A  .....H..+. ....j
#     0010: EB 5F AD F2 A3 81 28 7E   AA D8 AC 06 D2 E5 DE 50  ._....(........P
#     0020: FE 92 4C 86 EA 03 4D 83   7B A4 9A 35 3F 11 E5 57  ..L...M....5?..W
#     0030: B5 46 DC E9 6F 53 FD 2C   BA E9 49 E8 5B B8 B6 36  .F..oS.,..I.[..6
#     0040: 37 87 D0 89 EC 35 F3 C8   16 96 E3 70 B0 AD A6 15  7....5.....p....
#     0050: 5D 53 2A 77 42 8B 5F 74   A1 B8 FB 28 AA B5 E5 96  ]S*wB._t...(....
#     0060: CA 9C 97 BD 82 EE 8F BD   8A D9 F4 1F 2A F6 2E 0E  ............*...
#     0070: 4C D3 FD 47 61 AD 3A 45   93 EC 48 EA B8 D4 C9 1C  L..Ga.:E..H.....
#     0080: 4F A3 EB F0 D9 72 FD CF   B6 69 F2 12 44 79 9D 8B  O....r...i..Dy..
#     0090: 11 CC A6 B4 FA 3E B2 61   AA 7B 57 CF 5A D7 FF 54  .....>.a..W.Z..T
#     00A0: 3D 46 0D 73 CA 12 9E AA   C3 6F 7F 20 C4 79 DB 1D  =F.s.....o. .y..
#     00B0: 11 65 0E EF 94 AB C5 FB   88 A5 49 66 7D B1 B9 55  .e........If...U
#     00C0: 0B AA F7 9E AE D1 46 1D   D9 4D 4B C0 15 3A 81 4E  ......F..MK..:.N
#     00D0: 6E C1 8C 1A 82 00 67 44   98 51 35 5C 34 B9 F0 84  n.....gD.Q5\4...
#     00E0: 72 C5 42 D6 91 5C A2 1D   40 1B 78 92 D3 E5 9A B4  r.B..\..@.x.....
#     00F0: E2 7F 43 80 30 06 F7 A6   36 BF 97 9B 8C 55 68 4C  ..C.0...6....UhL
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.573 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 49 AD DE 88 AF 31 DF D2   54 96 29 89 52 4F EF 84  I....1..T.).RO..
#     0010: EC 2C FA A4 E8 B6 C5 D1   0A 5E C4 FE BC 04 D1 12  .,.......^......
#     0020: 23 65 BB 0B A3 59 82 81   F1 99 D2 AF AD 61 B9 A6  #e...Y.......a..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.575 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:25.576 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.576 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:25.576 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.577 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 19:44:25.577 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:44:25.577 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.577 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.580 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "68 77 30 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:58.000 UTC",
#       "not  after"         : "2023-12-23 19:43:58.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 08 3C 8E 5E C9 3C 40 8F   BE 28 A1 D3 82 81 28 AF  .<.^.<@..(....(.
#           0010: D7 6F B3 DD                                        .o..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 22 EE 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:51.000 UTC",
#       "not  after"         : "2023-12-23 19:43:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#           0010: 9F 25 1C CF                                        .%..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.606 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 62 EC E4 D9 48 AF 30   DA 42 9F 2F 9C D6 2A FB  2b...H.0.B./..*.
#     0010: 9F BB 99 C1 82 67 B5 DC   81 DB 14 31 4D AC 54 2E  .....g.....1M.T.
#     0020: C5 91 A6 68 D9 0C 64 1D   18 9C 3D B1 71 3A 04 14  ...h..d...=.q:..
#     0030: E5 27 6C 1E DE 44 FC F5   9D 92 CF EF 07 0D 5B F4  .'l..D........[.
#     0040: E6 87 11 AB 7F D9 3B 30   AD F8 C7 7A 77 2F 88 B1  ......;0...zw/..
#     0050: 7C 0B B7 DC B0 C4 EE E8   C5 38 03 5B AE 65 5F 56  .........8.[.e_V
#     0060: 1C 56 CA F7 41 27 BF 0D   51 B4 DF 63 9F 84 EC 9D  .V..A'..Q..c....
#     0070: D9 61 24 52 11 B0 85 7E   50 34 06 02 C3 69 83 2B  .a$R....P4...i.+
#     0080: 3C 31 3F A0 B5 80 B8 AD   92 2E 94 C0 22 33 E9 05  <1?........."3..
#     0090: 37 C0 3F C0 01 EF BA 5C   6F 52 55 CB 00 24 30 DE  7.?....\oRU..$0.
#     00A0: 2B 79 34 B8 D5 A8 EA BD   68 4B 5A 93 71 53 50 DA  +y4.....hKZ.qSP.
#     00B0: 24 17 03 43 7D 00 2F 46   C4 F8 3F 92 7D 48 03 34  $..C../F..?..H.4
#     00C0: 15 2D 33 6F CB 61 6B D7   1F BB 5C 40 61 01 51 CD  .-3o.ak...\@a.Q.
#     00D0: 41 62 D9 C1 9D 2C 3A A5   3F 4E 8B DE A3 DA 6B 84  Ab...,:.?N....k.
#     00E0: D8 9A 39 19 47 60 72 26   ED F4 2A 44 71 53 C8 DE  ..9.G`r&..*DqS..
#     00F0: 2B AE C8 E0 86 1A 9A E6   CD 01 00 3F BB 9B C7 C0  +..........?....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.608 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 7B 8C D5 68 7B A2 1B   66 BF 1B 0D 6A 2E CC 0E  O...h...f...j...
#     0010: 07 82 D6 8B 96 2E F4 D2   48 98 48 1F 4D CC C1 83  ........H.H.M...
#     0020: E0 95 61 02 4D 96 E4 92   D1 32 69 D1 C8 C3 BE FB  ..a.M....2i.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.608 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:25.657 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A9 7F 87 C6 56 13 AD 92 55 62 38 2E 1D EB 2F 89 C0 23 4D 36 E7 51 37 45 E5 A3 D1 AB 6A 29 E3 BF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 19:44:25.946 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 19:44:25.948 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-24 19:44:37.513; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:37.834 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 22 EE 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:51.000 UTC",
#       "not  after"         : "2023-12-23 19:43:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#           0010: 9F 25 1C CF                                        .%..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 66 ED 28 7F C3 D5 F8   E1 EE 12 42 7B 9A B7 6A  #f.(.......B...j
#           0010: 5B 72 57 59                                        [rWY
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 2A A5 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 19:43:50.000 UTC",
#       "not  after"         : "2023-12-23 19:43:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 BE 8E 80 DC 85 D2 F4   9E BD 8B 02 49 38 DE 7C  x...........I8..
#           0010: 9F 25 1C CF                                        .%..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-24 19:44:37.848 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:38.076 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.076 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:38.078 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 19:44:38.078 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.084 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.095 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.095 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 19:44:38.098 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6B F3 4C 62 C4 21 DF 42 4B 07 D2 10 22 13 B8 FD 1A 92 B8 17 F3 65 CB 86 7E DB DC A1 63 3E 6C 0D",
#     "session id"          : "91 89 A2 0E 06 C6 61 90 F5 C8 51 EA 37 CF 78 CC 75 53 56 7C 38 43 36 5C 9B D9 03 6C 56 F9 21 FA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: AB A8 5D A5 99 27 8A 5D   23 CB 94 BF 24 26 BB 0A  ..]..'.]#...$&..
#               0010: 27 5E AC 52 F0 10 45 A2   7E B9 E9 72 DB A6 3C 34  '^.R..E....r..<4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.116 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5A 4B D1 4F 72 18 53 B6 95 89 58 26 48 FE 4A 34 E3 82 2A 01 B6 98 46 E5 75 C0 63 56 D2 2E 06 60",
#     "session id"          : "91 89 A2 0E 06 C6 61 90 F5 C8 51 EA 37 CF 78 CC 75 53 56 7C 38 43 36 5C 9B D9 03 6C 56 F9 21 FA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E8 57 52 7C 81 B2 ED F4   B1 22 4D CC 0E 85 CB 13  .WR......"M.....
#             0010: E4 1C E2 28 B3 00 08 C2   23 B7 FB 8E D7 00 96 58  ...(....#......X
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.117 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.117 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 19:44:38.119 UTC|SSLExtensions.java:163|Ignore unsupporte

[...truncated too long message...]

ore}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 19:46:01.028 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:46:01.085 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:46:01.086 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:46:01.086 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 19:46:01.086 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44426/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28088ms
ok 65 stop command for single port in 30757ms
ok 66 status detects locally running solr in 14350ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2188ms
ok 69 copying files around in 6613ms
ok 70 upconfig in 2639ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1228ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1225ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /tmp/src/solr/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=96 "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=E83E500883FC035B -Ptests.file.encoding=US-ASCII


FAILURE: Build completed with 2 failures.

1: Task failed with an exception.
-----------
* What went wrong:
Execution failed for task ':solr:core:test'.
> There were failing tests. See the results at: file:///tmp/src/solr/solr/core/build/test-results/test/

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

2: Task failed with an exception.
-----------
* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.
==============================================================================

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 6s
654 actionable tasks: 637 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m30s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5529 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5529/

All tests passed

Build Log:
[...truncated 1328 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35111/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-24 16:39:03.752; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 16:39:03.757; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-24 16:39:04.686; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-24 16:39:04.727; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22347ms
ok 61 start solr with client truststore and security manager in 25802ms
not ok 62 start solr with mTLS needed in 59448ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-YOJPUh/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35111.
#
# Started Solr server on port 35111 (pid=201052). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 35112.
#
# Started Solr server on port 35112 (pid=201478). Happy searching!
#
# INFO  - 2023-09-24 16:40:27.973; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 16:40:27.979; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 16:40:28.388; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@550a1967(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 16:40:28.391; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 16:40:28.392; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:28.426 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 6F 17 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:40:04.000 UTC",
#     "not  after"         : "2023-12-23 16:40:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 2B B9 05 37 18 30 2A   33 8D A3 60 06 28 AC 40  e+..7.0*3..`.(.@
#         0010: E7 13 A3 D6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:28.431 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 92 33 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:56.000 UTC",
#     "not  after"         : "2023-12-23 16:39:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:28.447 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:28.778 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:28.779 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:28.779 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:28.779 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:28.924 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.925 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:28.926 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:28.927 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.932 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.944 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.945 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.945 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:28.948 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2E A4 6B 5D 02 22 F9 D8 02 DF 00 C1 C7 BB DA 7C A9 2A 86 A3 BF B7 F5 78 8B 0D 8B 05 A1 D2 8C CC",
#   "session id"          : "06 39 74 42 17 9F E7 11 09 97 C7 5F CD 31 AB C3 6D A2 2F 8E 15 5D 27 FA B7 13 52 ED 20 CB CF 99",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 45 E5 C6 68 D9 25 43 F2   60 4F 96 52 F8 32 56 78  E..h.%C.`O.R.2Vx
#             0010: 98 71 C7 30 BF D9 82 DA   E8 4B D7 64 22 25 D5 73  .q.0.....K.d"%.s
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.062 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 23 65 B7 1E 55 03 3D E3 86 F7 CD 7C 32 27 91 25 2F 98 8F 12 AD 94 3D A0 F8 AA 90 7D 18 5C 38",
#   "session id"          : "06 39 74 42 17 9F E7 11 09 97 C7 5F CD 31 AB C3 6D A2 2F 8E 15 5D 27 FA B7 13 52 ED 20 CB CF 99",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DF 0B FC 12 0F C6 47 22   6F 89 79 47 3D ED 56 77  ......G"o.yG=.Vw
#           0010: 55 ED 2A 94 47 B5 39 08   C2 9B CC 13 D7 46 C3 4D  U.*.G.9......F.M
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.062 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.063 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.064 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.065 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.066 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.067 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.067 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.067 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.068 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.069 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.069 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.069 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.077 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.078 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.079 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.083 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.083 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.083 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.084 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.086 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.087 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.087 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.087 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.089 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.090 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.090 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.094 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 78 0C 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:40:00.000 UTC",
#       "not  after"         : "2023-12-23 16:40:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 39 7D F5 C5 39 02 B1   4C 33 DA CA AD 2B 76 A9  R9...9..L3...+v.
#           0010: D5 AA B5 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.094 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.187 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.190 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 97 A3 3F 35 76 1C D5   69 2D CF 30 2D F8 6B 74  ...?5v..i-.0-.kt
#     0010: 4B 08 5C 3F EE A6 52 BB   1E C9 AC 96 A1 73 F4 F2  K.\?..R......s..
#     0020: 3E 7B 4F 31 9B 92 B9 A7   3B 9D C5 B9 6B C4 32 F6  >.O1....;...k.2.
#     0030: BB 1E A7 8F E6 60 21 0D   19 1D 93 71 12 12 8F 7C  .....`!....q....
#     0040: CD 40 BB 59 55 3F 28 DA   18 82 33 80 60 2C E0 42  .@.YU?(...3.`,.B
#     0050: FD D8 2F 09 58 3C 8F 8E   F9 7C 8E 97 AA 74 66 74  ../.X<.......tft
#     0060: FA 44 9F 58 D6 FE F1 C6   37 A6 36 7B D7 0B 09 49  .D.X....7.6....I
#     0070: 65 5A B9 67 2D 98 BF 06   4C 55 6D D3 77 88 AB B5  eZ.g-...LUm.w...
#     0080: 9C 87 00 CF E9 AC 95 4C   C2 28 96 EC 9D 04 53 F8  .......L.(....S.
#     0090: 6F 2C 72 CC 59 9F 40 7F   59 4C CE C9 D3 C5 B5 BB  o,r.Y.@.YL......
#     00A0: 10 E3 BA F1 CD 4C 57 1D   73 AE 64 0D 85 14 EF E9  .....LW.s.d.....
#     00B0: 3C 42 DF F7 10 20 60 F3   41 8B AE 44 B4 02 E5 A9  <B... `.A..D....
#     00C0: B3 A2 7E 3E 66 50 19 7A   40 28 48 2A 3F A5 84 2F  ...>fP.z@(H*?../
#     00D0: 13 4C 41 1B 4A C9 D4 48   60 6B D7 25 AA F2 BA AC  .LA.J..H`k.%....
#     00E0: 66 3A 24 18 61 34 EF 49   60 51 01 9C 2E A3 4B 11  f:$.a4.I`Q....K.
#     00F0: 3D 67 C8 15 27 80 E7 E4   F9 9F 5C 57 48 8F B3 0E  =g..'.....\WH...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.192 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CB F0 EE 6A F8 05 87 A1   89 F2 37 B9 D2 D1 75 16  ...j......7...u.
#     0010: 1D 5D 06 2C F5 65 31 D0   0C 67 45 4C D5 A0 9F 2C  .].,.e1..gEL...,
#     0020: 2A 75 7B 53 FA A2 88 34   AF 65 49 5D 2D 39 CC B5  *u.S...4.eI]-9..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.194 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:29.195 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.195 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:29.196 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.196 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:29.196 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:29.196 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.197 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.199 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 6F 17 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:40:04.000 UTC",
#       "not  after"         : "2023-12-23 16:40:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 2B B9 05 37 18 30 2A   33 8D A3 60 06 28 AC 40  e+..7.0*3..`.(.@
#           0010: E7 13 A3 D6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A7 56 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:39:57.000 UTC",
#       "not  after"         : "2023-12-23 16:39:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#           0010: 86 9F 6B 76                                        ..kv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.226 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 FD 59 A7 06 8A 08 E2   79 C4 C2 9B 6F 61 41 01  ..Y.....y...oaA.
#     0010: B7 5F C8 98 B1 B6 74 60   24 FE 8C 59 0B 24 43 1D  ._....t`$..Y.$C.
#     0020: 9C E1 E8 2B 05 0C E2 49   4D F4 09 41 24 62 C5 BA  ...+...IM..A$b..
#     0030: 85 02 DB 75 1E BE DA AA   2B 4D 23 1B DF 95 96 A5  ...u....+M#.....
#     0040: A0 03 02 CE 38 4F 6D A5   8F 1C E1 98 DB 6D 4F CF  ....8Om......mO.
#     0050: 0E A3 4D E2 6F 44 11 71   C2 56 65 00 C8 29 12 A1  ..M.oD.q.Ve..)..
#     0060: 1A BB 8A D7 9D B8 0E 43   A9 3B 2F E2 6C B9 8A E9  .......C.;/.l...
#     0070: 95 F5 C7 BC 98 BC EB 59   E6 4D 30 C2 11 68 C9 59  .......Y.M0..h.Y
#     0080: C5 C9 9C 90 5C 16 AD 50   6F 96 87 D1 0B 5C BF 4F  ....\..Po....\.O
#     0090: 11 03 E3 00 E3 C7 6A F6   84 B7 E9 B3 FA D6 23 7A  ......j.......#z
#     00A0: 55 E6 CC 6F F8 F0 BB 8B   73 24 39 8B 3A 8A 99 A1  U..o....s$9.:...
#     00B0: 30 C4 30 3E 44 20 6A BF   AB C7 EC A1 22 45 C2 2A  0.0>D j....."E.*
#     00C0: AA 42 86 48 8D 22 A7 38   59 42 1E E8 EE 92 4F 9E  .B.H.".8YB....O.
#     00D0: 53 97 AC 21 DF 64 AB 57   2A F9 B9 2B 6A DD 85 F6  S..!.d.W*..+j...
#     00E0: 1C B0 30 59 15 71 83 F7   86 24 7C A9 FA A7 5B C8  ..0Y.q...$....[.
#     00F0: 2C 03 68 91 19 65 BE 19   B1 E4 11 EE FD E3 12 FF  ,.h..e..........
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.227 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C2 4A 0E 31 C8 AF E3 88   93 EF F9 81 B6 87 35 61  .J.1..........5a
#     0010: 15 42 D5 2D 51 14 39 63   13 AC 5B D2 3C 4B 90 9D  .B.-Q.9c..[.<K..
#     0020: 91 41 51 1F 14 26 69 D7   1C B3 9E C3 65 F9 FA CE  .AQ..&i.....e...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.227 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:29.279 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 9C 1B 7C 03 2D 7F 77 23 48 1F CF 2B 4C 86 54 0C 81 02 79 B8 B5 CA 41 8C E6 55 DD BA 28 AA 25",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 16:40:29.570 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 16:40:29.571 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-24 16:40:30.507; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 16:40:30.512; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 16:40:30.867; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@32193bea(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 16:40:30.870; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52851b44(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 16:40:30.870; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@584f54e6(ca,h=[localhost],a=[],w=[]) for Client@66fdec9[provider=null,keyStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-YOJPUh/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:30.902 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C 6F 17 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:40:04.000 UTC",
#     "not  after"         : "2023-12-23 16:40:04.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 2B B9 05 37 18 30 2A   33 8D A3 60 06 28 AC 40  e+..7.0*3..`.(.@
#         0010: E7 13 A3 D6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:30.906 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "05 92 33 25",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:56.000 UTC",
#     "not  after"         : "2023-12-23 16:39:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:30.920 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:31.150 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.151 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:31.152 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:31.152 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.158 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.170 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.170 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:31.172 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 E2 67 F1 43 75 5A 4C 7A BD 08 0D 06 2A 55 2F FC 63 06 85 8E FC 58 56 CE 08 CC 9D F4 8A D1 DB",
#   "session id"          : "42 4F 0A 86 11 29 41 C6 D7 68 7E A3 7B CD 59 59 17 C6 13 65 63 B7 46 76 55 8E C5 8B 18 3D 21 7B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC 6B AD 90 3D 5B 3D 09   7D 00 98 0E 0F 98 0A 79  .k..=[=........y
#             0010: 9D 5E 85 E7 DE 7A 98 E9   AC 2F 3C DC DF 0D A9 19  .^...z.../<.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.273 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FE 3A 72 23 BE 9C A8 4B E0 60 36 4A 55 4C C5 DC 90 C7 C2 0F 72 1B 2A 02 A8 50 74 C4 11 02 04 07",
#   "session id"          : "42 4F 0A 86 11 29 41 C6 D7 68 7E A3 7B CD 59 59 17 C6 13 65 63 B7 46 76 55 8E C5 8B 18 3D 21 7B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 32 E2 7D 2D 30 F9 19 E3   0E 2E 84 8A DA D7 E9 8F  2..-0...........
#           0010: 2A BE 68 F9 4B 39 A1 1E   E6 F2 32 6E 79 38 B7 18  *.h.K9....2ny8..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.274 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.274 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.275 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.276 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.276 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.277 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.278 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.278 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.278 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.279 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.286 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.289 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.292 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.292 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.293 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.295 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.295 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.295 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.296 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.296 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.297 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.297 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.300 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 78 0C 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:40:00.000 UTC",
#       "not  after"         : "2023-12-23 16:40:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 52 39 7D F5 C5 39 02 B1   4C 33 DA CA AD 2B 76 A9  R9...9..L3...+v.
#           0010: D5 AA B5 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.300 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:31.366 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:31.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:31.367 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:31.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.397 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 A7 56 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 16:39:57.000 UTC",
#     "not  after"         : "2023-12-23 16:39:57.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#         0010: 86 9F 6B 76                                        ..kv
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#         0010: 4A 4A 4C 1D                                        JJL.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.401 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 56 A1 75 83 5E A0 86   FE A0 35 3B EE 58 8E A8  /V.u.^....5;.X..
#     0010: 5F 68 33 EA 57 3E 46 BC   35 06 8E F9 AC 8C 5D 56  _h3.W>F.5.....]V
#     0020: 52 92 A4 67 D1 07 E9 A6   59 79 5C BD CA 92 A7 D4  R..g....Yy\.....
#     0030: 82 2B 8F 58 7D 34 D3 D3   80 D9 DB 2B 05 DF A9 90  .+.X.4.....+....
#     0040: 0B 0D BB E1 4A A0 58 C1   DC FC 50 FE 6E C8 20 69  ....J.X...P.n. i
#     0050: A7 72 89 11 1D 73 D2 57   0D C0 FF 6F 7D 95 D8 E4  .r...s.W...o....
#     0060: B9 97 6E FB 0E 48 D1 55   34 22 97 12 1D F9 AB 37  ..n..H.U4".....7
#     0070: 09 17 DC F0 89 87 46 A8   DF 9F 9E 32 F1 72 A5 E6  ......F....2.r..
#     0080: 35 5F BD DF A6 DB D5 EE   94 92 F3 AC 1E 8B 32 51  5_............2Q
#     0090: 89 AB F8 B2 ED 31 C8 E0   CF D3 58 E4 A9 E7 98 C9  .....1....X.....
#     00A0: B6 D7 60 0C 48 87 F1 A9   44 F3 1C 13 CD ED 02 58  ..`.H...D......X
#     00B0: 7C 9B E7 25 53 81 A4 47   D5 F9 A7 3A F5 2F C0 8D  ...%S..G...:./..
#     00C0: 29 FD 3A D7 80 BC B0 F3   7C 1D B8 E4 E0 91 34 57  ).:...........4W
#     00D0: 87 D6 82 67 C1 73 C5 D3   1A DE 84 D2 93 4C BE 7A  ...g.s.......L.z
#     00E0: 1A 63 7F B3 8C AE D6 94   EE 0A 58 B4 E1 85 32 88  .c........X...2.
#     00F0: D0 23 2F 9E FC 51 EA CA   0F 22 8A 46 A0 EC 76 A1  .#/..Q...".F..v.
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.403 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 96 21 D6 A6 7F 5F B6 6F   B6 F2 F1 A6 21 77 0B 07  .!..._.o....!w..
#     0010: 96 CF B7 55 E3 0B 66 05   31 E2 22 73 6A E8 6C 37  ...U..f.1."sj.l7
#     0020: E5 52 A8 FB 55 BF 0A 92   E9 D9 AD D6 D4 73 92 DA  .R..U........s..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.405 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:31.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:31.407 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.407 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 16:40:31.407 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:31.407 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.408 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.410 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 6F 17 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:40:04.000 UTC",
#       "not  after"         : "2023-12-23 16:40:04.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 2B B9 05 37 18 30 2A   33 8D A3 60 06 28 AC 40  e+..7.0*3..`.(.@
#           0010: E7 13 A3 D6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A7 56 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:39:57.000 UTC",
#       "not  after"         : "2023-12-23 16:39:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#           0010: 86 9F 6B 76                                        ..kv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.435 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8C 7A 10 AA 5A 0C 98 F5   75 71 F7 C8 75 26 98 E2  .z..Z...uq..u&..
#     0010: C3 A2 E3 A9 88 67 D9 F2   D7 CD 2C 58 78 BC B9 DF  .....g....,Xx...
#     0020: AF 0A 6C 37 6B 67 39 2D   35 82 08 80 C7 C6 7E 45  ..l7kg9-5......E
#     0030: 67 3A 97 88 D1 E5 54 5B   E8 91 B1 73 6C 13 6D F6  g:....T[...sl.m.
#     0040: 05 DE 48 49 C3 B7 FA A5   66 49 8F 86 41 EF D6 5E  ..HI....fI..A..^
#     0050: EC 1C 0F 89 89 B8 AB 54   B3 A4 90 D7 24 59 EC A0  .......T....$Y..
#     0060: FA 8B CD 15 EC 86 2C 96   CF 57 E2 C5 94 FA E3 F0  ......,..W......
#     0070: 20 79 F3 4F C1 04 2A C8   05 E8 1B 67 2A B4 33 55   y.O..*....g*.3U
#     0080: 06 AF 4A 41 D9 39 E9 32   C6 8C 1A C1 15 9F 60 37  ..JA.9.2......`7
#     0090: 05 0A 8E 16 7C CB 52 FB   26 F4 49 F5 4E 27 58 33  ......R.&.I.N'X3
#     00A0: 6D F1 D3 43 4F 81 9E 7E   45 8D 4A FE 13 5B 7F A4  m..CO...E.J..[..
#     00B0: 3B BB 87 D3 B0 AE BE 5A   B0 48 5E A7 AB 7C AE 7A  ;......Z.H^....z
#     00C0: 75 53 B1 4B 9F 97 64 21   43 0A E2 17 53 6B 8A AA  uS.K..d!C...Sk..
#     00D0: 4B 21 39 2E 50 77 B5 E4   68 49 BB D4 13 91 54 B3  K!9.Pw..hI....T.
#     00E0: E2 FB 2E 9D D4 6D 34 D3   93 43 0C 38 86 05 AE CB  .....m4..C.8....
#     00F0: 8E 56 24 E8 FB CC F9 AE   22 ED 6A 35 C0 BC E7 C4  .V$.....".j5....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.436 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 74 AE 03 6A AE 36 3A 0F   19 82 6D 90 90 24 15 F4  t..j.6:...m..$..
#     0010: FF F7 FF 94 99 0F 0B 13   87 77 06 41 01 7E FF 75  .........w.A...u
#     0020: CD 77 01 7C 64 BA A7 9E   7F FC 46 93 72 90 0C F5  .w..d.....F.r...
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.437 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:31.486 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AE 64 4E E5 61 06 77 83 C6 AD 06 EB CD E3 47 3A A2 69 FE D4 01 4E F0 A2 18 AE 6B D7 39 FB AF 2F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 16:40:31.765 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 16:40:31.766 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-24 16:40:43.015; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:43.357 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "05 92 33 25",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:39:56.000 UTC",
#       "not  after"         : "2023-12-23 16:39:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#           0010: 86 9F 6B 76                                        ..kv
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 A7 56 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 16:39:57.000 UTC",
#       "not  after"         : "2023-12-23 16:39:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 E4 55 84 26 65 AF DB   A4 AB 93 B0 F3 67 ED EB  ..U.&e.......g..
#           0010: 86 9F 6B 76                                        ..kv
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 8F CD 28 D1 C5 C8 5C   95 24 24 72 B5 1F B4 A3  ...(...\.$$r....
#           0010: 4A 4A 4C 1D                                        JJL.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-24 16:40:43.374 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:43.820 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:43.820 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:43.821 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:40:43.821 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:43.878 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.879 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:43.881 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 16:40:43.881 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.887 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.900 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.900 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.901 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 16:40:43.904 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F 76 D3 E9 2D 51 E5 FC B7 14 8E FB 52 55 8A 09 20 0B D0 B2 9C E7 40 F5 37 AD 87 C3 FE 21 5F 67",
#     "session id"          : "38 D7 38 0E E4 0F BB 0D C7 60 AB 7E 4E BD D3 B7 DF F9 C6 C4 7D A7 2E CD FA 27 F9 58 33 7A 5A 59",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 64 84 4C B8 24 1F B4 F7   00 28 AF CF 2F A5 C1 22  d.L.$....(../.."
#               0010: 92 FB 54 E1 0F 27 18 86   56 94 7A 59 34 14 0B 09  ..T..'..V.zY4...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.924 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "19 35 D3 4F 69 32 A7 EF B8 74 1B 21 75 FC 39 1C 5B DD 43 01 6E 00 93 84 4D 57 CB 71 49 2D 76 31",
#     "session id"          : "38 D7 38 0E E4 0F BB 0D C7 60 AB 7E 4E BD D3 B7 DF F9 C6 C4 7D A7 2E CD FA 27 F9 58 33 7A 5A 59",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 78 85 85 04 25 6C A3 A4   A4 FE A6 33 C6 38 41 D3  x...%l.....3.8A.
#             0010: 8C F5 0F 54 5F 81 1E AA   91 DC 45 6C 48 79 5F 10  ...T_.....ElHy_.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.925 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.925 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.927 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.929 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.929 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.929 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:43.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:43.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.938 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.940 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.941 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.944 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:43.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:40:43.946 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 16:40:43.947 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512

[...truncated too long message...]

on.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 16:42:04.805 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:42:04.858 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:42:04.858 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:42:04.858 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 16:42:04.859 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35112/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28566ms
ok 65 stop command for single port in 31019ms
ok 66 status detects locally running solr in 14323ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2146ms
ok 69 copying files around in 6479ms
ok 70 upconfig in 2599ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1214ms
ok 73 Cleanup in 1224ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m24.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-9.x - Build # 5528 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5528/

All tests passed

Build Log:
[...truncated 1322 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42197/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-24 14:04:21.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 14:04:21.894; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARN  - 2023-09-24 14:04:22.835; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-24 14:04:22.876; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 60 start solr with ssl and auth in 22933ms
ok 61 start solr with client truststore and security manager in 25337ms
not ok 62 start solr with mTLS needed in 57367ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-7xxwbu/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42197.
#
# Started Solr server on port 42197 (pid=200913). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is listening on port 42198.
#
# Started Solr server on port 42198 (pid=201333). Happy searching!
#
# INFO  - 2023-09-24 14:05:46.301; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 14:05:46.306; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 14:05:46.703; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@ebaa6cb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 14:05:46.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 14:05:46.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:46.741 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 44 54 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:22.000 UTC",
#     "not  after"         : "2023-12-23 14:05:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 79 FE 55 5D AC AE F7   F1 BF B5 4D FC B2 DE BA  Wy.U]......M....
#         0010: D0 AA BE AB                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:46.745 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 1F 18 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:14.000 UTC",
#     "not  after"         : "2023-12-23 14:05:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:46.760 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:47.102 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:47.103 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:47.103 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:47.103 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:47.254 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.254 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:47.256 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:47.256 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.262 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.274 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.274 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.274 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:47.277 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CA A0 86 91 0D 32 2A 61 D0 C9 6F BA 1C 26 54 39 5D C9 ED AE D3 A8 48 34 2B E5 A0 EF 6F 77 D2 81",
#   "session id"          : "17 9F D4 89 E9 C8 5D 68 56 D6 56 3B 60 6C 84 B8 86 92 82 EA 39 11 34 81 55 6F 03 00 B6 E7 47 BC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 73 03 0E F9 34 2D 50 21   50 75 37 B2 48 53 31 A4  s...4-P!Pu7.HS1.
#             0010: 34 96 70 2C 5F DD A1 3B   AA 0C 88 FF B5 0A 1A 43  4.p,_..;.......C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.384 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B9 65 48 98 FC 00 1F 93 16 BF B8 9D 2F EB 6F 7C 37 22 E6 5E 46 C7 C8 37 D7 62 4F 1F 39 30 FA A8",
#   "session id"          : "17 9F D4 89 E9 C8 5D 68 56 D6 56 3B 60 6C 84 B8 86 92 82 EA 39 11 34 81 55 6F 03 00 B6 E7 47 BC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EF 1A D6 D2 3F B3 4A 1D   CB 63 8A 0D 67 A7 B4 88  ....?.J..c..g...
#           0010: D7 88 F7 C0 62 5B 6E 11   27 EB 76 3D E4 98 54 37  ....b[n.'.v=..T7
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.384 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.384 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.386 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.387 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.388 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.389 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.389 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.389 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.391 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.391 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.399 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.400 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.401 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.405 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.405 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.406 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.406 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.406 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.407 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.407 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.409 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.409 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.409 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.410 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.411 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.412 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.412 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.416 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 69 A6 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:18.000 UTC",
#       "not  after"         : "2023-12-23 14:05:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D7 47 73 CE 06 A0 D5   B7 8A C6 9D F4 EC 3C 18  ..Gs..........<.
#           0010: BF E0 9D C2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.416 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.511 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.514 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 67 33 6A CC 84 3F 61   20 22 0C 7A 00 4A B8 BB  .g3j..?a ".z.J..
#     0010: 07 E4 A7 7C 00 7F 19 2B   FF CD B0 7A 70 70 77 DB  .......+...zppw.
#     0020: 38 B7 D4 6E E9 B0 ED 8E   27 38 BD EA 87 42 16 A3  8..n....'8...B..
#     0030: E3 AE CC 9E AB F8 D9 2A   B6 A9 37 9D 85 AE 22 A1  .......*..7...".
#     0040: 2B 88 FF 76 BF 18 6B 2F   F5 EB 8A 48 D1 5E 5C 84  +..v..k/...H.^\.
#     0050: B6 B1 90 63 24 8C 23 2E   AE BC D3 66 A6 F8 F6 38  ...c$.#....f...8
#     0060: 1D EF 29 A9 5A 1E 2E 17   73 31 D8 99 31 9F 03 45  ..).Z...s1..1..E
#     0070: 79 5E 83 3B 67 D5 44 AF   06 4B 10 A9 BB 05 66 06  y^.;g.D..K....f.
#     0080: DE C7 86 C2 99 4C 9F B8   A3 35 4B 81 05 12 15 04  .....L...5K.....
#     0090: 09 C8 B1 9A 19 FD 40 E4   20 3B 8D 73 C6 35 09 D8  ......@. ;.s.5..
#     00A0: 77 77 1F 05 69 51 B8 CC   AD 32 69 18 1B 06 29 6C  ww..iQ...2i...)l
#     00B0: 8C B2 4C 33 F0 C3 FF C6   FA 67 BA 61 14 86 7C 5F  ..L3.....g.a..._
#     00C0: E2 22 D6 10 ED 73 D1 4C   46 7C C5 63 9D 86 10 3C  ."...s.LF..c...<
#     00D0: F7 22 81 69 0D B0 ED E5   76 F2 CA 26 B3 E0 21 44  .".i....v..&..!D
#     00E0: 1B A7 56 A1 E1 EA 8E A2   D4 40 C1 A3 C7 0A D0 9A  ..V......@......
#     00F0: 40 14 31 BC 0F F5 7F E3   84 DD 24 97 13 F2 44 55  @.1.......$...DU
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.516 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 30 54 87 7A F0 10 B5 78   40 EE B8 4E 7B A3 C6 6C  0T.z...x@..N...l
#     0010: 1E A6 CD 9E 4C BD E8 47   EA FF AB BB 1D 35 76 01  ....L..G.....5v.
#     0020: A3 62 24 50 63 AA DD 47   30 73 74 CF E9 03 E1 B3  .b$Pc..G0st.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.518 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:47.519 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.520 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:47.520 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.520 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:47.520 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:47.521 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.521 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.524 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 44 54 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:22.000 UTC",
#       "not  after"         : "2023-12-23 14:05:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 79 FE 55 5D AC AE F7   F1 BF B5 4D FC B2 DE BA  Wy.U]......M....
#           0010: D0 AA BE AB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 0A 24 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:16.000 UTC",
#       "not  after"         : "2023-12-23 14:05:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#           0010: 63 69 A1 78                                        ci.x
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.550 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 94 F7 3A 40 A3 F2 76   E9 70 AD 5F C1 AB EA E6  ...:@..v.p._....
#     0010: D2 94 56 D3 FD B7 08 FD   0F 8A 94 32 16 AD 72 FC  ..V........2..r.
#     0020: 4C 76 FC 9D D5 45 BB 83   DF 65 88 1F 17 61 9B E9  Lv...E...e...a..
#     0030: F9 FD D8 81 F4 BE CA 9D   F1 D6 75 5A A5 56 49 51  ..........uZ.VIQ
#     0040: A2 18 B2 62 94 5E 47 95   55 1E 8D 21 A9 06 2B 57  ...b.^G.U..!..+W
#     0050: 20 D7 C7 0A E4 F2 19 DE   A1 D0 40 DE F1 32 E7 79   .........@..2.y
#     0060: 20 30 81 A5 DD 86 B0 DD   12 CE 96 84 C6 28 05 00   0...........(..
#     0070: 6D 2A 82 12 79 8B 54 C6   B1 F0 24 9D A9 07 2C 39  m*..y.T...$...,9
#     0080: E4 E1 23 16 9F 97 29 C0   DE D3 AE 71 60 E4 7F 07  ..#...)....q`...
#     0090: 9A 2A 1C 1D 9D 24 89 42   6C D4 7D E4 81 AE 95 D9  .*...$.Bl.......
#     00A0: B3 75 FA 2B 43 DF 59 C8   2F 83 AB E5 2E 2A 64 D8  .u.+C.Y./....*d.
#     00B0: EA AA AC 01 1E 8A 37 E0   D4 57 0D 9D D6 EB 10 ED  ......7..W......
#     00C0: EC 45 9F B3 BB B0 BB 87   2B AE 8B 07 1F 74 41 19  .E......+....tA.
#     00D0: 1C 32 EF BB 99 51 5F F4   D2 0A 87 B0 E0 0E 92 DC  .2...Q_.........
#     00E0: ED AD 25 4E EA 5D E8 A1   13 D8 F2 A3 41 C7 89 82  ..%N.]......A...
#     00F0: 68 95 8E 1F 14 A8 EC 3B   7C 25 BD A7 2D 51 A5 21  h......;.%..-Q.!
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.551 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FD 48 7F F1 99 42 0E 73   42 D5 27 E7 8A C8 26 54  .H...B.sB.'...&T
#     0010: F2 E1 23 78 7A F5 B0 53   BF 10 A6 94 FC BA D1 05  ..#xz..S........
#     0020: 4B 0A C6 55 16 21 16 0B   D1 E5 39 0D 76 E6 72 DD  K..U.!....9.v.r.
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.552 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:47.602 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AD 0F AE 99 22 91 B5 6E 09 30 69 3F 0E AF 83 8B 17 C4 9C E8 0F E4 07 6A D9 0C 68 0C 72 82 AB 60",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 14:05:47.873 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 14:05:47.875 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-24 14:05:48.803; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-24 14:05:48.808; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-24 14:05:49.171; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5d8bafa9(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 14:05:49.174; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1b73be9f(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-24 14:05:49.175; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@628c4ac0(ca,h=[localhost],a=[],w=[]) for Client@5d9b7a8a[provider=null,keyStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-7xxwbu/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:49.206 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 44 54 B6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:22.000 UTC",
#     "not  after"         : "2023-12-23 14:05:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 79 FE 55 5D AC AE F7   F1 BF B5 4D FC B2 DE BA  Wy.U]......M....
#         0010: D0 AA BE AB                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:49.210 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 1F 18 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:14.000 UTC",
#     "not  after"         : "2023-12-23 14:05:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-24 14:05:49.225 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:49.446 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.446 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:49.448 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:05:49.448 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.453 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.465 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.465 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.465 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:05:49.467 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1D 25 85 F0 EF 7C FC 85 62 86 C9 20 03 40 A6 BD 11 64 97 8E 7D 02 1A D5 9C FF C7 42 55 D1 2F B5",
#   "session id"          : "10 11 62 4B A5 1D 15 4F D3 83 AF E5 21 AA D0 C0 C3 BE FC A6 E7 F6 37 01 67 E3 78 DD 84 3A 3C A7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 D3 17 69 E5 11 81 D6   4F FC 95 F2 5F DF 68 E1  ...i....O..._.h.
#             0010: 6D 32 4E 95 62 87 31 E6   9D 29 08 F5 8D 2D B3 42  m2N.b.1..)...-.B
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.575 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "34 69 71 EE C1 BB 47 D7 83 F8 88 26 46 6F B5 C6 1D 9E 27 75 6D B8 BB 00 69 EE C8 5E 01 9D 27 CF",
#   "session id"          : "10 11 62 4B A5 1D 15 4F D3 83 AF E5 21 AA D0 C0 C3 BE FC A6 E7 F6 37 01 67 E3 78 DD 84 3A 3C A7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 9E 8E D4 55 13 87 E4   A3 FC A8 E0 A3 B5 5C DF  ....U.........\.
#           0010: 2A 20 C1 70 95 00 C2 66   D9 1E B7 3E C1 BF DA 37  * .p...f...>...7
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.576 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.576 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.577 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.578 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.579 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.579 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.581 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.581 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.582 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.583 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.583 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.591 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.592 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.594 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.597 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.597 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.600 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.600 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.601 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.601 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.601 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.602 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.605 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 69 A6 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:18.000 UTC",
#       "not  after"         : "2023-12-23 14:05:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D D7 47 73 CE 06 A0 D5   B7 8A C6 9D F4 EC 3C 18  ..Gs..........<.
#           0010: BF E0 9D C2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:49.684 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:49.684 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:49.685 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:05:49.685 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.695 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 0A 24 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-24 14:05:16.000 UTC",
#     "not  after"         : "2023-12-23 14:05:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#         0010: 63 69 A1 78                                        ci.x
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#         0010: 0F D5 01 3B                                        ...;
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.698 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 40 A8 F0 2B 92 F0 07 0A   51 2E 27 CC 36 38 55 12  @..+....Q.'.68U.
#     0010: A5 5D 4C 2C 50 F0 8E 28   CE 6E A6 06 26 20 8D 78  .]L,P..(.n..& .x
#     0020: 3F 07 BA DC E3 B1 09 51   CD 83 28 54 F6 19 29 19  ?......Q..(T..).
#     0030: C4 BB 12 34 CE D1 41 16   A0 5D 3E D9 0A F4 9E 33  ...4..A..]>....3
#     0040: F9 8B 95 E5 88 0B F7 EF   85 74 09 D6 1B BC FA 91  .........t......
#     0050: 72 DF D5 5E 12 27 09 61   B2 66 05 15 F0 E1 85 45  r..^.'.a.f.....E
#     0060: B4 04 75 97 62 BA A7 46   E0 9C AD 58 2D 91 DB A9  ..u.b..F...X-...
#     0070: 4D 7E 2B 7D DD C8 22 12   C6 47 9E 30 51 A1 CE 15  M.+..."..G.0Q...
#     0080: 88 27 94 41 D4 F8 CE 75   EC 8E E2 20 FA 1C 2D A3  .'.A...u... ..-.
#     0090: F4 A4 67 3A 9E E7 DD 68   0D 6D 67 E7 DB 1E D3 01  ..g:...h.mg.....
#     00A0: 42 61 AF A1 48 11 46 E4   E9 18 24 18 91 E1 2A E0  Ba..H.F...$...*.
#     00B0: 95 C5 62 98 52 2E 88 BE   30 09 59 8D 80 5A 4D 0C  ..b.R...0.Y..ZM.
#     00C0: 35 60 17 AB 0A 8A 13 EF   D3 8C A1 24 A1 79 8C A0  5`.........$.y..
#     00D0: A7 A0 E4 02 FC B5 EA 85   AE 11 6C 51 08 9E D2 5D  ..........lQ...]
#     00E0: 3D 63 1C 32 BC 89 FD F4   99 B0 83 41 01 57 17 A5  =c.2.......A.W..
#     00F0: BB C6 F4 D5 4B 0E B5 C3   F7 70 A1 6F 40 B7 85 5D  ....K....p.o@..]
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.700 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 28 EA 85 EB A5 60 45   3A 7F 8A 35 9C 6B 51 53  x(....`E:..5.kQS
#     0010: 32 2B 4C AE D2 EE 41 8C   C6 45 F5 77 66 0B 64 8D  2+L...A..E.wf.d.
#     0020: 72 94 88 E0 C1 71 D4 64   36 37 5B 4B FD E4 97 86  r....q.d67[K....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.703 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:49.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:49.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-24 14:05:49.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:05:49.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.705 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.707 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 44 54 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:22.000 UTC",
#       "not  after"         : "2023-12-23 14:05:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 79 FE 55 5D AC AE F7   F1 BF B5 4D FC B2 DE BA  Wy.U]......M....
#           0010: D0 AA BE AB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 0A 24 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:16.000 UTC",
#       "not  after"         : "2023-12-23 14:05:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#           0010: 63 69 A1 78                                        ci.x
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.734 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 04 CE A0 46 5C 93 21   1E E7 91 4B 35 02 23 DE  ....F\.!...K5.#.
#     0010: 33 7F 3C F3 4D 5A 49 8C   66 6F E9 7F 27 58 DF 4D  3.<.MZI.fo..'X.M
#     0020: 4E E6 89 A0 2D 41 82 3E   E0 C6 C9 33 FA EE 94 14  N...-A.>...3....
#     0030: 79 85 B7 A8 A1 9C 90 EE   B5 02 0F 7D C8 F7 7A 3D  y.............z=
#     0040: BE 37 6C 5C E4 8E D0 B6   C0 DE 7D 91 C2 A4 B7 8B  .7l\............
#     0050: 4D 50 02 5D 7A 0A 21 3E   63 02 85 84 47 40 41 78  MP.]z.!>c...G@Ax
#     0060: 5E A4 54 FA 96 2D F7 7D   E7 71 02 C8 BE E2 55 0B  ^.T..-...q....U.
#     0070: CD B0 1D 24 CC BE 3E FC   2C 8B 09 14 89 94 3D 02  ...$..>.,.....=.
#     0080: 24 CA 9F D2 5A 6A C7 6A   01 4E 65 E4 43 7A 9E DB  $...Zj.j.Ne.Cz..
#     0090: EA AC A5 79 06 2B 06 62   89 9A 14 4B 08 77 96 A9  ...y.+.b...K.w..
#     00A0: 4A 0B 62 43 F8 B4 4F 53   6A 0C 3B A9 70 F3 34 A9  J.bC..OSj.;.p.4.
#     00B0: 6E 98 F2 07 E6 9F 19 B4   29 1B 03 66 F4 28 93 36  n.......)..f.(.6
#     00C0: F2 33 FE 19 A3 52 85 84   BD 72 A3 DD 32 A6 4F 8D  .3...R...r..2.O.
#     00D0: DD 48 68 74 B4 8E F5 2E   75 15 65 5B FE 0E 98 C7  .Hht....u.e[....
#     00E0: 4E A9 37 0C 0E 97 92 6C   EF E7 6B 22 7B 18 48 A9  N.7....l..k"..H.
#     00F0: EC 97 F5 5C DD 90 80 9E   F1 6F 48 16 BB 5F 62 34  ...\.....oH.._b4
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.735 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 59 6E 71 F6 58 F1 E2 F6   B6 8C F3 57 D5 4A 77 DB  Ynq.X......W.Jw.
#     0010: CD DF 54 0F CD 21 C8 E1   5C 4C F6 8B E4 84 DD 07  ..T..!..\L......
#     0020: 28 79 1E 48 D8 44 12 99   9D 58 C3 B2 CD 90 CC 43  (y.H.D...X.....C
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.736 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:05:49.786 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CC 13 DF 00 3E 89 65 E1 45 CE B3 FD 68 47 B0 69 D0 E5 E9 60 3D 63 FF 9E 11 A4 AE F9 ED BE 01 3E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-24 14:05:50.056 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-24 14:05:50.057 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-24 14:06:01.168; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-24 14:06:01.496 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 1F 18 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:14.000 UTC",
#       "not  after"         : "2023-12-23 14:05:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#           0010: 63 69 A1 78                                        ci.x
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 0A 24 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-24 14:05:16.000 UTC",
#       "not  after"         : "2023-12-23 14:05:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 96 D4 F6 34 B5 33 9B   40 70 4F C9 66 3D 71 0B  ....4.3.@pO.f=q.
#           0010: 63 69 A1 78                                        ci.x
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D A5 6D C8 72 6C F3 36   E7 46 8E 62 15 E2 66 25  -.m.rl.6.F.b..f%
#           0010: 0F D5 01 3B                                        ...;
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-24 14:06:01.513 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:06:01.891 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:06:01.892 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:06:01.892 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:06:01.892 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:06:02.036 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.037 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:06:02.039 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-24 14:06:02.039 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.046 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.058 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.059 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-24 14:06:02.062 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "67 2F BB 44 A4 E5 0C 46 2B 38 B6 8D 4B 37 A4 08 3E 52 9C 8E 22 2F A7 D9 78 C9 A1 73 2D 62 5E 33",
#     "session id"          : "3B 9E 89 C3 53 EF 95 E6 53 AD 85 63 A7 57 74 32 5B 16 A0 26 A8 ED 62 B3 E5 5F 6F 05 BB B0 22 06",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 8B E2 A6 83 EB 9D 98 3C   10 19 DC BD 3F 26 06 E1  .......<....?&..
#               0010: DC BF 0D 40 52 BF 07 81   D2 11 8B B0 2E EF 51 4F  ...@R.........QO
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.089 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DC 6B 45 63 E0 78 69 21 38 0F B8 DD 39 B7 87 B0 13 4C 3A 87 58 D4 6A A9 5A B7 AE A1 A8 6B 5C 91",
#     "session id"          : "3B 9E 89 C3 53 EF 95 E6 53 AD 85 63 A7 57 74 32 5B 16 A0 26 A8 ED 62 B3 E5 5F 6F 05 BB B0 22 06",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 5E C7 1E EC 5D BC 21   66 E1 9D 93 31 C7 C5 9C  .^...].!f...1...
#             0010: 44 45 AD BA 0D 52 4C 0C   98 0F 5D B4 F9 8A D8 16  DE...RL...].....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.089 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.089 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.090 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.091 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.092 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.092 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.094 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.094 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.095 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.095 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.096 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.104 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.105 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.107 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.110 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:06:02.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:06:02.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-24 14:06:02.114 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha51

[...truncated too long message...]

onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-24 14:07:21.735 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:07:21.785 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:07:21.785 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:07:21.785 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-24 14:07:21.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42198/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 64 SOLR-11740 check 'solr stop' connection in 28476ms
ok 65 stop command for single port in 31005ms
ok 66 status detects locally running solr in 14362ms
ok 67 status does not expose cli parameters to end user in 213ms
ok 68 listing out files in 2205ms
ok 69 copying files around in 6592ms
ok 70 upconfig in 2635ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1225ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 73 Cleanup in 1222ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 21m 36s
673 actionable tasks: 656 executed, 17 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 22m1.5s
------------------------------------------------------------------------
Error: Error parsing md5sums for crave update
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' '**/hs_err_pid*'
Error: Error parsing md5sums for crave update
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1682) [Receiver=3.1.3]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any